120 likes | 247 Views
Scenario: Death of a Telecommuter. The most skilled attackers are very pragmatic They construct elaborate attacks from the building blocks we’ve discussed Consider the following scenario: Monstrous Software sells a software product called “foobar”
E N D
Scenario: Death of a Telecommuter • The most skilled attackers are very pragmatic • They construct elaborate attacks from the building blocks we’ve discussed • Consider the following scenario: • Monstrous Software sells a software product called “foobar” • Bonnie and Clyde are funded to steal source code for foobar • They don’t want to get caught, so indirection is key
Scenario: Steal the Source, Luke! Monstrous Software telecommuter University in former USSR Internet Source Code Repository Firewall Monstrous Software corporate network Company in SE Asia High-profile E-commerce site
Attackers Scan for Intermediaries Monstrous Software telecommuter University in former USSR Internet Source Code Repository Firewall Monstrous Software corporate network Company in SE Asia High-profile E-commerce site
Send Email Spam re: Cool Game .. .. .. Monstrous Software telecommuter University in former USSR Internet SPAM! Source Code Repository Firewall Monstrous Software corporate network Company in SE Asia High-profile E-commerce site
Telecommuter Gets Email through VPN .. .. .. .. Monstrous Software telecommuter University in former USSR Internet VPN Source Code Repository Gets email Firewall Monstrous Software corporate network Company in SE Asia High-profile E-commerce site
Download Game: Oops, It’s a Trojan .. .. .. .. Monstrous Software telecommuter University in former USSR Internet Clicks on emaillink to download cool program Source Code Repository Firewall Monstrous Software corporate network Company in SE Asia High-profile E-commerce site
Trojan Copies Itself to Intranet through VPN .. .. .. .. .. .. Monstrous Software telecommuter University in former USSR *Trojan horse backdoor Trojan searches for shares across VPN, overwriting notepad.exe VPN Source Code Repository Internet Firewall Monstrous Software corporate network Company in SE Asia High-profile E-commerce site
Trojan Installed on Internal Network .. .. .. .. .. .. .. .. .. .. User runs notepad.exe,installing Trojan horse backdoor Monstrous Software telecommuter University in former USSR Trojan horse backdoor VPN Source Code Repository Internet User runs notepad.exe, installing Trojan horse backdoor Firewall Monstrous Software corporate network Company in SE Asia High-profile E-commerce site
Trojan Steals Passwords .. .. .. .. .. .. .. .. .. .. Monstrous Software telecommuter University in former USSR *Trojan horse backdoor Trojan horse backdoor VPN Source Code Repository Internet Trojan dumps password hashes and emails them *Trojan horse backdoor Firewall Monstrous Software corporate network Company in SE Asia High-profile E-commerce site
Attackers Retrieve Passwords .. .. .. .. .. .. .. .. .. .. Monstrous Software telecommuter University in former USSR *Trojan horse backdoor Trojan horse backdoor *L0phtCrack Source Code Repository Internet *Covert_TCP Client *Trojan horse backdoor Firewall Covert_TCP bounce *Covert_TCP Server *Netcat Redirector Monstrous Software corporate network Company in SE Asia High-profile E-commerce site
Attackers Gain Access through VPN .. .. .. .. .. .. .. .. .. .. Monstrous Software telecommuter University in former USSR Trojan horse backdoor Trojan horse backdoor L0phtCrack Source Code Repository VPN Internet Covert_TCP Client Trojan horse backdoor Firewall Covert_TCP bounce Covert_TCP Server Netcat Redirector Monstrous Software corporate network Company in SE Asia High-profile E-commerce site
Attackers Grab Source Code! .. .. .. .. .. .. .. .. .. .. .. .. Monstrous Software telecommuter University in former USSR Trojan horse backdoor Trojan horse backdoor L0phtCrack Source Code Repository VPN Grab source! Internet Covert_TCP Client Trojan horse backdoor Foobar source code main() ... Firewall Covert_TCP bounce Covert_TCP Server Netcat Redirector Monstrous Software corporate network Company in SE Asia High-profile E-commerce site