webinar ppt on cyber attacks on erp systems and sap security

55
iViZ - Guest Webinar Series Hosted By: Bikash Barai, (CEO & Co-Founder, iViZ Security) Guest Speaker: Alexander Polyakov, (CTO & Co-Founder, ERP Scan) Hosted By: Guest Speaker: 1 Alexander Polyakov (CTO & Co-Founder, ERP Scan) Bikash Barai (CEO & Co-Founder, iViZ Security) Cyber Attacks on ERP Systems and SAP Security

Upload: iviz-techno-solutions

Post on 23-Jan-2015

486 views

Category:

Technology


1 download

DESCRIPTION

This Presentation explains about 1. High level statistics of vulnerabilities in ERP systems 2. ERP Trojans and overview of Shiz remote access trojan (RAT) 3. Overview on security strategies for ERP systems

TRANSCRIPT

Page 1: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Hosted By: Bikash Barai, (CEO & Co-Founder, iViZ Security)

Guest Speaker: Alexander Polyakov, (CTO & Co-Founder, ERP Scan)

Hosted By:

Guest Speaker:

1

Alexander Polyakov(CTO & Co-Founder, ERP Scan)

Bikash Barai(CEO & Co-Founder, iViZ Security)

Cyber Attacks on ERP Systems and SAP Security

Page 2: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series2

If I Want a Perfect Cyberweapon I'll Target ERP

Alexander PolyakovCTO

ERPScan

Page 3: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Alexander Polyakov

• CTO of the ERPScan company• EAS-SEC.org project leader • Business application security expert• R&D Professional of the year by Network Product Guide• Organizer of ZeroNights conference

[email protected]: @sh2kerr

3

Page 4: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Intro

• I hate “CYBER” talks and this buzz • I usually do more technical presentations• But I we talk about it why do we skip this area?• I’m about Business Applications and ERP systems

4

Page 5: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Agenda

Вставьте рисунок на слайд, скруглите верхний левый и нижний правый угол (Формат – Формат рисунка), добавьте контур (оранжевый, толщина – 3)

5

• Intro• Big companies and critical systems• What was happen• How easy is that• What can happen• Forensics• What we can do• Conclusions

Page 6: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Big companies

• Oil and Gas• Manufacturing• Logistics• Financials• Nuclear• Retail• Telecommunication• etc

6

Page 7: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

How do they look like

7

Portal

HRLogistics

Warehouse

ERP

Billing

SuppliersCustomers

BanksInsurancePartners

Branches

BI

Industry

CRM

SRM

Page 8: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

If business applications are popular?

SAP• More than 246000 customers worldwide • 86% of Forbes 500Oracle• 100% of Fortune 100Microsoft• More than 300,000 businesses worldwide choose Microsoft

Dynamics ERP and CRM software

8

Page 9: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

What can happen

• Espionage– Stealing financial information– Stealing corporate secrets– Stealing supplier and customer lists– Stealing HR data

• Sabotage– Denial of service– Modification of financial reports– Access to technology network (SCADA) by trust relations

• Fraud– False transactions– Modification of master data

9

Page 10: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Autocad virus (Industrial espionage)

• Autocad virus• Stealing critical documents• Send them potentially to china– http://www.telegraph.co.uk/technology/news/9346734/Espio

nage-virus-sent-blueprints-to-China.html

10

Page 11: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Peoplesoft vulnerabilities (Sabotage)

• Presented on BlackHat USA• Old and New issues• Old one was a buffer overflow in a login page• Over 500 systems can be found by Googling• New issues were from information disclose to unauthorized

system access• Potential to steal 20mil customer data

11

Page 12: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

US Department of Energy Breach

• Sabotage• Real example of stealing • 14000 of records

• Target: HR system (Maybe Peoplesoft)• unauthorized disclosure of federal employee Personally

Identifiable Information

12

Page 13: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Istanbul Provincial Administration

• Unauthorized disclosure of federal employee Personally Identifiable Information

• Erase people debts

13

Page 14: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Potential Anonymous attack

14

Now, it adds, “We gained full access to the Greek Ministry of Finance. Those funky IBM servers don't look so safe now, do they...” Anonymous claims to have a “sweet 0day SAP exploit”, and the group intends to “sploit the hell out of it.”

* This attack has not been confirmed by the customer nor by the police authorities in Greece investigating the case. SAP does not have any indication that it happened.

