stock exchanges in the line of fire-morphology of cyber attacks

46
Session ID: Session Classification: Ziv Gadot Radware HT-R33 Intermediate Stock Exchanges in the Line of Fire – Morphology of Cyber Attacks

Upload: radware

Post on 15-Jan-2015

573 views

Category:

Technology


0 download

DESCRIPTION

Stock exchanges are constantly targeted by cyber attacks. This presentation discusses several real life attacks cases studies discussing attack vectors, motivations, impacts and mitigation techniques.

TRANSCRIPT

Page 1: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Session ID:

Session Classification:

Ziv GadotRadware

HT-R33

Intermediate

Stock Exchanges in the Line of Fire – Morphology of Cyber Attacks

Page 3: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

► It is Too Easy to Cause Impact► ‘Attack Campaign’ - Morphology► Resolution:

Transition from a 2-phase security approach to a 3-phase security approach

Agenda

2 Case Studies

Page 4: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Case Study IDay I

Page 5: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Day I

10:51 Attack begins: - UDP flood- HTTP flood- FIN+ACK flood- Empty connection flood

Target: Stock Exchange News SiteProtection: PartialImpact: Heavy

4 hour outage to News SiteCollateral damage to other sites

13:30 Noon trading opens, but trade is closed for several companies 16:00 Trading ends for the dayEvening Mitigation equipment is deployed and configured

Attacks halted (temporarily)

Network Impact Sever Business Impact Sever

Page 6: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Day I

hour hour

Page 7: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Day I – Attack Vectors

Attack Vector

Confirmed Measurement

UDP Flood 44 MbpsHTTP Flood 40K Concurrent Con.Empty Connection Flood 5.2K PPSFIN+ACK 4 Mbps

Pipe Satur-ation

FW CPU100%

Web Server Outage

X X

X X

X X

X X

Page 8: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Day I : Media Coverage

“Attack on stock exchange triggers

halt in trade”

“Stock exchange hit by hackers”

Page 9: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Enormous Negative Psychological Impact

Stock exchange environment Malicious attack campaign

The Media Impact

1 Stock Exchange = 5 Banks = 5 Government Sites

Page 10: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Case Study IDay 2

Page 11: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Day 2

08:00 Additional mitigation actionsOrganization is concerned of false-positive

10:36 Attack begins: HTTP FloodTarget: Stock Exchange News Site Protection: Connection Rate Limit + Temp ACLImpact: 10-15 minutes slowness/outage

Network Impact LowBusiness Impact None

Page 12: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Day 2

“Stock exchange IT have been working

intensively to resolve all issues”

“Experts successfully implemented a

protection against the attacks”“Additional

measures were taken such as a redundant

New Site”

Page 13: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Case Study IDay 3

Page 14: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Day 3

08:00 Security configuration is enforced (“War Time” configuration)10:36 Attack begins: HTTP Flood

Target: Stock Exchange News Site Protection: Connection limit Temp ACL

Network Impact NoneBusiness Impact None

Page 15: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Day 3

Legitimate traffic monitoring

TCP connection flood detection and mitigated immediately

Page 16: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Day 3

13:32 Attack begins: UDP Flood (Two minutes after the noon trading begins) Target: Stock Exchange Mews Site Protection:

- Behavioral technologies (primary)

- Connection Limit - Blacklisting

Impact: NoneForensic: Attacker IP detected (eventually led to arrest)

Network Impact NoneBusiness Impact None

Page 17: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Attack begins but quickly mitigated

Page 18: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Case Study IWeek 2

Page 19: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

► Stock Exchange remains in highest alert► Eventually there were no serious

attacks ► Protect additional networks ► Forensic process (with police) ► Arrests

Week 2

Page 20: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

It is Too Easy to Cause Impact

Page 21: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Static ContentStatic Content

Trade/Financial AnnouncementsTrade/Financial Announcements

HTTP Flood Impact

Trading API

HTTP Flood

Firewall L3 Router

Psychological Impact

TradeDisruption

Internet Pipe

Page 22: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Trade/Financial AnnouncementsTrade/Financial Announcements

