The Anatomy and Security of an Anonymous Operation

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
© 2015 Imperva, Inc. All rights reserved. Collateral DDoS Ido Leibovich, ADC.
7 Effective Habits when using the Internet Philip O’Kane 1.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Information Security Overview in the Israeli E-Government April 2010 Ministry of Finance – Accountant General E-government Division.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
Anatomy of an Web Application Attack
Barracuda Web Application Firewall
Spotting Web Vulnerabilities (from the eyes of an Script Kiddie)
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SiteLock Internet Security: Big Threats for Small Business.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Web Application Security Assessment and Vulnerability Assessment.
Web Application Testing with AppScan Terry Labach.
Norman SecureSurf Protect your users when surfing the Internet.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Database Security Yuli Stremovsky. Agenda Database Security What is GreenSQL ? Management Console Demo GreenSQL Roadmap.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Anonymous By Kendra Kennedy, Benjamin Fleshman, and Hassan Alsuleiman.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Hacker Intelligence: 6 Months of Attack Vector Research Tal Be’ery, ADC Imperva.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
Honeypot and Intrusion Detection System
Web Application Firewall (WAF) RSA ® Conference 2013.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 Anonymous is a loosely knit internet activist group mainly focusing on standing up against internet censorship.  The group is completely democratic,
The Security Circus.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Virus Hits Wikipedia The virus writers created a page on the German Wikipedia that linked to a fake fix for a new version of an old malicious Windows worm.
Web Applications Testing By Jamie Rougvie Supported by.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
CU – Boulder Security Incidents Jon Giltner. Our Challenge.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Security By Duncan Hall.
Web Security. Introduction Webserver hacking refers to attackers taking advantage of vulnerabilities inherent to the web server software itself These.
The Security Circus MPICT Summer Conference, June, 2011.
Soroush Dalili 9 Dec Computer Security MSc. of Birmingham University.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
The Current State of Cyber Security and How to Defend Your Data.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
1. Definition : Malicious code refers to a program that is covertly inserted into another program with the intent to Malicious activities. 2.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
Web Application Security
Real-time protection for web sites and web apps against ATTACKS
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Threats to computers Andrew Cormack UKERNA.
Beyond Today’s Perimeter Defense: Radware Attack Mitigation System (AMS) Benjamin Radtke Senior SE Radware North/East Germany September 2011.
Double Deuce Jibran Ilyas, Frank LaSota, Paul Lowder, Juan Mendez
Double Deuce Jibran Ilyas, Frank LaSota, Paul Lowder, Juan Mendez
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
DhakaCom Bangladesh Cyber Security Status Global Perspective Mohammad Fakrul Alam dhakaCom Limited fakrul [at] dhakacom [dot] com
Presentation transcript:

The Anatomy and Security of an Anonymous Operation July 2012 Terry Ray – VP WW Security Engineering

What is Anonymous? Reality Perception “[Anonymous is] the first Internet-based superconsciousness.” —Chris Landers. Baltimore City Paper, April 2, 2008 Hacktivists fighting for moral causes. The 99%. Reality “Anonymous is an umbrella for anyone to hack anything for any reason.” —New York Times, 27 Feb 2012 Targets include porn sites, Mexican drug lords, Sony, government agencies, banks, churches, law enforcement and Vladimir Putin. Anyone can be a target.

The Plot Attack took place in 2011 over a 25 day period. Anonymous was on a deadline to breach and disrupt a website, a proactive attempt at hacktivism. 10-15 skilled hackers. Several hundred to thousands supporters.

How They Attack: The Anonymous Attack Anatomy

Anonymous Attack on Customer Site Web Application Protection Use Case SecureSphere Web Application Firewall Presentation Anonymous Attack on Customer Site Web Application Protection Use Case May 21, 2007 PHASE I SecureSphere stopped all phases of attack Technical Attack Scanners such as Nikto Phase III PHASE II Business Logic Attack The first use case we are going to look at is Web application protection and since it is an important use case, we are going to examine different Web application threats and how SecureSphere mitigated them. The first one is a multinational company that was attacked by the hacktivist group Anonymous. Imperva witnessed the assault which occurred over a period of 25 days. It started with recruiting activities and application probes by scanners such as Nikto and Acunetix. These scans tried to uncover Web vulnerabilities. During the second phase, Anonymous turned to attack tools like the Havij SQL injection tool to attempt to hack the site. They also used anonymity services like anonymous proxies to disguise their identity. During both of these phases, Imperva blocked all attacks. When the technical attacks failed, Anonymous turned to DDoS attacks to attempt to bring down the Website. They used LOIC, or Low Orbit Ion Cannon, and a new mobile version of the attack tool to disrupt application access. Traffic spiked, but SecureSphere was able to mitigate this Web-based DDoS attack. Technical Attack Havij SQL injection tool LOIC application Imperva

