top security trends for 2014

57
© 2013 Imperva, Inc. All rights reserved. Top Security Trends for 2014 1 Amichai Shulman, CTO, Imperva

Upload: imperva

Post on 09-May-2015

1.413 views

Category:

Technology


1 download

DESCRIPTION

Imperva's dedicated research organization, the Application Defense Center (ADC), constantly monitors hackers - and their attack methods - to isolate the most relevant attack campaigns. Based on this research data, the ADC has identified the top trends poised to have the most significant impact on the security landscape in 2014. This presentation outlines the trends that will resonate across the globe in the upcoming year like the return of compromised web servers, the rise of cloud platform breaches, and the spread of 3rd party application vulnerabilities.

TRANSCRIPT

Page 1: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Top Security Trends for 2014

1

Amichai Shulman, CTO, Imperva

Page 2: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Agenda

2

§  Introduction §  2013 forecast scorecard §  2014 security trends § Summary and conclusion § Q&A

Page 3: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Amichai Shulman – CTO, Imperva

3

§ Speaker at industry events •  RSA, Appsec, Info Security UK, Black Hat

§  Lecturer on information security •  Technion - Israel Institute of Technology

§  Former security consultant to banks and financial services firms

§  Leads the Imperva Application Defense Center (ADC) •  Discovered over 20 commercial application vulnerabilities

§  Credited by Oracle, MS-SQL, IBM and others

Amichai Shulman one of InfoWorld’s “Top 25 CTOs”

Page 4: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

2013 Forecast Scorecard

4

Trend Score

1 Hack%vism  gets  process  driven   C

2 Government  malware  goes  commercial B+

3 Black  clouds  on  the  horizon B+

4 Community  policing A

5 APT  targets  the  li?le  guy A

Page 5: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

#1 - 3rd Party is “No Party”

5

Page 6: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Known Vulnerabilities: The Known Knowns

6

§  There are known knowns; these are things we know that we know…

•  Donald Rumsfeld, U.S. Secretary of Defense, February 2002

§  3rd Party Known vulnerabilities Vulnerable components (e.g., framework libraries) can be identified and exploited (OWASP: https://www.owasp.org/index.php/Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities)

Page 7: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved. 7

Rich Attack Surface

According to Veracode: •  Up to 70% of internally developed code originates outside of the

development team •  28% of assessed applications are identified as created by a 3rd

party

Page 8: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Security Falls Between the Cracks

8

§ Application developers •  Introduce 3rd party code into the system •  Not responsible for 3rd party code security (or

quality) •  Not responsible for run-time configuration of 3rd

party components

§  IT operations •  Not always aware of 3rd party components

§  Web server type is more visible than a library

•  Reluctant to change configuration settings that might impact application behavior

Page 9: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

2014 Forecast: Bigger! Stronger! Faster!

9

§ Bigger! – More Vulnerabilities! § Stronger! – As a result of the

of the vulnerabilities’ market richness, attackers will create vulnerabilities “mash-ups,” combining several different vulnerabilities together

§  Faster! – Shorter time from vulnerabilities’ full disclosure to exploits in the wild

Source: http://cdn.thinksteroids.com

Page 10: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Bigger! Disclosure Rate Increases

10

§ More software + more security researchers + more bounty programs = more vulnerabilities’ disclosures

§ CVE IDs Enumeration syntax was changed to track more than 10,000 vulnerabilities in a single year, starting on 2014

Page 11: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Stronger! Vulnerabilities “Mash-Up”

11

§  Take several “cheap” (low CVSS impact score) known vulnerabilities •  CVE-2010-3065: PHP

§  NIST assigned impact score: 2.9

•  CVE-2011-2505: PHPMyAdmin session modification vulnerability §  NIST assigned impact score: 4.9

§  To create a shining exploit •  PHPMyAdmin full server takeover exploit •  Effective impact score: a perfect 10

§ Read more on Imperva’s HII report: http://www.imperva.com/docs/HII_PHP_SuperGlobals_Supersized_Trouble.pdf

Page 12: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Stronger! 1 + 1 = 3

12

Page 13: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Faster! Vulnerability Weaponization

13

§ Since a vulnerability has a limited time span, attackers strive for a faster vulnerability weaponization

§ We had witnessed weaponization time cut from weeks to days

§  Infrastructure is the key to fast weaponization •  Exploit code is often publicly available •  Dormant botnets are ready to launch the attack •  Command and Control (C2) servers and zombies support

§  Dynamic content §  Dynamic targets

Page 14: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

#2 - Server Based APT Alternative

14

Page 15: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Web Servers Infection is the New Black

15

§ Goals of infecting corporate work stations •  Harness computing resources

§  Network bandwidth to be used in DDoS attacks

§  CPU power to mine Bitcoins

•  Use as a bridgehead into the corporate datacenter

§ Both goals are better achieved by targeting web servers •  More powerful •  Inherently connected to the corporate datacenter

Page 16: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Traditional Infiltration Attack

16

Page 17: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Why Start with Web Servers?

