200 likes | 396 Views
In the Cloud Security. Highlighting the Need for Defense-in-Depth. R. H. Powell IV Director, Government Solutions CISSP Rpowell@Akamai.com W: 703.621.4029 M: 703.867.5899. Headlines You May Have Seen. Online attack hits US government Web sites (7 Jul 09)
E N D
In the Cloud Security Highlighting the Need for Defense-in-Depth R. H. Powell IV Director, Government SolutionsCISSP Rpowell@Akamai.com W: 703.621.4029 M: 703.867.5899
Headlines You May Have Seen Online attack hits US government Web sites(7 Jul 09) Twitter DDoS Attack Politically Motivated, Says Report(7 Aug 09) With botnets everywhere, DDoS attacks get cheaper(15 Oct 09) Hacker grinches launch DDoS attack against Amazon (29 Dec 09) Carriers and ISPs fear rise in DDoS attacks in 2010(20 Jan 10) Chinese Human Rights Sites Hit by DDoS Attack(25 Jan 10) • Chinese ISP Momentarily hijacks the Internet (again)(8 Apr 10) • The Internet Goes to War(14 Dec 10) • Anonymous Launches DDoS Attacks on Sony(06 Apr 11) • Biggest Series of Cyber-Attacks in History Uncovered(03 Aug 11) • Hackers Target Mexico Government Websites(15 Sep 11) • Anonymous Threatens to ‘Erase NYSE from the Internet’(3 Oct 11) • LulzSec Hacker Group Claims Attack on US Senate Website(5 Oct 11) Canadian ISP Website – SQL Injection Vulnerability(5 Oct 11)
Headlines You DID NOT See Independence Day Attacks Paralyze the U.S. Financial & Government Websites Attacked and Taken Down: Stocks Show Concerns President Delays Trip Due to Cyber Attacks
The Threat is Real • DDoS is the #1 Preferred Method of Attack (TrustWave 2011) • 74% of surveyed companies experienced one or more DDoS attacks in the past year, 31% of these attacks resulting in service disruption – Forrester Research • LulzSec, Anonymous declare war on government websites Hacker groups call for stealing, leaking classified information • By Kevin McCaney Jun 20, 2011
Akamai Attack Trends in 2011 • Total DDoS attack volume against Akamai customers is growing 100% 2010 – 2011 • Average Attack sizes are in the 3 -10 Gbps range • Attacks are originating from all geographies and are moving between geographies during the attack 2011 volume is projected based on actuals through September • The Akamai network saw more DDoS attacks in the fourth quarter of 2010 than in the first three quarters of the year combined • – Tom Leighton, Chief Scientist, Akamai Technologies
Why? Political Hackitivism • Extortion / Theft State Sponsored Traditional Hackers: Glory Hounds
Why? Political Hackitivism • Extortion / Theft State Sponsored Traditional Hackers: Glory Hounds
July 4th DDoS Attack TimelineDistributed, Agile and Multi-Phased Attack Protected Akamai Customers from Effects Absorbed: 1M+ Hps; 200+ Gbps; 300k+ Attack IPs Denied the Attacker - Affects on Targets Maintained Customer Brand Integrity Provided Near Real-Time SA & Alerting Provided Analysis to US Cyber Officials Akamai Provides Customers the Ability to “Fight Through” the Attack ! All Targeted Applications on the Akamai Platform Remained Available. All Targets Applications not on the Akamai Platform were Rendered Unavailable. “The first list had only five targets — all U.S. government sites. A second list used by the malware on July 6 had 21 targets, all U.S. government and commercial sector sites, including e-commerce and media sites. A list on the 7th switched out some of the U.S. sites for ones in South Korea. …- Joe Stewart, director of malware research at SecureWorks “While Treasury Department and Federal Trade Commission Web sites were shut down by the software attack, which lasted for days over the holiday weekend, others such as the Pentagon and the White House were able to fend it off with little disruption” -- New York Times
Oct 5, 2011: Vulnerability Scanning Shut Down • Scanning triggers alerts • Offending requests are identified and denied <4hrs
Why? Political Hackitivism • Extortion / Theft State Sponsored Traditional Hackers: Glory Hounds
Holiday Season 2010 – DDoS AttacksAttacked eCommerce Web Sites Protected by Akamai Averted $15M in Lost Revenue Peak AttackTime (GMT) 11/30 2PM 12/1 2PM 11/30 2PM 12/1 1PM 12/1 1PM Times AboveNormal Traffic 9,095x 5,803x 3,115x 2,874x 1,807x PROTECTED Customer #1 Customer #2 Customer #3 Customer #4 Customer #5 Customer 1 Customer 2 Highly distributed international DDoS attacks from Asia-Pac, South America and Middle East Customer 3
Why? Political Hackitivism • Extortion / Theft State Sponsored Traditional Hackers: Glory Hounds
Customer Telemetry – Q2 2011 During LOIC Attacks Average response time during attack: 0.87 seconds. Availability during the LOIC attack: 100%
Why? Political Hackitivism • Extortion / Theft State Sponsored Traditional Hackers: Glory Hounds
Let’s hold somebody ransom (the actual ransom note) • Your site www.#####.de will be subjected to DDoS attacks 100 Gbit/s. • Pay 100 btc(bitcoin) on the account • 1ACFJHoB8Z3KDwDn6XdNTEJb6S7VsQiLZG • Do not reply to this email
FBI Attack Warning • The Tip -> • The Response -> • The Result ->