the life of breached data & the dark side of security

82
The Life of Breached Data & The Dark Side of Security. Jarrod Overson @jsoverson QCon SF 2016

Upload: jarrod-overson

Post on 13-Feb-2017

313 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: The Life of Breached Data & The Dark Side of Security

The Life of Breached Data & The Dark Side of Security.

Jarrod Overson @jsoverson QCon SF 2016

Page 2: The Life of Breached Data & The Dark Side of Security
Page 3: The Life of Breached Data & The Dark Side of Security
Page 4: The Life of Breached Data & The Dark Side of Security
Page 5: The Life of Breached Data & The Dark Side of Security
Page 6: The Life of Breached Data & The Dark Side of Security
Page 7: The Life of Breached Data & The Dark Side of Security

It's more than just massive breaches from large companies, too.

Page 8: The Life of Breached Data & The Dark Side of Security

It's small continuous, streams of exploitable data

Page 9: The Life of Breached Data & The Dark Side of Security
Page 10: The Life of Breached Data & The Dark Side of Security

2.2 BillionLeaked credentials in 2016 alone

Page 11: The Life of Breached Data & The Dark Side of Security

Every breach adds a piece of you to a criminal's database.

Passwords, emails, names, security questions & answers, addresses, and more

Page 12: The Life of Breached Data & The Dark Side of Security
Page 13: The Life of Breached Data & The Dark Side of Security

Traditional security is like flossing.

We know we're supposed to care, but is it really that important?

Page 14: The Life of Breached Data & The Dark Side of Security

OWASP Top 10A1 – Injection

A2 – Broken Authentication and Session Management

A3 – Cross-Site Scripting (XSS)

A4 – Insecure Direct Object References

A5 – Security Misconfiguration

A6 – Sensitive Data Exposure

A7 – Missing Function Level Access Control

A8 – Cross-Site Request Forgery (CSRF)

A9 – Using Known Vulnerable Components

A10 – Unvalidated Redirects and Forwards

Page 15: The Life of Breached Data & The Dark Side of Security

OWASP Automated ThreatsOAT-020 Account Aggregation OAT-006 Expediting

OAT-019 Account Creation OAT-004 Fingerprinting

OAT-003 Ad Fraud OAT-018 Footprinting

OAT-009 CAPTCHA Bypass OAT-005 Scalping

OAT-010 Card Cracking OAT-011 Scraping

OAT-001 Carding OAT-016 Skewing

OAT-012 Cashing Out OAT-013 Sniping

OAT-007 Credential Cracking OAT-017 Spamming

OAT-008 Credential Stuffing OAT-002 Token Cracking

OAT-015 Denial of Service OAT-014 Vulnerability Scanning

Page 16: The Life of Breached Data & The Dark Side of Security

These attacks aren't cost effective unless automated

BY�EVIL��ROBOTS

Page 17: The Life of Breached Data & The Dark Side of Security

Our user-friendly APIs enable our attackers

Page 18: The Life of Breached Data & The Dark Side of Security

Not just these APIs

Page 19: The Life of Breached Data & The Dark Side of Security

The APIs we expose unintentionally.

Page 20: The Life of Breached Data & The Dark Side of Security

The APIs we expose unintentionally.

Page 21: The Life of Breached Data & The Dark Side of Security

The APIs we expose unintentionally.

Page 22: The Life of Breached Data & The Dark Side of Security

When you read about breaches, what do you do?

Page 23: The Life of Breached Data & The Dark Side of Security

Even if you have the most secure site in the world,

you don't usually protect against legitimate user logins.

Page 24: The Life of Breached Data & The Dark Side of Security

If your users were robots, could you tell?

Page 25: The Life of Breached Data & The Dark Side of Security
Page 26: The Life of Breached Data & The Dark Side of Security

What percentage of traffic is from bots?

Page 27: The Life of Breached Data & The Dark Side of Security

95%( Current record for automation against a login page, via Shape Security )

What percentage of traffic is from bots?

Page 28: The Life of Breached Data & The Dark Side of Security

Why?

Page 29: The Life of Breached Data & The Dark Side of Security

Do you… For example

Store a type of currency? actual money, point values, gift cards

Sell goods? physical, digital, services

Have unique PII? health care, social networks

Have user generated content? forums, social networks, blogs, comments

Have time sensitive features? tickets, flash sales, reservations

Pay for digitally validated behavior? ad clicks, reviews, "uber for X"

Page 30: The Life of Breached Data & The Dark Side of Security

If you have value, there is value in exploiting you.

Page 31: The Life of Breached Data & The Dark Side of Security

Targeted Fraud can take many forms.

Page 32: The Life of Breached Data & The Dark Side of Security

But we have captchas!

Page 33: The Life of Breached Data & The Dark Side of Security

But captchas don't work.

Page 34: The Life of Breached Data & The Dark Side of Security

Estimated 200 million+ hours spent every year deciphering squiggly letters.

Luis Von Ahn, creator of captcha

*

*

Page 35: The Life of Breached Data & The Dark Side of Security

Services have been made making captcha bypass even easier.

Page 36: The Life of Breached Data & The Dark Side of Security

Services have been made making captcha bypass even easier.

Page 37: The Life of Breached Data & The Dark Side of Security

Ever wonder where these ads go?

Page 38: The Life of Breached Data & The Dark Side of Security

There's big money in "Work from Home Data Entry" jobs

Page 39: The Life of Breached Data & The Dark Side of Security

So we seek alternatives.