17

§ Easier reconnaissance •  Detect type and components, discover vulnerabilities

§ Accept inbound communications from the Internet (by definition) •  Direct attack, no need for “human factor” •  Remote control becomes easier •  Attacker identity

§  Land (almost) directly into the data center •  No need for “lateral movement”

§ Wide outgoing pipe •  Exfiltration made easier

Page 18: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Means and Opportunity

18

§ Many code execution / full server takeover vulnerabilities exist

§ Most are easy to weaponize and exploit §  In 2013, the following environments were vulnerable to

such attacks •  ColdFusion •  Apache Struts •  vBulletin (TA) •  Jboss (TA) •  PHP

http://blog.imperva.com/2013/11/threat-advisory-a-jboss-as-exploit-web-shell-code-injection.html http://blog.imperva.com/2013/10/threat-advisory-a-vbulletin-exploit-administrator-injection.html

Page 19: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Warning Signs

19

Page 20: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Warning Signs

20

Page 21: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

2014 Forecast: Server Based APTs

21

§ We expect more APT operations to happen through server compromise

§ Such attacks have even a smaller footprint than existing APT techniques •  Initial infection •  Lateral movement •  Exfiltration

§ Public disclosure will probably arrive 2015

Page 22: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

#3 - Ad Networks = Added Risk

22

Page 23: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Reality Check 1

23

§ Malware infected PCs = potential income § Plenty of ways to monetize (KrebsOnSecurity)

Source: http://krebsonsecurity.com

Page 24: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Reality Check 2

24

§  Infected mobile devices are even more valuable § Can do anything a PC does, therefore can be monetized

the same way § Additionally, can send “premium SMS” – a very effective

and direct monetization method

Source: http://thenextweb.com

Page 25: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Black Market Economy 101

25

§  Infected end points are valuable §  Therefore, driving traffic for infecting site is valuable § Sample price list for geo-location profiled traffic (per

thousand unique visitors; Credit: Webroot blog):

Source: http://webrootblog.files.wordpress.com

Page 26: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Malware + Advertising = Malvertising

26

§ Paying someone to show your content is an already established business practice

§  It’s called advertising! § And when the content is

malicious it’s Malvertising §  Targeted advertising is very

efficient § And so is targeted

malvertising Source: http://bluebattinghelmet.files.wordpress.com

Page 27: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Malvertising so 2010…

27

Page 28: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Not!

28

Source: http://upload.wikimedia.org

Page 29: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Not!

29

Source: http://upload.wikimedia.org

Page 30: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

The Main Door is (Pretty Much) Locked

30

§ Vendors closely monitor their app shops for malware § Result: attackers cannot directly upload malicious apps

Page 31: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

2014 Forecast: Year of Mobile Malvertising

31

§ Dynamic content to already installed apps does not go through the app shop

§ Supply - mobile app vendors •  Have many users •  Do not have a way to monetize on the traffic •  Eager for advertising revenues

§ Demand – cyber criminals •  Have malicious content •  Look for alternative delivery to end users, as market is blocked •  Eager for traffic

§ Outcome: Mobile Malvertising

Page 32: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

BadNews Ad Network Infected Apps

32

Source: https://blog.lookout.com

Page 33: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

The Ad Market is Very Complex

33

§ Complex environment is a hotbed for attackers

§ Many opportunities for the attacker to attack •  Can choose the weakest link •  Can move to the next target

when denied

§ App makers have a vast “deniability region”

Source: http://ad-exchange.fr

Page 34: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

#4 - (Finally) Cloud Data Breaches

34

Page 35: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

We are Not in Kansas Anymore Toto!