Static ContentStatic Content

UDP Flood Impact

Trading API

UDP Flood

Firewall L3 Router

Psychological Impact

TradeDisruption

Internet Pipe

Trading API

Page 23: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Trade/Financial AnnouncementsTrade/Financial Announcements

Static ContentStatic Content

L3 Router Internet Pipe

SYN Flood Impact

Trading API

SYN Flood

Firewall

Psychological Impact

TradeDisruption

Trading API

Page 24: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

2010 – no Real Protection

Stock Exchange

HTTP Flood

UDP Flood

SYN Flood

Protection

Page 25: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

2011 – Protection Deployed

HTTP Flood

Stock Exchange

SYN Flood

UDP Flood

Protection

Page 26: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Stock Exchange

2012 – Protection Enforced

HTTP Flood

UDP Flood

SYN Flood

Slow Rate Flood

Image Download Flood

Attackers will eventually find

the weakest link!

Protection

Page 27: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Political/Hacktivist’s Bull’s Eye - Ideal

Page 28: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Political/Hacktivist’s Bull’s Eye (Realistic)

Political/Hacktivist’s Bull’s Eye - Realistic

Page 29: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Case Study 2Israel Cyber Attack Jan 2012

Page 30: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

January 3Saudi hacker 0xOmar leaks tens of thousands Israeli credit card numbers and other personal sensitive information.

January 16 Early Morning0xOmar and the Pro-Palestinian “Nightmare” hacker group sends an email to the Jerusalem Post, threatens to attack EL-AL website.9:30 AMEL-AL, Tel Aviv Stock Exchange, and several banks are attacked and are unavailable for hours.

January 17 Israeli hacker group “IDF-Team” retaliates by attacking Saudi and UAE’s Stock Exchanges websites.

January 18 Additional Israeli websites were targeted.

Case Study 2

Page 31: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

LegitimateBypass CDN

CDN - False Sense of Security

Attack Directly

CDN

Page 32: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

► “HTTP Dynamic GET Request Flood”► Requests for invalid random parameter evades CDN

service

TASE Attack (Estimated)

Page 33: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Attack Vector 2

Pragma: no-cache

Page 34: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

► HTTP Dynamic Flood► HTTP Static Flood► UDP Flood► SYN Flood► UDP Fragmented Flood

Attack Vector Summary

Page 35: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

‘Attack Campaign’ - Morphology

Page 36: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Attack Campaign Morphology

MitigationContinued

Service Disruption

Test FireHeads Up Attack Begins

Reconnaissance

Automatic Mitigation

Attack Ends Forensic

Manual Mitigation

New Attack Vectors

Service Disruption

Page 37: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Resolution: Transition from a 2-phase security approach to a 3-phase security approach

Page 38: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

2-Phase Security Model

“Peace” Period

Pre-attack Phase

Post-attack Phase Pre-attack Phase

Time

AttackPeriod

Automatic Mitigation(no time for human interaction)

AttackPeriod

“Peace” Period

Page 39: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

3-Phase Security Model

“Peace” Period

Pre-attack Phase

Attack Period

THE SECURITY GAPAttacker has time to bypass automatic mitigation.

Defenders have no skill/capacity to sustain it.

“Peace” Period

Post-attack Phase

Page 40: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Industry Security SurveyHow much did your organization invest in each

of the following security aspects in the last year?

Before During After

0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

Procedures

Human skills

Equipment

Radware 2012 Global Application and Network Security Report

Page 41: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

THE SECURITY GAPAttacker has time to bypass automatic mitigation.

Defenders have no skill/capacity to sustain it.

Be prepared for prolonged attacks!

3-Phase Security

“Peace” Period

Pre-attack Phase

Attack Period

“Peace” Period

Post-attack Phase

Response Team

Page 42: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Response Team

Response Team

24x7x365Trained

Experienced

Active Mitigation

RT Intel

Counterattack

Page 43: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Summary

Page 44: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

► It is Too Easy to Cause an Impact► ‘Attack Campaign’ - Morphology► Resolution:

Transition from a 2-phase security approach to a 3-phase security approach

Summary

Page 45: Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks

Q & A

Ziv GadotRadware [email protected]