On the Offense Skilled hackers—This group, around 10 to 15 individuals per campaign, have genuine hacking experience and are quite savvy. Broad use of anonymizing services (aProxy & TOR). Nontechnical—This group can be quite large, ranging from a few dozen to a few hundred volunteers. Directed by the skilled hackers, their role is primarily to conduct DDoS attacks by either downloading and using special software or visiting websites designed to flood victims with excessive traffic.

On the Defense Deployment line was network firewall, IDS, WAF, web servers, network anti-DOS and anti-virus. Imperva WAF SecureSphere WAF version 8.5 inline, high availability ThreatRadar reputation (IP Reputation) SSL wasn’t used, the whole website was in HTTP

1 Recruiting and Communications

Step 1A: An “Inspirational” Video

Step 1B: Social Media Helps Recruit

Setting Up An Early Warning System

Example

2 Recon and Application Attack “Avoid strength, attack weakness: Striking where the enemy is most vulnerable.” —Sun Tzu

Step 1A: Finding Vulnerabilities Tool #1: Vulnerability Scanners Purpose: Rapidly find application vulnerabilities. Cost: $0-$1000 per license. The specific tools: Acunetix (named a “Visionary” in a Gartner 2011 MQ) Nikto (open source)

Hacking Tools Tool #2: Havij Purpose: Developed in Iran Automated SQL injection and data harvesting tool. Solely developed to take data transacted by applications Developed in Iran

Vulnerabilities of Interest DT SQLi XSS

Comparing to Lulzsec Activity Lulzsec was/is a team of hackers focused on breaking applications and databases. ‘New’ Lulzsec taking credit for recent attacks. Militarysingles.com. Our observations have a striking similarity to the attacks employed by Lulzsec during their campaign. Lulzsec used: SQL Injection, Cross-site Scripting and Remote File Inclusion (RFI/LFI). RFI index.php Additionally, the ADC found that 29 percent of the attack events originated from the 10 most active attack sources. While filtering based on geography is far from reliable, sorting traffic based on reputation is viable. Even though the identity of the host that initiated an attack is not necessarily indicative of the identity of the attacker that controls it, we have investigated the geographic distribution of the attack-initiating hosts as determined by their IP addresses.For all attack types the attackers were spread around the world but most of the attacks (both in absolute numbers and counting the distinct hosts initiating the attacks) were from the United States. A significant portion of SQL Injection attacks we observed coming from a relatively small number of Chinese hosts (see Figure 3). The leading source countries were rather consistent across all attack types. The average ratio of attacks to attacking hosts is about 10:1 for RFI, 25:1 for SQL injection and 40:1 for DT.

Lulzsec Activity Samples 1 infected server ≈ 3000 bot infected PC power 8000 infected servers ≈ 24 million bot infected PC power Additionally, the ADC found that 29 percent of the attack events originated from the 10 most active attack sources. While filtering based on geography is far from reliable, sorting traffic based on reputation is viable. Even though the identity of the host that initiated an attack is not necessarily indicative of the identity of the attacker that controls it, we have investigated the geographic distribution of the attack-initiating hosts as determined by their IP addresses.For all attack types the attackers were spread around the world but most of the attacks (both in absolute numbers and counting the distinct hosts initiating the attacks) were from the United States. A significant portion of SQL Injection attacks we observed coming from a relatively small number of Chinese hosts (see Figure 3). The leading source countries were rather consistent across all attack types. The average ratio of attacks to attacking hosts is about 10:1 for RFI, 25:1 for SQL injection and 40:1 for DT.

