RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Slides:



Advertisements
Similar presentations
Detection Scenarios ReconWeaponizationDeliverExploitationInstallationC2 Act on Objectives File File - Name URI – Domain Name URI – URL HTTP - GET HTTP.
Advertisements

FIREWALLS Chapter 11.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Module 5: Configuring Access for Remote Clients and Networks.
Chapter 12 Network Security.
ASSUME BREACH PREVENT BREACH + Research & Preparation First Host Compromised Hours Domain Admin Compromised Data Exfiltration (Attacker.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Chapter 7: Using Windows Servers to Share Information.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
1 Information Security Karl F. Lutzen, CISSP Information Security Officer S&T IT Information Systems Security.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Buffer Overflows Lesson 14. Example of poor programming/errors Buffer Overflows result of poor programming practice use of functions such as gets and.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2010 Quest Software, Inc. ALL RIGHTS RESERVED Dmitry Kagansky, CTO - Public Sector (Federal) March 14, 2011 Quest Software – APT and the Insider Threat.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Integrating and Troubleshooting Citrix Access Gateway.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Advanced Persistent Threats (APT) Sasha Browning.
Security fundamentals Topic 10 Securing the network perimeter.
Information Security: Security Blankets are not Enough Karl F. Lutzen, CISSP S&T Information Security Officer.
Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Russell Rice Senior Director, Product Management Skyport Systems
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Security fundamentals
Information Security: Security Blankets are not Enough
Stopping Attacks Before They Stop Business
Port Knocking Benjamin DiYanni.
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Instructor Materials Chapter 7 Network Security
Conquering all phases of the attack lifecycle
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Auburn Information Technology
Chapter 4: Protecting the Organization
How to Mitigate the Consequences What are the Countermeasures?
BACHELOR’S THESIS DEFENSE
Incident response and intrusion detection
BACHELOR’S THESIS DEFENSE
6. Application Software Security
Presentation transcript:

RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer

RSA Attack March 2011, RSA had a data breach –Attacker stole information which affected some 40 million two-factor authentication tokens –Devices are used in private industry and government agencies –Produces a 6 digit number every 60 seconds.

RSA Attack Analysis An Advanced Persistent Threat (APT) A structured (advanced), targeted attack (persistent), intent on gaining information (threat)

RSA Background RSA is a security company that employs a great number of security devices to prevent such a data breach Methods used bypassed many of the controls that would otherwise prevented direct attack

Attacker Initial Steps Attackers acquired valid addresses of a small group of employees. If the attackers did a full spam to all possible addresses, it gives them away and prevention/detection by RSA is much easier.

Phishing s Two different phishing s sent over a two-day period. Sent to two small groups of employees, not particularly high profile or high value targets. Subject line read: 2011 Recruitment Plan SPAM filtering DID catch it but put in the Junk folder

Employee Mistake One employee retrieved the from the Junk mail folder contained an Excel spreadsheet entitled: 2001 Recruitment Plan.xls Spreadsheet contained a zero-day exploit through Adobe Flash (since patched). –Installed a backdoor program to allow access.

Remote Administration Tool (RAT) Attackers chose to use the Poison Ivy RAT. –Very tiny footprint –Gives attacker complete control over the system –Set in reverse-connect mode. System reaches out to get commands. Fairly standard method of getting through firewalls/IPS

Digital Shoulder-Surfing Next the attackers just sat back and digitally listened to what was going on with the system The initial system/user didn’t have adequate access for their needs so they needed to take a step to another system to go further.

Harvesting Initial platform wasn’t adequate, attackers harvested credentials: user, domain admin, service accounts) Next, performed privilege escalation on non-admin users on other targeted systems. Goal: gain access to high value systems/targets.

The Race During the stepping from system to system, security controls detected an attack in progress. The race was now on. Attacker had to move very quickly during this phase of finding a valuable target.

Data Gathering Attacker established access at staging servers at key aggregation points to retrieve data. As they visited servers of interest, data was copied to staging servers. Staging servers aggregated, compressed, encrypted and then FTP’d the data out.

Receiving Host Target receiving data was a compromised host at an external hosting provider. Attacker then removed the files from the external compromised host to remove traces of the attack. This also hid the attacker’s true identity/location.

Lessons Learned Weakest link: A human Layered Security: Not adequate to prevent Upside: Able to implement new security controls to this point were considered too restrictive.

Karl’s Changes What follows would be the changes I’d make at RSA. Note, they are a commercial company and do not have the open requirements higher education has. Two different beasts. If I were to implement these, very likely I’d be doing a different job…

Changes Traffic shaping both ways. (Firewall port blocking isn’t enough) Block all but specific protocols IDS/IPS on all those protocols Aggressive use of DMZ: Isolate systems Isolate workstations from one another Clean Access Solutions on all systems

Biggest Change Mandatory Monthly Security Awareness training for everyone. (breaking it into monthly modules makes it tolerable) Needs to be interesting/fun, Door prizes, etc.

RSA Attack: Credits analysis-lessons-learned/