| #CLOUDSEC Hoster under Attack ProtonMail - Switzerland Carl Herberger, Vice President, Security Solutions Radware

Slides:



Advertisements
Similar presentations
Attackers Vs. Defenders: Restoring the Equilibrium Ron Meyran Director of Security Marketing January 2013.
Advertisements

Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
2011 Infrastructure Security Report 7 th Annual Edition CE Latinamerica Carlos A. Ayala
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
DDoS Protection, An Inside Look The 3 main types of attacks Will I be victim ? Why Us ? The Top 3 Misconceptions Fact vs Fiction A Realistic Defense.
Worldwide Infrastructure Security Report C F Chui, Arbor Networks.
SiteLock Internet Security: Big Threats for Small Business.
ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.
2012 Infrastructure Security Report Darren Anstee, Arbor Solutions Architect 8 th Annual Edition.
Lesson 7 Intrusion Prevention Systems. UTSA IS 3523 ID & Incident Response Overview Definitions Differences Honeypots Defense in Depth.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Web Application Firewall (WAF) RSA ® Conference 2013.
It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
The Dark Menace: Characterizing Network-based Attacks in the Cloud
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
DoS/DDoS attack and defense
DDoS Readiness Program. About Red Button Red Button A Leader in DDoS Consulting Founded in 2014 Service based Self funded Found by Ziv Gadot – Formerly.
TLP:Green FIRST/TF-CSIRT Technical Colloquium January 25 th – 27 th, 2016 Prague, CZ TLP:Green.
Page 2 Biggest DDoS attack in history slows Internet, breaks record at 300 Gbps 'Biggest cyber-attack in history' slows down internet worldwide after.
Cyber Attacks: No One Immune, Few Prepared: How ProtonMail survived a n Advanced Persistent DDoS attack Carl Herberger, VP Security Solutions.
Re-writing the Playbook for DDoS Mitigation Strategies
DDoS Protection
About Radware. Securing Your Network & Application Availability Radware’s Security Solutions.
Cybersecurity as a Business Differentiator
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
BUILD SECURE PRODUCTS AND SERVICES
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Cisco Sales Introduction DDoS Mitigation by
DDoS Attacks on Financial Institutions Presentation
Instructor Materials Chapter 7 Network Security
A Real and Rising Concern
Distributed Denial of Service Attacks
Real-time protection for web sites and web apps against ATTACKS
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
State of the Internet Security – Q2 2017
Sub-Saturating DDoS Attacks The Silent Bandwidth Thief
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Who should be responsible for risks to basic Internet infrastructure?
Jon Peppler, Menlo Security Channels
بهترین راهکار را انتخاب کنید...
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Protective Security Advisor Program Brief
Beyond Today’s Perimeter Defense: Radware Attack Mitigation System (AMS) Benjamin Radtke Senior SE Radware North/East Germany September 2011.
AKAMAI INTELLIGENT PLATFORM™
Effects of DoS.
Check Point Connectra NGX R60
Distributed Denial of Service Attacks
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Protect Your Ecommerce Site From Hacking and Fraud
Computer Emergency Response Team
Strategic threat assessment
The MobileIron® Threat Detection difference:
Terabit Scale Edge DDoS Protection
DDoS attack Turn slides
Large-Scale Edge DDoS Protection
Cloud Security AWS as an example.
Modelli di Controllo e Mitigazione per Attacchi DDoS
Distributed Denial of Service Attacks
Capitalize on Your Business’s Technology
Session 20 INST 346 Technologies, Infrastructure and Architecture
Cybersecurity Simplified: Phishing
Presentation transcript:

| #CLOUDSEC Hoster under Attack ProtonMail - Switzerland Carl Herberger, Vice President, Security Solutions Radware handle

#CLOUDSEC A Look Into Attack Motives Remember “C.H.E.W.”—Richard Clarke Cyber Crime Financial gain is the primary motive Hactivism Driven by ideological differences Espionage Gaining information for political, financial, competitive leverage War Damage/destroy centers of power; military or non- military Lines are blurring... “multi-motive” attacks Ironically – Evidently the more “secure”, your data risks a cyberattack

#CLOUDSEC Motivation Behind Attacks are Changing Motivations are changing but still widely unknown Hacktivism is the main motive (over 1/3) Big increase in ransom as a motive (25% up from 16% last year) Source: Radware ERT Report 2015

#CLOUDSEC Comparing to 2014 Increased Attacks on Education and Hosting Most verticals stayed the same Education and Hosting – increased likelihood Growing number of “help me DDoS my school” requests Motivations varies for Hosting Some target end customers Some target the hosting companies 2015 Change from 2014 Source: Radware ERT Report 2015

#CLOUDSEC Longer, larger and more sophisticated attacks. Constant attacks on the rise. The Rise of the Continuous Attack In previous years - attacks that were considered “constant” never exceeded 6%. In % were considered “constant”. 52% of respondents felt they could fight a campaign for only one day or less. In 2014, 19% of attacks were considered “constant” Source: Radware ERT Report 2015

#CLOUDSEC Half of organizations experienced DDoS and Phishing attacks Almost half had Worm and Virus Damage One in ten have not experienced any of the attacks mentioned Over 90% Experienced Attacks in 2015 Source: Radware ERT Report 2015

#CLOUDSEC Ransom attacks against service providers Original ransom source from The Armada Collective Targets include ProtonMail, Neomailbox, VF , Hushmail, Fastmail, Zoho and Runbox. ProtonMail Ransom Attack

