580 likes | 594 Views
Training Your Staff in Cyber Threats. Isaac Wagner Chief Operations Officer National Defense Group. Brief Bio. Bachelor of Science from Brigham Young University in Electrical Engineering Master of Science from University of Maryland Baltimore County in Systems Engineering
E N D
Training Your Staff in Cyber Threats Isaac Wagner Chief Operations Officer National Defense Group
Brief Bio • Bachelor of Science from Brigham Young University in Electrical Engineering • Master of Science from University of Maryland Baltimore County in Systems Engineering • Very hands-on career: • Hardware testing • Hardware design • Software testing • Software engineering • Reverse engineering • Very concerned with practical security measures and policy implementation
What Type of Training? • Current threat landscape • Study breaches, even those not related to your business sector • Vulnerability announcements • Best practices for IT personnel • For example, CIS Controls • Best practices for software developers • For example, CERT Coding Standards • Conferences, podcasts, webinars, blogs, etc. • Doing “something” every week to learn more
Agenda • Case Studies of things that went wrong • What the organization can do • What the individuals can do • Security Mindset • Ongoing training
Case Study Facebook (2018)
The Discovery • Facebook engineers observed traffic spike on September 16, 2018 • Started investigating • Located root cause on September 25, 2018 • Three interrelated bugs with the “view as” feature • Stole estimated 50M authentication tokens • Determined that data was mined from around 30M accounts
Facebook Reaction • Deactivated feature while patch was being written • Deactivated stolen tokens (50M) • Deactivated tokens from anyone who had use that feature (40M) • Patched software the day after discovery • Reported breach to FBI
Fallout • What motivation might the hackers have? • Major lawsuits • Loss of reputation • Potential for identity theft and blackmail
What did they do wrong? • Code had been active for more than a year • They reacted quickly • No such thing as enough testing – it’s a tradeoff • Probably just a lapse of judgement or failing to consider all consequences
Case Study British airways (2018)
British Airways • RiskIQ – great writeup about technical details • Attacked by Magecart threat group • Data stolen from 380,000 customers • Digital version of credit card skimmers • Binds to JavaScript events that submit payment • Sends data to baways.com – on quick glance looks legit • Destination URL had signed SSL certificate
British Airways (cont’d) • How did they do it? • Gained access to British Airways infrastructure by some unknown means • Added 22 lines of JavaScript to Modernizr library • In other attacks Magecart taints the supply chain • For example, they infected 3rd part software called “Shopper Approved,” used by e-commerce sites
Case Study Anthem (2014)
Gearing Up for the Attack • Anthem is a United States based health care company • Very personal and private records on millions of people • Listened to interview with Stephen Moore, former Staff Vice President of Cyber Security Analytics • Months before breach Moore and team found malware • Attribution to China • Surprised and unprepared for an attack by a nation state
What Happened? • Actively working threats from one Chinese actor • A separate Chinese actor breached their systems • Anthem in middle of acquisition • Attackers used phishing email and got inside smaller companies network • Lateral movement through systems, right into main Anthem network • At least 90 systems compromised • Private data on 78.8M people stolen • DB Admin noticed a job running that he didn’t start
Case Study Target (2013)
The Setup • Hackers “cased the joint” • Open source reconnaissance • Google searches • Case study written by Microsoft describing Target’s use of their products and the network infrastructure • Found vendor list • Learned about their target network
The Attack • Phishing email campaign toward Target vendors • Compromised HVAC vendor • Found and took credentials to access Target vendor site • Used common tools to find vulnerable and misconfigured devices on the network • Lateral pivot though network • Got into auto-update systems, and pushed malware to POS systems • Reaped credit card info
What went wrong? • There was not a single point of failure • Multiple issues combined • Vendor network should have been isolated from main network • Misconfigured servers • Default passwords on some devices • Security vendor software (FireEye) alerted Target, but not action was taken
The Breaches Keep on Coming… • Equifax (2017) • Network scanning to find vulnerable servers • Known Apache Struts vulnerability left unpatched • Yahoo (2014) • Spear phishing email • Single click brought down Yahoo and exposed 3B accounts • Uber (2016) • Passwords to Amazon AWS data servers were in code on GitHub • Uber tried to cover it up
Password Databases Or, how to make it super easy for criminals
A Tale of Two Websites • Had a web site hosted for a couple years (circa 2006) • Trouble logging in one day • Clicked “forgot password” link • Received email containing clear text password (VERY BAD!) • Was told by tech support it was “easier for customers” to send their passwords, rather than forcing a reset • Last month, clicked “forgot password” on web site touting cybersecurity training • You guessed it, clear text password emailed
This is bad folks • Stop making it easy for hackers • Database is accumulation of CLEAR TEXT credentials recovered from various data breaches • Password reuse between sites • Simple variations on password themes • ********93@Hotmail.com:!luvb33pb33p • ********93@Hotmail.com:1luvb33pb33p • ********93@Hotmail.com:iluvbeepbeep • Non-sophisticated hacker wannabes can now access accounts
Solution Round 1 – Hash Passwords • Hash the passwords before inserting into database • Clear text never touches the database • During login the hash of the password the user entered is compared to the hash in the database • sha256(“password”) => 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 • sha256(“p@ssword”) => 0fd205965ce169b5c023282bb5fa2e239b6716726db5defaa8ceff225be805dc
Hashed Password Problems • Only SLIGHTLY harder for attackers to get passwords • Passwords are still easy to hack • “password” always maps to the exact same hash value • Easy ways to attack hashed passwords • Large database of pre-computed hashes and their clear text passwords • Rainbow tables • Other attack methods • Brute force • Dictionary
Solution Round 2 – Hash + Salt Passwords • “Salt” is a known string added to the password • A salt does not need to be secret • Similar to Initialization Vector (IV) in cryptography in that respect • sha256(“password”) => 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 • sha256(“SALTpassword”) => f11aa9c84e9747bd128105ce648845cbc0689b5253443a9f1c8fc84e2fe4c650
Salted + Hashed Password Discussion • Hackers cannot pre-computer hash database unless they know the salt • Precomputed databases or rainbow tables take a relatively long time • Statistical attack against sufficiently large sample • Can still brute force or dictionary attack if they know salt
Sidebar – Statistical Attack • Most-used passwords tend to vary little • Makes it possible to order passwords by their frequency • Top passwords from database
Statistical Attack (cont’d) • All passwords use the same salt • Order hashes by most used • Most-used hashes neatly line up with most-used passwords • Profit!