Page 15: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Fraud

• Invoice company for a greater number of hours than worked• Ghost employees of the vendor• Vendor employees billed at amounts higher than contract rate• Vendor employees billed at higher job classification than actual work performed (skilled vs.

non-skilled labor rates)• Invoice company for incorrect equipment or materials charges• Vendor charges for equipment not needed or used for the job performed• Vendor charges for materials not used or materials are for the personal benefit of company

employee• Vendor charges for equipment or material at higher prices than allowed by the contract• Invoice company incorrectly for other services• Vendor charges for services performed where work is not subject to audit clause• Vendor charges include material purchases from or for work performed by related

companies at inflated priceshttp://www.padgett-cpa.com/insights/articles/fraud-risks-oil-and-gas-industry

15

Page 16: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Fraud

• The Association of Certified Fraud Examiners (ACFE) survey showed that U.S. organizations lose an estimated 7% of annual revenues to fraud.

• Real examples that we met:– Salary modification– Material management fraud– Mistaken transactions

16

Page 17: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Fraud

• PWC Survey: 3000 org in 54 countries – 30%were victims of economic crime in prev 12 month

• Average loss per organization for fraud $500k + collateral damage• asset misappropriation -83%• accounting fraud – 33%

17

Page 18: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Internet-Trading virus (Fraud)

• Internet-Trading virus (Fraud)– Ranbys modification for QUIK– troyan-spy.win32.broker.j. for QUIK (stealing keys)– http://www.welivesecurity.com/2012/12/19/win32spy-ranbyu

s-modifying-java-code-in-rbs/– http://www.securitylab.ru/news/439695.php

18

Page 19: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Project Mayhem (Fraud)

• hacker could manipulate financial data and change entries to move funds to an outside account. – alter the remittance address on vendor records,– create a new vendor and manual check entry,– change general ledger accounting records,– increase customer credit limit– credit the balance in a customer account in order to get a

refund.

19

Page 20: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Fraud in Oil And Gas

FRAUD and other infractions in Nigeria’s critical oil and gas industry are enough to derail any stable economy, going by the report of the Petroleum Revenue Special Task Force by a former chairman of the Economic and Financial Crimes Commission (EFCC), Mallam Nuhu Ribadu.

20

Page 21: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

what can happen

21

Page 22: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Ho to make it more “Cyber/Danger”

• Breach + Worm• Multiple attacks on same type• Against one country

22

Page 23: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

What can be next?

• Just imagine what could be done by breaking:• One ERP system• All Business applications of a company• All ERP Systems on particular country

23

Page 24: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

How Easy is That

24

Page 25: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Ease of development

• Price of vulnerability is low• Patching is nightmare• Vaporization is easy• Interconnection is high• Availability via internet

25

Page 26: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Price of vulnerability

• Price for typical vulnerabilities in flash and browsers going higher.• Security of applications and OS is growing• It is much easier to find architecture issue in ERP • 2000 vulnerabilities closed only by SAP during 3 years• And this issue will work for years

26

Page 27: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

SAP Security notes by year

2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 20130

100

200

300

400

500

600

700

800

900

27

More than 2600 in total

Page 28: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Patching is nightmare

• You need to stop business process• Sometimes you need to update multiple parts• Examples of huge architectural issues from:– Microsoft Dynamics– Oracle JDE – SAP SDM

28

Page 29: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Microsoft Dynamics authentication

• Dynamics security – only visual restrictions of the fat client• All users have the rights to the companies’ databases • The only obstruction: impossible to connect to the SQL server

directly• Reverse engineering to understand the password “encryption”

algorithm• Create a tool• Every user can became Administrator• NO PATCH! Only new architecture can help (but there is no such)

29

Page 30: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Oracle JD Edwards authentication

• All the security of JD Edwards relies on the visual restrictions of the fat client

• In fact, all users have the rights to the companies data because client connected using special account JDE

• Then depending on user and password security is checking on Fat client

• User can connect directly to database using JDE account and modify his rights on table level

• Every user can became Administrator• NO PATCH! Only move to 3-tier architecture

30

Page 31: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

SAP SDM authentication

• Authentication is done by providing hash of password• It means that it is possible to do PassTheHash• First of all hash can be simply sniffed so it is like authenticating

using clear password.• Secondly hashes are stored in OS file so they can be accessed by

using other vulnerabilities.• After getting a hash it is possible to upload any backdoor into SAP• To patch it you need to modify client and server at one time. • Install SAP Note 1724516

31

Page 32: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Demo

32

Page 33: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

SAP LogViewer standalone

35%

23%

19%

11%

6% 5%

NetWeaver ABAP versions by popular-ity

7.0 EHP 0 (Nov 2005)7.0 EHP 2 (Apr 2010) 7.0 EHP 1 (Oct 2008)7.3 (Jun 2011)6.2 (Dec 2003)6.4 (Mar 2004)

33

The most popular release (35%, previously 45%) is still NetWeaver 7.0, and it was

released in 2005!

