webinar ppt on cyber attacks on erp systems and sap security
DESCRIPTION
This Presentation explains about 1. High level statistics of vulnerabilities in ERP systems 2. ERP Trojans and overview of Shiz remote access trojan (RAT) 3. Overview on security strategies for ERP systemsTRANSCRIPT
iViZ - Guest Webinar Series
Hosted By: Bikash Barai, (CEO & Co-Founder, iViZ Security)
Guest Speaker: Alexander Polyakov, (CTO & Co-Founder, ERP Scan)
Hosted By:
Guest Speaker:
1
Alexander Polyakov(CTO & Co-Founder, ERP Scan)
Bikash Barai(CEO & Co-Founder, iViZ Security)
Cyber Attacks on ERP Systems and SAP Security
iViZ - Guest Webinar Series2
If I Want a Perfect Cyberweapon I'll Target ERP
Alexander PolyakovCTO
ERPScan
iViZ - Guest Webinar Series
Alexander Polyakov
• CTO of the ERPScan company• EAS-SEC.org project leader • Business application security expert• R&D Professional of the year by Network Product Guide• Organizer of ZeroNights conference
[email protected]: @sh2kerr
3
iViZ - Guest Webinar Series
Intro
• I hate “CYBER” talks and this buzz • I usually do more technical presentations• But I we talk about it why do we skip this area?• I’m about Business Applications and ERP systems
4
iViZ - Guest Webinar Series
Agenda
Вставьте рисунок на слайд, скруглите верхний левый и нижний правый угол (Формат – Формат рисунка), добавьте контур (оранжевый, толщина – 3)
5
• Intro• Big companies and critical systems• What was happen• How easy is that• What can happen• Forensics• What we can do• Conclusions
iViZ - Guest Webinar Series
Big companies
• Oil and Gas• Manufacturing• Logistics• Financials• Nuclear• Retail• Telecommunication• etc
6
iViZ - Guest Webinar Series
How do they look like
7
Portal
HRLogistics
Warehouse
ERP
Billing
SuppliersCustomers
BanksInsurancePartners
Branches
BI
Industry
CRM
SRM
iViZ - Guest Webinar Series
If business applications are popular?
SAP• More than 246000 customers worldwide • 86% of Forbes 500Oracle• 100% of Fortune 100Microsoft• More than 300,000 businesses worldwide choose Microsoft
Dynamics ERP and CRM software
8
iViZ - Guest Webinar Series
What can happen
• Espionage– Stealing financial information– Stealing corporate secrets– Stealing supplier and customer lists– Stealing HR data
• Sabotage– Denial of service– Modification of financial reports– Access to technology network (SCADA) by trust relations
• Fraud– False transactions– Modification of master data
9
iViZ - Guest Webinar Series
Autocad virus (Industrial espionage)
• Autocad virus• Stealing critical documents• Send them potentially to china– http://www.telegraph.co.uk/technology/news/9346734/Espio
nage-virus-sent-blueprints-to-China.html
10
iViZ - Guest Webinar Series
Peoplesoft vulnerabilities (Sabotage)
• Presented on BlackHat USA• Old and New issues• Old one was a buffer overflow in a login page• Over 500 systems can be found by Googling• New issues were from information disclose to unauthorized
system access• Potential to steal 20mil customer data
11
iViZ - Guest Webinar Series
US Department of Energy Breach
• Sabotage• Real example of stealing • 14000 of records
• Target: HR system (Maybe Peoplesoft)• unauthorized disclosure of federal employee Personally
Identifiable Information
12
iViZ - Guest Webinar Series
Istanbul Provincial Administration
• Unauthorized disclosure of federal employee Personally Identifiable Information
• Erase people debts
13
iViZ - Guest Webinar Series
Potential Anonymous attack
14
Now, it adds, “We gained full access to the Greek Ministry of Finance. Those funky IBM servers don't look so safe now, do they...” Anonymous claims to have a “sweet 0day SAP exploit”, and the group intends to “sploit the hell out of it.”
* This attack has not been confirmed by the customer nor by the police authorities in Greece investigating the case. SAP does not have any indication that it happened.
iViZ - Guest Webinar Series
Fraud
• Invoice company for a greater number of hours than worked• Ghost employees of the vendor• Vendor employees billed at amounts higher than contract rate• Vendor employees billed at higher job classification than actual work performed (skilled vs.
non-skilled labor rates)• Invoice company for incorrect equipment or materials charges• Vendor charges for equipment not needed or used for the job performed• Vendor charges for materials not used or materials are for the personal benefit of company
employee• Vendor charges for equipment or material at higher prices than allowed by the contract• Invoice company incorrectly for other services• Vendor charges for services performed where work is not subject to audit clause• Vendor charges include material purchases from or for work performed by related
companies at inflated priceshttp://www.padgett-cpa.com/insights/articles/fraud-risks-oil-and-gas-industry
15
iViZ - Guest Webinar Series
Fraud
• The Association of Certified Fraud Examiners (ACFE) survey showed that U.S. organizations lose an estimated 7% of annual revenues to fraud.
