Ransomware in Web Apps OWASP Singapore.

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Trojan Horse Program Presented by : Lori Agrawal.
Customer confidential 1 Privilege Management Sean Moore Solutions Specialist.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Open Web App. Purpose To explain Open Web Apps To explain Open Web Apps To demonstrate some opportunities for a small business with this technology To.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Peter Laird. | 1 Building Dynamic Google Gadgets in Java Peter Laird Managing Architect WebLogic Portal BEA Systems.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Advanced Persistent Threats (APT) Sasha Browning.
New Techniques in Application Intrusion Detection Al Huizenga, Mykonos Product Manager May 2010.
Title of Presentation DD/MM/YYYY © 2015 Skycure Why Are Hackers Winning the Mobile Malware Battle.
Computer Security By Duncan Hall.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Some Great Open Source Intrusion Detection Systems (IDSs)
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Understanding and breaking the cyber kill chain
If it’s not automated, it’s broken!
Intercept X Early Access Program Sophos Tester
Chapter 40 Internet Security.
WannaCry/WannaCrypt Ransomware
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
WannaCry/WannaCrypt Ransomware
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
What they are and how to protect against them
Ransomware 12:00 Juwan harris.
Sophos Intercept Next-Gen Endpoint Protection
Ilija Jovičić Sophos Consultant.
Project Management: Messages
[Internal Use] for Check Point employees​
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Systems Security Keywords Protecting Systems
Compliance with hardening standards
Various Types of Malware
Lesson Objectives Aims You should be able to:
Cyber Security & IT: What’s Next?
Sophos Intercept Next-Gen Endpoint Protection
^ About the.
Trends in Ransomware Distribution
Call AVG Antivirus Support | Fix Your PC
Intercept X for Server Early Access Program Sophos Tester
SPRING DRAGON APT - A CASE STUDY OF TARGETED ATTACKS IN APAC COUNTRIES
Uses Of Encryption Algorithms
Mike Goodwin OWASP Newcastle September 2017
Chapter 4 Application Software
Varonis Overview.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Chap 10 Malicious Software.
Home Internet Vulnerabilities
The Next Generation Cyber Security in the 4th Industrial Revolution
Android.Adware.Plankton.A % Android.Adware.Wapsx.A – 4.73%
Lecture 2 - SQL Injection
Faculty of Science IT Department By Raz Dara MA.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Security.
Chap 10 Malicious Software.
Computer Security By: Muhammed Anwar.
Security Trends and Threats Affecting Innovations in Technology
Threat Landscape Update
Cybersecurity Simplified: Ransomware
Presentation transcript:

Ransomware in Web Apps OWASP Singapore

What is Ransomware? A malware that blocks access to the computer until a ransom is paid Key features Encryption Advent of crypto currencies Effective infection vectors Ransomware as a service Malicious emails Exploit kits Several recent big attacks disclosed, most people just pay and move on

Control over what is in your code has changed From YOU to: developer tools open-source code 3rd party developers Reference : http://anvaka.github.io/allnpmviz.an/

Open-source libraries have exploded Reference : http://modulecounts.org

Complexity of libraries has exploded For every one library you add to a Node.js project, 9 others are added For every 1 Java library you add to your projects, 4 others are added Reference : SourceClear customer scans

Before the open-source & DevOps era Custom Code Are you introducing vulnerabilities in the code you are writing? (…once every few months)

In the open-source / DevOps era Custom Code What libraries are you using? Where did it come from? What does it do? Is it being maintained? What vulnerabilities are present? (…many hundreds of times each day) Attack surface has changed

Different generations Classical desktop based TeslaCrypt Locky Cryptolocker Newer variants FLocker Samsam

FLocker FLocker (short for "Frantic Locker") ransomware is now capable of locking up Android TV sets. While this variant of malware does not encrypt files on the infected device, it does lock the screen, preventing the user access to the TV. Additionally, this malware has the potential to steal data from the device. Source: https://community.norton.com/en/blogs/security-covered-norton/flocker-ransomware-now-targeting-big-screen-android-smart-tvs

Ransomwear Existing Android ransomware (Android.Simplocker) are easily repackaged to work on Android wear devices

Samsam Used unpatched Java Application Servers (e.g. JBoss, Oracle WebLogic Server) Samsam also uses RSA public key cryptography (classical variants download the encryption key from a C&C server) Recent Muni system hacker exploited an old known remote object deserialization Java vulnerability Sources: http://arstechnica.com/security/2016/11/san-francisco-transit-ransomware-attacker-likely-used-year-old-java-exploit/ http://arstechnica.com/security/2016/03/maryland-hospital-group-hit-by-ransomware/

Ransomware in Web Apps New trend targeting business applications Exploitation based on vulnerabilities Several public exploits are readily available

JBoss exploit kit

Ransomware targeting the software tool chain Lot of trust placed in open source 3rd party libraries Most build systems already allow command execution See https://blog.sourceclear.com/all-your-secrets-belong-to-us/ on how to npm packages can be abused for data exfiltration Web applications have access to critical business data

How to use dependencies to deliver ransomware? Create a library that has provides some simple functionality that will want developers to download and use it Hide code to implement ransomware that can either be triggered remotely or at a fixed time or under production environment etc. Today we demonstrate two PoC/exploits: Spring MVC Ruby on Rails

Spring MVC Typical ransomware works by encrypting files, in case of web application important data is likely to be in the database itself. This presents two potential challenges How to determine the database connection settings for the web application? Once we have access to the database how should we encrypt and decrypt the data?

Search the Spring Application context Locate the right Bean to get “dataSource”

Reflection We can access the ClassLoader hierarchy and find a class with a method which returns a DataSource of some kind.

Encryption Once we have the database connection: Connect to database Dump all content into a file Encrypt it Drop all the tables For encryption we can use RSA public/private key pair where the public key is hardcoded in the application

Don’t forget to leave a ransom note

The entire process Model classes Controller classes View templates Display a ransom note Spring classes Spring classes Use reflection to get DB connection settings Log in to DB, then dump and encrypt contents DB DB

Ruby on Rails Similar to the Spring MVC example Due to the dynamic nature of Ruby it is much simpler to get access to the database connection settings

Simply get the database password from ActiveRecord::Base.connection_config[:password]

Demos

Some thoughts on detection In general quite hard to do it statically but we can profile the libraries and look for suspicious/malicious behaviors: Use of reflection On database connection object Use of hardcoded public keys For encryption

Conclusions Growing threat of ransomware Increasingly targeting business applications, IoT devices etc. Use of novel infection vectors Vulnerabilities in open source libraries Build system, package managers More visibility and auditing needed across the software supply chain

Questions?