35

§ Demand •  SaaS and DBaaS are becoming mainstream •  Not early adapters anymore •  Less technical oriented organizations •  Test and pilot deployments become production •  Dial moves from “nice to have” applications to “mission critical”

applications

§ Supply •  Many new providers •  Smaller, less experienced organizations •  Carpe Diem

§  I wanted an app of my own but ended up building a cloud service

Page 36: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Everybody Is Doing It

36

§ According to Verizon ‘2013 State of the Enterprise Cloud Report’ (January 2012 – June 2013) •  The use of cloud-based storage has increased by 90 percent •  Organizations are now running external-facing and critical

business applications in the cloud – production applications now account for 60 percent of cloud usage

Page 37: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Hiding in the Fog

37

§ Outsourcing data MISTAKEN for outsourcing responsibility

§  Low number of breaches §  False sense of safety

Page 38: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Ball Waiting for the Player

38

§  Traditional RDBMS services •  Used as C&C and dropper infrastructure by cyber criminals •  Security attitude is not adapted to cloud reality •  See our “Assessing the Threat Landscape of DBaaS” HII for

more details

§ Big Data services •  Innovative •  Smaller providers •  Using innovative technologies with little to no security built-in •  Widely adopted by web application startup community, often

storing personal information

Page 39: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Warning Signs and Wakeup Calls

39

Page 40: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Warning Signs and Wakeup Calls

40

Page 41: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Warning Signs and Wakeup Calls

41

Page 42: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Warning Signs and Wakeup Calls

42

Page 43: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

2014 Forecast: Cloud Breaches Increase

43

§ We expect to see a significant increase in cloud service data breaches •  SaaS •  DBaaS

§ We expect to see a growing use of DBaaS by attackers. It’s a newcomer to our 2013 ‘Black Cloud on the Horizon’ trend

Page 44: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

#5 – Commercial Malware for Data Centers

44

Page 45: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Advanced Threat – State Sponsored

45

Stuxnet • Manual

intelligence • Advanced

malware attack

Doqu • Automatic intelligence

Rocra • Both • See

Red October: The Hunt For the Data

Page 46: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Growing Criminal Interest

46

Page 47: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Growing Criminal Interest

47

Page 48: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Growing Criminal Interest

48

Page 49: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Commercialization of Military Technologies

49

§ Advanced threat malware capabilities flow into criminal malware •  Technology – modular code, two tier C&C, include data access

and handling code •  Target – enterprise internals

§ Examples •  Narilam – destroys business application databases •  Malware targeting business application (SAP) spotted

Page 50: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Built-in Database Access

50

§ Our december 2013 HII shows commercial malware using DBaaS as infrastructure

§ Data store accessing capabilities §  Mevade – using an integrated services language based on SQL, called

WQL (SQL for Windows Management Interface) to query the target system's database to learn the security settings.

§  Shylock – SQLlite - Any messages that Skype sends are stored in Skype's main.db file, which is a standard SQLite database. Shylock accesses this database and deletes its messages and file transfers so that the user could not find them in the history.

§  Kulouz – SQLlite to access browser data repositories for sensitive information, such as credentials

§  Database access malware was used in SK Comms data breach

Page 51: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

2014 Forecast: Datacenter is the Goal

51

§ We are the tipping point and in 2014 we will see active automated attacks against enterprise data centers •  Infection methods are more effective than ever •  Malware infrastructure is mature and ready •  Criminal use cases are staring to show up

§ We expect business applications to become first class target for criminals •  Easier to manipulate •  The internal version of “web application attacks”

Page 52: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Summary and Conclusion

52

Page 53: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Summary

53

§ Our five trends for 2014 •  3rd party vulnerability exploit – bigger, stronger, faster •  Web server compromise – alternative to APT •  Ad network infections – more targeted, mobile oriented •  Cloud breaches – sharp rise in actual incidents •  Commercial malware – criminals are after your data center

§ Attackers focus their attention on getting into the data center – physical or virtual

§ Attackers prefer to use the front door (web servers) but at the same time are constantly improving on the alternatives (malware and infection methods)

Page 54: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Recommendations

54

§ Protect your front door protection •  Web Application Firewalls are not “nice to have” •  SDLC and patching fail in modern software and threat

environments

§  Improve your internal DATA controls •  Enhance visibility to data access, both structured and

unstructured •  Introduce capabilities to detect abusive access to data center

resources

§ Evaluate solutions for your cloud data repositories •  Perform better due diligence of providers

Page 55: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Bottom Line

55

§ Balance your security budget to reflect the need for more data protection over end-point and network perimeter protection

Page 56: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

Webinar Materials

56

Post-Webinar Discussions

Answers to Attendee

Questions

Webinar Recording Link Join Group

Join Imperva LinkedIn Group, Imperva Data Security Direct, for…

Page 57: Top Security Trends for 2014

© 2013 Imperva, Inc. All rights reserved.

www.imperva.com

57