Introduction to Cyber Threats: current status, perspectives and - - PDF document

introduction to cyber threats current status perspectives
SMART_READER_LITE
LIVE PREVIEW

Introduction to Cyber Threats: current status, perspectives and - - PDF document

Introduction to Cyber Threats: current status, perspectives and reflects in Brazil Adriano Mauro Cansian Agenda New Cybernetic Global Order Cyber threats. The present and future threat scenarios. The scenario in Brazil. Final


slide-1
SLIDE 1

1

Introduction to Cyber Threats: current status, perspectives and reflects in Brazil Adriano Mauro Cansian Agenda

  • New Cybernetic Global Order
  • Cyber threats.
  • The present and future threat scenarios.
  • The scenario in Brazil.
  • Final Considerations.

2

slide-2
SLIDE 2

2

Intro

  • This is about:

– IT governance. – Strategy. – Preparation

  • I mean, this is about geopolitics.

3

Contemporaneidade

4

“Few if any contemporary computer security controls have prevented a [red team] from easily accessing any information sought.”

“The almost obsessive persistence of serious penetrators is astonishing.”

“Espionage over networks can be cost-efficient, offer nearly immediate results, and target specific locations ... insulated from risks of internationally embarrassing incidents” “The market does not work well enough to raise the security of computer systems at a rate fast enough to match the apparent growth in threats to systems. “

2013 2012 2010 2009

slide-3
SLIDE 3

3

Contemporaneidade

5

“Few if any contemporary computer security controls have prevented a [red team] from easily accessing any information sought.”

“The almost obsessive persistence of serious penetrators is astonishing.”

“Espionage over networks can be cost-efficient, offer nearly immediate results, and target specific locations ... insulated from risks of internationally embarrassing incidents” “The market does not work well enough to raise the security of computer systems at a rate fast enough to match the apparent growth in threats to systems. “

2013 2012 2010 2009

Contemporaneidade

6

1979

“Few if any contemporary computer security controls have prevented a [red team] from easily accessing any information sought.”

1988 “The almost obsessive persistence of serious

penetrators is astonishing.”

1988

“Espionage over networks can be cost-efficient, offer nearly immediate results, and target specific locations ... insulated from risks of internationally embarrassing incidents”

1991

“The market does not work well enough to raise the security of computer systems at a rate fast enough to match the apparent growth in threats to systems. “

slide-4
SLIDE 4

4

7 8

Fotos crédito: “Rising from the Underground: - By Damien Thorn Originally appeared in Nuts & Volts Magazine, March 1994.

slide-5
SLIDE 5

5

1984

Lex Luthor (Vincent Louis Gelormine)

– “Legion of Doom” (LoD)

Phiber Optik (Mark Abene) Erik Bloodaxe (Chris Goggans)

– “Masters of Deception” (MoD).

1984 ~ 1991

1990

AT&T Outage

15 jan 1990

  • Operation Sundevil
  • 15 cities USA.

– 9 may 1990. – Strikes LoD & MoD.

slide-6
SLIDE 6

6

1998

29 Dec 1998

Legions of the Underground (LoU) declares a cybernetic war against Iraq and China.

1998

12

slide-7
SLIDE 7

7

1998

7 Aug 1998

Dar es Salaam (Tanzania) Nairobi (Kenya)

1999

7 jan 1999 – http://bit.ly/Hqp9Oq

LoU’s decive.

slide-8
SLIDE 8

8

….

“ The signatories to this statement are asking hackers to reject all actions that seek to damage the information infrastructure of any country. DO NOT support any acts of "Cyberwar”. Keep the networks

  • f communication alive. They are the nervous system

for human progress.”

Signed (07-Jan-1999): 2600 http://www.2600.com/ Chaos Computer Club http://www.ccc.de/ Cult of the Dead Cow http://www.cultdeadcow.com/ !Hispahack http://hispahack.ccc.de/ L0pht http://www.l0pht.com/ Phrack http://www.phrack.com/ Pulhas http://p.ulh.as/ Toxyn http://www.toxyn.org/ Several members of the Dutch Hackers Community (contact Rop Gonggrijp, rop@xs4all.nl)

Seven Cyber { conflicts; events; facts }

  • 1. Cuckoo’s Egg (1986)
  • 2. Morris Worm (1988)
  • 3. Eligible Receiver and Solar Sunrise (1997, 1998)
  • 4. Moonlight Maze (2000+)
  • 5. Buckshot Yankee (2008)
  • 6. Operation Aurora (2009)
  • 7. Stuxnet (2009)

16

slide-9
SLIDE 9

9

Cuckoo’s Egg (1986)

17

Cuckoo’s Egg (1986)

  • Clifford Stoll

– Lawrence Berkeley National Lab (CA)

  • Tracks and hunts Markus Hess.