Unique Salt + Hash • Unique salt per user + hash • sha256(“password”) => 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 • sha256(“SALT1password”) => fbc0a6cc26b851659a9f1004c3cec1a60f2159d6fc9b7ef835bb0f9997f4cbef • sha256(“SALT2password”) => 4c858b049a353c14ce294a1e682574e1f6edeaadf8058a7c4ff898e2e6323a7c
Solution 3 For The Win! • Hashes all differ for same password • Salt does not need to be secret • Can be stored in database • Statistical attack impossible • Hackers must break passwords one at a time • No way to do bulk cracking
DANGER WILL ROBINSON!!!! • Never ever everever implement your own hash, encryption, or other technical security solution • Always use a well trusted library just for that purpose • People spend years of their lives on cryptography and security solutions and still get it wrong • DON’T DO IT!
What can be done? at least make them work a little for your data
Small and Simple Things • More often than not it’s the little things • Clicking a link • Bringing a device to work • Internal server with same password • Default passwords • Not keeping up with patches
Center for Internet Security (CIS) • Sixty page PDF document containing 20 controls • Ranked in order of implementation priority • Contains description of control, why it’s important, and ways to implement • From CIS Controls v7: The CIS Controls are a relatively small number of prioritized, well-vetted, and supported security actions that organizations can take to assess and improve their current security state. They also change the discussion from “what should my enterprise do” to “what should we ALL be doing” to improve security across a broad scale.
CIS Controls – Basic • Inventory and control of hardware assets • Inventory and control of software assets • Continuous vulnerability management • Controlled use of administrative privileges • Secure configuration for hardware and software on mobile devices, laptops, workstations, and servers. • Maintenance, monitoring, and analysis of audit logs
CIS Controls – Foundational • Email and web browser protections • Malware defenses • Limitations and control of network ports, protocols, and services • Data recovery capabilities • Secure configuration for network devices, such as firewalls, routers, and switches • Boundary defense • Data protection • Controlled access based on the need to know • Wireless access control • Account monitoring and control
CIS Controls – Organizational • Implement a security awareness and training program • Application software security • Incident response and management • Penetration tests and red team exercises
Defense in Depth • Traditional thinking is hard firewall – secure perimeter • Intranet resources easy to access for employees • “It’s OK” mentality • No or shared credentials for internal services • Common password for build farm or servers • Out-of-date software and patches • CIS controls are prioritized • “Boundary Defense” is number 12
Defense in Depth (cont’d) • Both Anthem and Target compromised initially through phishing • Both came in from the side • Hackers moved through internal networks with relative ease • Soft and squishy center with hard shell don’t work
What can employees do? • Use unique passwords for each system/account • Don’t install unauthorized browser plugins • Verify minimized/tiny URL’s • Don’t click links in email • Don’t open email attachments • Promptly report violations of policy, including accidental • Save work to properly backed up server
Corporate Security Practices • Hash + Salt passwords stored in a database • Delete user accounts immediately when person leaves company • Two-factor authentication • Least privilege • DAC/MAC • Limit lateral movement • Enforce password complexity requirements
Corporate Security Practices (continued) • Block Social Media • Supply Chain Interdiction • Beware of common attacks • Phishing • Cross-site scripting • SQL Injection • DoS Attacks • DNS Redirection
Synergy Not just a buzzword
The Dreaded Buzzword • “Synergy” has been abused as a buzzword • Fits perfectly the idea I want to convey • Work together with each other and the community • “Community” could be other teams in the company, depending on environment • Following example shows two differing views
Voting Equipment Hacking • DefCon Voting Village for past two years • Identified many security vulnerabilities and wrote formal report • Election Systems and Software (ES&S): “[F]orums open to anonymous hackers must be viewed with caution, as they may be a green light for foreign intelligence operatives who attend for purposes of corporate and international espionage. “We believe that exposing technology in these kinds of environments makes hacking elections easier, not harder, and we suspect that our adversaries are paying very close attention.”
In other words… • Security through obscurity • Sticking head in sand doesn’t work • Community was very helpful and wrote a really nice report • Free penetration testing!