#CLOUDSEC Who is The Armada Collective? Background Either originating from DD4BC or acting as copy cat and using their methods. Focused on hosting providers, e-commerce, financial services primarily in Europe. Two companies we know already have been taken down. Strategy Customers will receive a ransom mail, asking for 30 bitcoins (5.600 € – €). Warning attack follows within minutes. If payment refused, attacks increase to up to 1TB Targeted - s sent to dedicated and named internal recipients Do their homework – if victim has strong DDoS protection, they will not go after it. Only attack when they can create real damage Attack Methods Current vectors are amplification attacks (NTP, RIP Reflection Amplification) Warning attacks up to 20GB Risk Effected organizations have short time to act and prepare Very high risk – aggressive and professional attackers Proven results with high volume and taking down companies

#CLOUDSEC Nov ProtonMail receives ransom from The Armada Collective, followed by DDoS attack that took them offline for 15 mins Nov Next DDoS attacks hits in the morning and by afternoon reached over 100G directly attacking the datacenter and ISP infrastructure ProtonMail under pressure decides to pay ransom but attacks continue from 2 nd source Nov ProtonMail continues to suffer from ongoing high volume, complex attacks from a second, unknown source Nov Radware’s Emergency Response Team implements its attack mitigation solution to protect ProtonMail. Service is restored shortly after. Nov Attacks continue at high volume of 30-50G at peaks during these days. Attacks are mitigated successfully by Radware. ProtonMail Attack Timeline Largest and most extensive cyberattack in Switzerland

#CLOUDSEC Persistent Denial of Service Attacks ProtonMail Attack – A Look Inside

#CLOUDSEC Nov 8th UDP flood SYN flood DDoS-NTP-reflection DDoS-DNS-reflection SYN-ACK Flood DDoS-tcp-urgent DDoS-tcp-zero-seq DDoS-chargen-reflected events Nov 9th UDP Flood – Reflective DNS TCP RST Flood ICMP Flood SYN Flood – HTTPS SYN Flood – HTTP Nov 10th UDP Flood – SSDP & NTP Reflection ICMP Flood TCP SYN Flood TCP Out-of-State Flood Nov 15th UDP flood DDoS-SSL TCP Out-of-Stat DDoS-udp- fragmented DDoS-NTP-reflection DDoS-DNS-reflection SYN-ACK FloodMinor ICMP flood/RST flood SYN flood Evolution of Attack Vectors by Day

#CLOUDSEC Long Attacks & Short Pulse Attacks

#CLOUDSEC ProtonMail worked with MELANI, Swiss federal government division Information exchanged with other companies also attacked Indentified 2 separate campaigns Volumetric attack targeting only the company’s IP addresses (by Armada Collective) More complex attack targeting weak points in the infrastructure of ProtonMail’s ISPs. Assessing the Attacks “This second phase has not been observed in any other recent attacks on Swiss companies and was technically much more sophisticated. This means that ProtonMail is likely under attack by two separate groups, with the second attackers exhibiting capabilities more commonly possessed by state-sponsored actors. It also shows that the second attackers were not afraid of causing massive collateral damage in order to get at us.” ProtonMail Blog

#CLOUDSEC The Multi-Vector Challenge Coordinated, specialized technologies IPS/IDS Large volume network flood attacks Syn Floods Network Scan HTTP Floods SSL Floods App Misuse Brute Force Cloud DDoS protection DoS protection Behavioral analysis IPS WAFSSL protection Internet PipeFirewall Load Balancer/ADC Server Under Attack SQL Server 18 XSS, CSRF SQL Injections “Low & Slow” DoS attacks (e.g.Slowloris)

#CLOUDSEC Hybrid DDoS Mitigation Solution Volumetric DDoS attack saturates internet pipe Cloud PerimeterLAN Attack Mitigation Device Attack is immediately detected and mitigated at the PerimeterAttack baseline is synchronized to Radware’s Cloud Scrubbing Center Defense Messaging Traffic is diverted and scrubbed in the cloud freeing the internet pipe ADC Radware Cloud Scrubbing

#CLOUDSEC Radware’s Security Solution Addressing the Multi-Vector Challenge 20 Centralized Management & Reporting APSolute Vision Web Application Firewall AppWall, Cloud WAF Service DoS protection Behavioral analysisIPSWAF SSL protection On-Demand Cloud DDoS On-Demand Cloud DDoS Service DefensePipe +1TB mitigation capacity Hybrid or Standalone Models Attack Mitigation Device DefensePro Throughput ranging 200Mbps – 300Gbps Radware Emergency Response Team 24x7 Security Experts

#CLOUDSEC Proactive Preparation and Planning is Key Lessons Learned - Successful Attack Mitigation Strategies Need for a solution with the widest coverage to protect from multi-vector attacks including protection from network and application based DDoS attacks. Monitor security alerts and examine triggers carefully. Tune existing polices and protections to prevent false positives and accurate detection. Consider a hybrid solution that integrates on-premise detection and mitigation with cloud-based protection - to block volumetric attacks. A cyber-security emergency response plan that includes an emergency response team and process in place. Identify areas where helped is needed from a third party. A single point of contact is crucial when under attack - it will help to divert internet traffic and deploy mitigation solutions. 21

Carl Herberger Radware Ltd handle