Page 40: The Life of Breached Data & The Dark Side of Security

Some rely on simple behavior analysis

Page 41: The Life of Breached Data & The Dark Side of Security

Some rely on kittens

Page 42: The Life of Breached Data & The Dark Side of Security

Some rely on a love for death metal

Page 43: The Life of Breached Data & The Dark Side of Security

Some are very high profile

Page 44: The Life of Breached Data & The Dark Side of Security

How?

Page 45: The Life of Breached Data & The Dark Side of Security

They use a lot of the same tools we already use.

Page 46: The Life of Breached Data & The Dark Side of Security
Page 47: The Life of Breached Data & The Dark Side of Security
Page 48: The Life of Breached Data & The Dark Side of Security
Page 49: The Life of Breached Data & The Dark Side of Security
Page 50: The Life of Breached Data & The Dark Side of Security
Page 51: The Life of Breached Data & The Dark Side of Security
Page 52: The Life of Breached Data & The Dark Side of Security

Once you detect an attacker, they are easy to block.

Right?

Page 53: The Life of Breached Data & The Dark Side of Security

One attacker from one machine can be blocked by IP.

Page 54: The Life of Breached Data & The Dark Side of Security

Many attackers sound dangerous but aren't as common as they are made out to be.

Page 55: The Life of Breached Data & The Dark Side of Security

One attacker using proxies to look like thousands of users across the globe

is difficult to detect and block.

Page 56: The Life of Breached Data & The Dark Side of Security

Spikes of traffic across many IPs are normal, except when they aren't

Page 57: The Life of Breached Data & The Dark Side of Security

The devices themselves leave fingerprints

Page 58: The Life of Breached Data & The Dark Side of Security

And tools are made to leave no fingerprints

Page 59: The Life of Breached Data & The Dark Side of Security

Lots of tools.

Page 60: The Life of Breached Data & The Dark Side of Security
Page 61: The Life of Breached Data & The Dark Side of Security

We can't patch our way through this.

Page 62: The Life of Breached Data & The Dark Side of Security

How would you react if you went from …

Legitimate traffic

Page 63: The Life of Breached Data & The Dark Side of Security

To this

Automation detected and blockedLegitimate traffic

Page 64: The Life of Breached Data & The Dark Side of Security

Automation detected and blockedLegitimate traffic

To this

Page 65: The Life of Breached Data & The Dark Side of Security

Automation detected and blockedLegitimate traffic

To this

Page 66: The Life of Breached Data & The Dark Side of Security

To get an idea, search for :

• <your company, service, or CMS> fullz

• <your company, service, or CMS> sentrymba

• <your company, service, or CMS> carding

• <your company, service, or CMS> <tool> tutorial

Not sure if you have a problem?

Page 67: The Life of Breached Data & The Dark Side of Security

How do you protect you?

Page 68: The Life of Breached Data & The Dark Side of Security

Make every password unique. Really.

Page 69: The Life of Breached Data & The Dark Side of Security

• LastPass

• 1Password

• Any locally encrypted db

Use a password manager.Use a password manager.

LastPass, 1Password, any locally encrypted database.

Page 70: The Life of Breached Data & The Dark Side of Security

Use a base password + a site specific string.

For example: "hyatt small blue cup"

Use a password algorithm

Page 71: The Life of Breached Data & The Dark Side of Security

Turn on Multi-Factor Authentication.

Page 72: The Life of Breached Data & The Dark Side of Security

How do you protect your users?

Page 73: The Life of Breached Data & The Dark Side of Security

First, throw away the myth that the primary risk to passwords is how crackable they are.

The biggest risk to you and your users is reused passwords.

Page 74: The Life of Breached Data & The Dark Side of Security

Don't add unnecessary password rules

8 char minimum, >64 char maximum, allow ANY character (including spaces)

Page 75: The Life of Breached Data & The Dark Side of Security

Do prevent users from using common passwords

• 123456 • password • 12345678 • qwerty • 12345 • 123456789 • football • 1234

• 1234567 • baseball • welcome • 1234567890 • abc123 • 111111 • 1qaz2wsx • dragon

• master • monkey • letmein • login • princess • qwertyuiop • solo • passw0rd

Maintain and use a banned password list

Page 76: The Life of Breached Data & The Dark Side of Security

Don't expire passwords unless necessary

Expire when accounts are compromised or a user's credentials are leaked.

Page 77: The Life of Breached Data & The Dark Side of Security

Offer Multi-Factor Authentication.

There any many options and services that make this easy and tolerable.

Page 78: The Life of Breached Data & The Dark Side of Security

How do you protect your business?

Page 79: The Life of Breached Data & The Dark Side of Security

Use single flows for important transactions.

Reduce the attack surface area as much as possible.

Login widget

Old login flow

Regular Login

Login at CC entry

2.x login

Login on shopping cart

VS Login

Page 80: The Life of Breached Data & The Dark Side of Security

Ask and be ready for tough questions

You may need to re-evaluate costs & value with new parameters.

Page 81: The Life of Breached Data & The Dark Side of Security

Get help. You're not alone.

Reduce the attack surface area as much as possible.- Helen Keller

Page 82: The Life of Breached Data & The Dark Side of Security

The Life of Breached Data & The Dark Side of Security.

Jarrod Overson @jsoverson QCon SF 2016