Automation is Prevailing In one hacker forum, it was boasted that one hacker had found 5012 websites vulnerable to SQLi through automation tools. Note: Due to automation, hackers can be effective in small groups – i.e. Lulzsec. Automation also means that attacks are equal opportunity offenders. They don’t discriminate between well-known and unknown sites. Most notably, the ADC found that attack automation is prevailing. Modern botnets scan and probe the Web seeking to exploit vulnerabilities and extract valuable data, conduct brute force password attacks, disseminate spam, distribute malware, and manipulate search engine results. These botnets operate with the same comprehensiveness and efficiency used by Google spiders to index websites. As the recent Lulzsec episode highlighted, hackers can be effective in small groups. Further, automation also means that attacks are equal opportunity offenders; they do not discriminate between well-known and unknown sites or enterprise-level and non-profit organizations. Automation is prevailing. According to the study, websites experience an average of 27 attacks per hour or about once every two minutes. However, 27 attacks per hour is only an average. When sites come under automated attack, the target can experience up to 25,000 attacks per hour or 7 per second.

US is the ‘visible’ source of most attacks Additionally, the ADC found that 29 percent of the attack events originated from the 10 most active attack sources. While filtering based on geography is far from reliable, sorting traffic based on reputation is viable. Even though the identity of the host that initiated an attack is not necessarily indicative of the identity of the attacker that controls it, we have investigated the geographic distribution of the attack-initiating hosts as determined by their IP addresses.For all attack types the attackers were spread around the world but most of the attacks (both in absolute numbers and counting the distinct hosts initiating the attacks) were from the United States. A significant portion of SQL Injection attacks we observed coming from a relatively small number of Chinese hosts (see Figure 3). The leading source countries were rather consistent across all attack types. The average ratio of attacks to attacking hosts is about 10:1 for RFI, 25:1 for SQL injection and 40:1 for DT. During the Anonymous attack 74% of the technical attack traffic originated from anonymizing services and was detected by IP reputation.

Stop Automated Attacks Mitigation: AppSec 101 Code Fixing Dork Yourself Blacklist + IP Rep WAF WAF + VA Stop Automated Attacks

3 Application DDoS

LOIC Facts Low-Orbit Ion Canon (LOIC) Purpose: DDoS Mobile and Javascript variations Other variations – HOIC, GOIC, RefRef LOIC downloads 2011: 381,976 2012 (through May 10): 374,340 June 2012= ~98% of 2011’s downloads!

Anonymous and LOIC in Action Transactions per Second LOIC in Action Average Site Traffic

Application DDoS The effectiveness of RefRef is due to the fact that it exploits a vulnerability in a widespread SQL service. The flaw is apparently known but not widely patched yet. The tool's creators don't expect their attacks to work on a high-profile target more than a couple of times before being blocked, but they don't believe organizations will rush to patch this flaw en masse before being hit. —The Hacker News, July 30, 2011

But That Much Sophistication Isn’t Always Required

But That Much Sophistication Isn’t Always Required Meet your target URL

4 Non-Mitigations

I have IPS and NGFW, am I safe? IPS and NGFWs do not prevent web application attacks. Don’t confuse “application aware marketing” with Web Application Security. WAFs at a minimum must include the following to protect web applications: Web-App Profile Web-App Signatures Web-App Protocol Security Web-App DDOS Security Web-App Cookie Protection Anonymous Proxy/TOR IP Security HTTPS (SSL) visibility Security Policy Correlation

I have IPS and NGFW, am I safe? IPS and NGFWs do not prevent web application attacks. Don’t confuse “application aware marketing” with Web Application Security. However, IPS and NGFWs at best only partially support the items in Red: Web-App Profile Web-App Signatures Web-App Protocol Security Web-App DDOS Security Web-App Cookie Protection Anonymous Proxy/TOR IP Security HTTPS (SSL) visibility Security Policy Correlation

Recent attacker targets…. Yahoo Voice Linked In Last.fm Formspring eHarmony US Department of Justice US Copyright Office FBI MPAA Warner Brothers RIAA HADOPI BMI SOHH Office of the AU Prime Minister AU House of Parliament AU Department of Communications Swiss bank PostFinance Egyptian Government Itau Banco de Brazil US Senate Caixa Church of Scientology Muslim Brotherhood Zappos.com MilitarySingles.com Amazon Austria Federal Chancellor HBGary Federal Mexican Interior Ministry Mexican Senate Mexican Chamber of Deputies Irish Department of Justice Irish Department of Finance Greek Department of Justice Egyptian National Democratic Party Spanish Police Orlando Chamber of Commerce Catholic Diocese of Orlando Bay Area Rapid Transit PayPal Mastercard Visa How many of these organizations have AV, IPS and Next Generations Firewalls? Why are the attacks successful when these technologies claim to prevent them?

5 Demo