• Real examples that we met:– Salary modification– Material management fraud– Mistaken transactions
16
iViZ - Guest Webinar Series
Fraud
• PWC Survey: 3000 org in 54 countries – 30%were victims of economic crime in prev 12 month
• Average loss per organization for fraud $500k + collateral damage• asset misappropriation -83%• accounting fraud – 33%
17
iViZ - Guest Webinar Series
Internet-Trading virus (Fraud)
• Internet-Trading virus (Fraud)– Ranbys modification for QUIK– troyan-spy.win32.broker.j. for QUIK (stealing keys)– http://www.welivesecurity.com/2012/12/19/win32spy-ranbyu
s-modifying-java-code-in-rbs/– http://www.securitylab.ru/news/439695.php
18
iViZ - Guest Webinar Series
Project Mayhem (Fraud)
• hacker could manipulate financial data and change entries to move funds to an outside account. – alter the remittance address on vendor records,– create a new vendor and manual check entry,– change general ledger accounting records,– increase customer credit limit– credit the balance in a customer account in order to get a
refund.
19
iViZ - Guest Webinar Series
Fraud in Oil And Gas
FRAUD and other infractions in Nigeria’s critical oil and gas industry are enough to derail any stable economy, going by the report of the Petroleum Revenue Special Task Force by a former chairman of the Economic and Financial Crimes Commission (EFCC), Mallam Nuhu Ribadu.
20
iViZ - Guest Webinar Series
what can happen
21
iViZ - Guest Webinar Series
Ho to make it more “Cyber/Danger”
• Breach + Worm• Multiple attacks on same type• Against one country
22
iViZ - Guest Webinar Series
What can be next?
• Just imagine what could be done by breaking:• One ERP system• All Business applications of a company• All ERP Systems on particular country
23
iViZ - Guest Webinar Series
How Easy is That
24
iViZ - Guest Webinar Series
Ease of development
• Price of vulnerability is low• Patching is nightmare• Vaporization is easy• Interconnection is high• Availability via internet
25
iViZ - Guest Webinar Series
Price of vulnerability
• Price for typical vulnerabilities in flash and browsers going higher.• Security of applications and OS is growing• It is much easier to find architecture issue in ERP • 2000 vulnerabilities closed only by SAP during 3 years• And this issue will work for years
26
iViZ - Guest Webinar Series
SAP Security notes by year
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 20130
100
200
300
400
500
600
700
800
900
27
More than 2600 in total
iViZ - Guest Webinar Series
Patching is nightmare
• You need to stop business process• Sometimes you need to update multiple parts• Examples of huge architectural issues from:– Microsoft Dynamics– Oracle JDE – SAP SDM
28
iViZ - Guest Webinar Series
Microsoft Dynamics authentication
• Dynamics security – only visual restrictions of the fat client• All users have the rights to the companies’ databases • The only obstruction: impossible to connect to the SQL server
directly• Reverse engineering to understand the password “encryption”
algorithm• Create a tool• Every user can became Administrator• NO PATCH! Only new architecture can help (but there is no such)
29
iViZ - Guest Webinar Series
Oracle JD Edwards authentication
• All the security of JD Edwards relies on the visual restrictions of the fat client
• In fact, all users have the rights to the companies data because client connected using special account JDE
• Then depending on user and password security is checking on Fat client
• User can connect directly to database using JDE account and modify his rights on table level
• Every user can became Administrator• NO PATCH! Only move to 3-tier architecture
30
iViZ - Guest Webinar Series
SAP SDM authentication
• Authentication is done by providing hash of password• It means that it is possible to do PassTheHash• First of all hash can be simply sniffed so it is like authenticating
using clear password.• Secondly hashes are stored in OS file so they can be accessed by
using other vulnerabilities.• After getting a hash it is possible to upload any backdoor into SAP• To patch it you need to modify client and server at one time. • Install SAP Note 1724516
31
iViZ - Guest Webinar Series
Demo
32
iViZ - Guest Webinar Series
SAP LogViewer standalone
35%
23%
19%
11%
6% 5%
NetWeaver ABAP versions by popular-ity
7.0 EHP 0 (Nov 2005)7.0 EHP 2 (Apr 2010) 7.0 EHP 1 (Oct 2008)7.3 (Jun 2011)6.2 (Dec 2003)6.4 (Mar 2004)
33
The most popular release (35%, previously 45%) is still NetWeaver 7.0, and it was
released in 2005!