Page 34: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Special payload is not needed

• Remember Verb Tampering User creation• Just one request and you inside the system• Second request and you are admin• Then you can do whatever u want with simple HTTP requests• If it is only technical system you can jump to connected system

34

Page 35: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Systems are highly connected

• Systems are highly connected with each other by trust relationship

• Even between companies they are connected by ESB systems• Remember also SSRF? • http://cwe.mitre.org/data/definitions/918.html• Second place in Top 10 web application techniques 2012• Allows to bypass firewall restrictions and directly connect to

protected systems via connected systems

35

Page 36: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Business applications on the Internet

• Companies have Portals, SRMs, CRMs remotely accessible• Companies connect different offices by ESB• SAP users are connected to SAP via SAPRouter• Administrators open management interfaces to the Internet for

remote control

36

Page 37: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Business applications on the Internet

SAP HTTP Services can be easily found on the Internet:• inurl:/irj/portal • inurl:/IciEventService sap• inurl:/IciEventService/IciEventConf• inurl:/wsnavigator/jsps/test.jsp• inurl:/irj/go/km/docs/

37

Page 38: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Shodan scan

41%

34%

20%6%

SAP NetWeaver J2EE

SAP NetWeaver ABAP

SAP Web Application Server

Other (BusinessObjects,SAP Hosting, etc)

38

SAP NetW

eave

r J2EE

SAP NetW

eave

r ABAP

Total

SAP W

eb Applica

tion Serve

r

Other (Busin

essObjec

ts,SA

P Hosting,

etc)

-80%

-60%

-40%

-20%

0%

20%

40%

60%

80%

100%

120%

94%72%

30%

-20%

-55%

Growth by application server

A total of 3741 server with different SAP web applications were found

Page 39: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

SAP Router

• Special application proxy • Transfers requests from Internet to SAP (and not only)• Can work through VPN or SNC • Almost every company uses it for connecting to SAP to download

updates• Usually listens to port 3299 • Internet accessible (Approximately 5000 IP’s )• http://www.easymarketplace.de/saprouter.php

39

Page 40: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

• Absence of ACL – 15%– Possible to proxy any request to any internal address

• Information disclosure about internal systems – 19%– Denial of service by specifying many connections to any of

the listed SAP servers– Proxy requests to internal network if there is absence of ACL

• Insecure configuration, authentication bypass – 5% • Heap corruption vulnerability – many!

SAP Router: known issues

40

Page 41: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Demo

41

Page 42: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Port scan results

• Are you sure that only the necessary SAP services are exposed to the Internet?

• We were not• In 2011, we ran a global project to scan all of the Internet for SAP

services• It is not completely finished yet, but we have the results for the

top 1000 companies• We were shocked when we saw them first

42

Page 43: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

SecStore.properties

43

SAP HostControl SAP Dispatcher SAP MMC SAP Message Server httpd

SAP Message Server SAP Router0

5

10

15

20

25

30

35

Exposed services 2011

Listed services should not be accessible from the Internet

Page 44: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Why?

Why not many Public examples of breaches if situation is so bad

44

Page 45: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Examples

• Fraud – very popular inside companies but you see only some incidents

• Sabotage – at this moment maybe easies to DDOS then DOS but will see

• Espionage – here what we dont see many, because it is designed to be unseen. You never know how about it especially if you don’t enable logging

45

Page 46: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

SAP Security Forensics

• There is not so many info on public• Companies are not interested in publication of compromise• But main problem is here:– How can you be sure that there were no compromise?– Only 10% of systems have Security Audit Log enabled– Only few of them analyze those logs– And much less do central storage and correlation

* Based on the assessment of over 250 servers of companies that allowed us to share results.

46

Page 47: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Percent of enabled log options

• ICM log icm/HTTP/logging_0 70% • Security audit log in ABAP 10%• Table access logging rec/client 4%• Message Server log ms/audit 2%• SAP Gateway access lo 2%

* Based on the assessment of over 250 servers of companies that allowed us to share results.

47

Page 48: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Weapons

48

Page 49: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Weapons

• DOS for Bank• Fraud oil then manipulate prices and economy • Multiple money transfer fraud

49

Page 50: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

SAP Worm

50erpscan.com

Page 51: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

EAS-SEC

• EAS-SEC: Recourse which combine – Guidelines for assessing enterprise application security– Guidelines for assessing custom code– Surveys about enterprise application security

51

Page 52: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

EAS-SEC Guidelines

• 1.Lack of patch management • 2.Default passwords • 3.Unnecessary enabled functionality• 4.Remotely enabled administrative services • 5.Insecure configuration • 6.Unencrypted communications• 7.Internal access control and SoD • 8. Insecure trust relations • 9. Monitoring of security events

52

Page 53: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Conclusion

53

Regular security assessments

Segregation of duties

Guides

Security assessments

Code review

Continuous Monitoring of all areas

Segregation of duties

Page 54: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Conclusion

Issues are everywherebut the risks

and price for mitigation are

different54

Page 55: Webinar PPT on Cyber Attacks on ERP Systems and SAP Security

iViZ - Guest Webinar Series

Questions?

55