Lessons Learned from Capital One Breach & More

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Wireless Security Threats and Solutions By: Shirene Turpin & Rob Waight.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Introduction to Computer Ethics
Honeypot and Intrusion Detection System
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
CYBER CRIME.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Identity Theft.
Security at NCAR David Mitchell February 20th, 2007.
CPT 123 Internet Skills Class Notes Internet Security Session A.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Role Of Network IDS in Network Perimeter Defense.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
100% Exam Passing Guarantee & Money Back Assurance
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Lesson 10A: The Three D’s of Identify Theft
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
WannaCry/WannaCrypt Ransomware
Securing Network Servers
Common Methods Used to Commit Computer Crimes
IT Security  .
Backdoor Attacks.
Wireless Network Security
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
King Phisher Diy phishing security
SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou, and David Evans 23rd USENIX Security Symposium, August,
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
AWS DevOps Engineer - Professional dumps.html Exam Code Exam Name.
Where can I download Aws Devops Engineer Professional Exam Study Material - Get Updated Aws Devops Engineer Professional Braindumps Dumps4downlaod.us
Call AVG Antivirus Support | Fix Your PC
Get Amazon AWS-DevOps-Engineer-Professional Exam Real Questions - Amazon AWS-DevOps-Engineer-Professional Dumps Realexamdumps.com
Latest Amazon AWS-Certified-Developer-Associate Certification Practice Question Answers – Dumps4download
Intercept X for Server Early Access Program Sophos Tester
Malware March 26, 2018.
Forensics Week 12.
Introduction to Computers
HOW DO I KEEP MY COMPUTER SAFE?
Topic 5: Communication and the Internet
IS4680 Security Auditing for Compliance
Incident response and intrusion detection
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Lesson 2- Protecting Yourself Online
Marcial Quinones-Cardona
6. Application Software Security
Identity Theft By Omer Ersen.
STEALTHbits Technologies, Inc.
Cybersecurity Simplified: Ransomware
Presentation transcript:

Lessons Learned from Capital One Breach & More Leon Jiang Sep 2019

Leon - Who is this guy? Current: Director of InfoSec at Roostify, a fintech startup in SF Past: 11 years with Oracle, MBA An experienced information security practitioner with strong business acumen.

Disclaimer Many facts are obtained from the federal document or other public sources. However, some parts are hypothetical analysis for research and future reference purpose only which may not necessarily be truthful or pertained to Capital One breach.

Capital One Breach - What Happened 7/29 - Capitale announced a breach. On the same day, a federal criminal complaint filed against the alleged hacker known as ‘Erratic’. 7/17 - A reporting email sent to Capital One alleging there appeared to be leaked data belonging to Capital One. 4/21 - Erratic uploaded a file to GitHub gist (a code sharing feature separated from GitHub main site, similar to pastebin) which contains commands to access Capital One data but NOT the data itself 8/28 - From the released indictment, not just Capital One, 30+ other companies were being victims of the same hacker between March and July 2019

Analysis Efforts from My End

How Could it Happen? -From the Criminal Complaint 1st Command Obtain (AWS) Credential 2nd Command List (S3) Buckets 3rd Command Sync (S3) Data

How Could it Happen? - From Her Twitter

Key Point - IAM Role on EC2 Instances What is it? According to AWS, We designed IAM roles so that your applications can securely make API requests from your instances, without requiring you to manage the security credentials that the applications use. To simplify, no more username/password or API Key, you have the right once you’re on the machine. How did it go wrong in these cases? Too much privilege were given to the roles - i.e. violating LEAST PRIVILEGE principle

Last Line of Defense - App/Field Level Encryption 100 million individuals was affected, but only 140,000 social security numbers and 80,000 bank account numbers were disclosed. Why? It could be encryption Encrypted data at field or application level so much of the leaked data is not readable As a comparison - Instance/database/bucket level encryption won’t help much in this scenario

Questions Remain Unclear How were the instances compromised in the first place? For Capital One case, different theories Federal Doc: Misconfigured firewall (but how?) Evan J: SSRF (server side request forgery) Instance is not compromised but rather a temporary AWS credential is obtained and following attacks remains the same except not directly launched from the compromised instance Why has it never been detected until reported? Enough suspicious activities: Connection coming from TOR, S3 files sync, data dump, instance launch, malicious software deployed. AWS has some tools such as Guard Duty, Macie, and now Security Hub Of course, running a SOC with thousands of alerts everyday is never easy!

Summary of Lessons Learned Least privilege on IAM role assignment and anything else Extra caution on AWS access Examine the need of IAM roles for Internet facing servers Lock down the IP that those credentials can be used Application level encryption of data or file elements to be stored in DB or S3 Secure and patch vulnerable instances Detection and monitoring A lot of ML/AI based tool is on the rise but the effect is to be examined.

References https://www.roostify.com/blog-home/2019/7/31/capital-one-data-breach-step-by-step-analysis https://www.capitalone.com/facts2019/ https://www.justice.gov/usao-wdwa/press-release/file/1188626/download https://www.justice.gov/usao-wdwa/pr/former-seattle-tech-worker-indicted-federal- charges-wire-fraud-and-computer-data-theft https://ejj.io/blog/capital-one