iViZ - Guest Webinar Series
Special payload is not needed
• Remember Verb Tampering User creation• Just one request and you inside the system• Second request and you are admin• Then you can do whatever u want with simple HTTP requests• If it is only technical system you can jump to connected system
34
iViZ - Guest Webinar Series
Systems are highly connected
• Systems are highly connected with each other by trust relationship
• Even between companies they are connected by ESB systems• Remember also SSRF? • http://cwe.mitre.org/data/definitions/918.html• Second place in Top 10 web application techniques 2012• Allows to bypass firewall restrictions and directly connect to
protected systems via connected systems
35
iViZ - Guest Webinar Series
Business applications on the Internet
• Companies have Portals, SRMs, CRMs remotely accessible• Companies connect different offices by ESB• SAP users are connected to SAP via SAPRouter• Administrators open management interfaces to the Internet for
remote control
36
iViZ - Guest Webinar Series
Business applications on the Internet
SAP HTTP Services can be easily found on the Internet:• inurl:/irj/portal • inurl:/IciEventService sap• inurl:/IciEventService/IciEventConf• inurl:/wsnavigator/jsps/test.jsp• inurl:/irj/go/km/docs/
37
iViZ - Guest Webinar Series
Shodan scan
41%
34%
20%6%
SAP NetWeaver J2EE
SAP NetWeaver ABAP
SAP Web Application Server
Other (BusinessObjects,SAP Hosting, etc)
38
SAP NetW
eave
r J2EE
SAP NetW
eave
r ABAP
Total
SAP W
eb Applica
tion Serve
r
Other (Busin
essObjec
ts,SA
P Hosting,
etc)
-80%
-60%
-40%
-20%
0%
20%
40%
60%
80%
100%
120%
94%72%
30%
-20%
-55%
Growth by application server
A total of 3741 server with different SAP web applications were found
iViZ - Guest Webinar Series
SAP Router
• Special application proxy • Transfers requests from Internet to SAP (and not only)• Can work through VPN or SNC • Almost every company uses it for connecting to SAP to download
updates• Usually listens to port 3299 • Internet accessible (Approximately 5000 IP’s )• http://www.easymarketplace.de/saprouter.php
39
iViZ - Guest Webinar Series
• Absence of ACL – 15%– Possible to proxy any request to any internal address
• Information disclosure about internal systems – 19%– Denial of service by specifying many connections to any of
the listed SAP servers– Proxy requests to internal network if there is absence of ACL
• Insecure configuration, authentication bypass – 5% • Heap corruption vulnerability – many!
SAP Router: known issues
40
iViZ - Guest Webinar Series
Demo
41
iViZ - Guest Webinar Series
Port scan results
• Are you sure that only the necessary SAP services are exposed to the Internet?
• We were not• In 2011, we ran a global project to scan all of the Internet for SAP
services• It is not completely finished yet, but we have the results for the
top 1000 companies• We were shocked when we saw them first
42
iViZ - Guest Webinar Series
SecStore.properties
43
SAP HostControl SAP Dispatcher SAP MMC SAP Message Server httpd
SAP Message Server SAP Router0
5
10
15
20
25
30
35
Exposed services 2011
Listed services should not be accessible from the Internet
iViZ - Guest Webinar Series
Why?
Why not many Public examples of breaches if situation is so bad
44
iViZ - Guest Webinar Series
Examples
• Fraud – very popular inside companies but you see only some incidents
• Sabotage – at this moment maybe easies to DDOS then DOS but will see
• Espionage – here what we dont see many, because it is designed to be unseen. You never know how about it especially if you don’t enable logging
45
iViZ - Guest Webinar Series
SAP Security Forensics
• There is not so many info on public• Companies are not interested in publication of compromise• But main problem is here:– How can you be sure that there were no compromise?– Only 10% of systems have Security Audit Log enabled– Only few of them analyze those logs– And much less do central storage and correlation
* Based on the assessment of over 250 servers of companies that allowed us to share results.
46
iViZ - Guest Webinar Series
Percent of enabled log options
• ICM log icm/HTTP/logging_0 70% • Security audit log in ABAP 10%• Table access logging rec/client 4%• Message Server log ms/audit 2%• SAP Gateway access lo 2%
* Based on the assessment of over 250 servers of companies that allowed us to share results.
47
iViZ - Guest Webinar Series
Weapons
48
iViZ - Guest Webinar Series
Weapons
• DOS for Bank• Fraud oil then manipulate prices and economy • Multiple money transfer fraud
49
iViZ - Guest Webinar Series
SAP Worm
50erpscan.com
iViZ - Guest Webinar Series
EAS-SEC
• EAS-SEC: Recourse which combine – Guidelines for assessing enterprise application security– Guidelines for assessing custom code– Surveys about enterprise application security
51
iViZ - Guest Webinar Series
EAS-SEC Guidelines
• 1.Lack of patch management • 2.Default passwords • 3.Unnecessary enabled functionality• 4.Remotely enabled administrative services • 5.Insecure configuration • 6.Unencrypted communications• 7.Internal access control and SoD • 8. Insecure trust relations • 9. Monitoring of security events
52
iViZ - Guest Webinar Series
Conclusion
53
Regular security assessments
Segregation of duties
Guides
Security assessments
Code review
Continuous Monitoring of all areas
Segregation of duties
iViZ - Guest Webinar Series
Conclusion
Issues are everywherebut the risks
and price for mitigation are
different54
iViZ - Guest Webinar Series
Questions?
55