– West Germany – Hanover

  • Hess had been engaged for some years in

selling the results of his hacking to the KGB.

  • Only DoJ paid attention
  • http://en.wikipedia.org/wiki/The_Cuckoo's_Egg

18

slide-10
SLIDE 10

10

Morris Worm (1988)

  • Robert T. Morris Jr.

– Cornell University – Hints 6.000 hosts on ARPANET. – 1o. Internet Worm.

– http://en.wikipedia.org/wiki/Morris_worm

19

Eligible Receiver (1997)

  • An U.S. Govmt. NIEX

– No-Notice Interoperability Exercise Program

  • Red Team gains root access to over 36

government networks.

– U.S. Pacific Command computer systems as well as power grids and 911 systems in nine major U.S. Cities

  • http://en.wikipedia.org/wiki/Eligible_Receiver_97

20

slide-11
SLIDE 11

11

Solar Sunrise (1988)

  • February 1998: US DoD networks were attacked using

a well-known vulnerability in UNIX-based computer system.

  • The attackers probed servers to see if the vulnerability

existed.

– Exploited the vulnerability and entered the system; planted a program to gather data; and then returned later to collec that. – 2 California High School students were arrested and pled guilty. – Their mentor, an 18 year-old Israeli, was also arrested and indicted. – http://en.wikipedia.org/wiki/Ehud_Tenenbaum

21

Moonlight Maze (1998 - …)

  • U.S. officials accidentally discovered a

pattern of probing of computer systems at The Pentagon, NASA, US Dept. of Energy, private universities, and research labs that.

  • Had begun in March 1998 and had been

going on for nearly two years.

  • http://en.wikipedia.org/wiki/Moonlight_Maze

22

slide-12
SLIDE 12

12

Buckshot Yankee (2008)

  • USB flash drive infected by a foreign

intelligence agency was left in the parking lot of a Department of Defense facility at a base in the Middle East.

  • Laptop computer that was attached to United

States Central Command.

  • http://en.wikipedia.org/wiki/2008_cyberattack_on_United_State

23

Operation Aurora (2009)

  • Cyber attack conducted by advanced

persistent threats such as the Elderwood Group based in Beijing, China, with ties to the People's Liberation Army.

– The attack began in mid-2009 and continued through December 2009.

  • http://en.wikipedia.org/wiki/Operation_Aurora

24

slide-13
SLIDE 13

13

Stuxnet (2009)

  • Designed to attack Siemens software

running on a Windows OS.

  • Stuxnet almost ruined one-fifth of the

Iranian nuclear centrifuge by spinning

  • ut of control while simultaneously

replaying the recorded system.

  • We will see this in details, following...

25

New Cybernetic Global Order

26

slide-14
SLIDE 14

14

New Cybernetic Global Order

  • Since early 2008 we had some important

events that changed the way we deal with and understand cyber threats:

– Conficker (2008/2009) – Stuxnet (2010) – DuQu (2011) – Flame (2012)

27

New Cybernetic Global Order

28

slide-15
SLIDE 15

15

The Waters Divided

29

2001

2010

2011 … 2012…

How and when the things started changing

The Waters Divided

30

2001

2010

2011 … 2012…

The first turning point

slide-16
SLIDE 16

16

Before 2001…

  • Hacking was just accessible to small

groups.

  • Ideology, knowledge and way of life of

technical community, geeks, academy…

– It was very restrict. – It was little about money and profit.

  • It was more about activism and curiosity.

– But it was changing…

31

  • 2001 is the first turning point in Brazil.
  • December 2001: first integrated banking

malware system.

  • Criminals also used an intricate net of

both: hacked accounts and people. Why 2001 ?

32

slide-17
SLIDE 17

17

2001 web bank malware

  • The malware had little sophistication.

– But laundering and crime process was quite complex.

  • Tracking laundered money was very difficult.
  • Law enforcement had small resources.

– The gang started operating in the city of Parauapebas in Pará State.

  • It was the first time we saw organized crime
  • perating over the Internet in Brazil.

33

First counter operations in Brazil

  • After these Paraupebas events, they

spread all over the country.

  • First operations by law enforcement

against organized cybercrime in Brazil:

– Operation Cash Net (2001), – Operation Cavalo de Tróia I (2003), – Operation Cavalo de Tróia II (2004), – Operation Pegasus e Pegasus II (2005).

34

slide-18
SLIDE 18

18

About 10 years without anything really new

  • This scenario continued by almost 10 years,

– Steadily increasing criminal activities.

  • The Internet security scenario was the same

around the world:

– the more money comes into the net, more criminal activities.

  • But, until there, it was only about money…

35

The Waters Divided

36

2001

2010

2011 … 2012…

The 2nd turning point

slide-19
SLIDE 19

19

What changed around 2010 ? The end of “announced death”

  • Until around 2010, when a serious security

problem appears (like a worldwide worm attack) it was always a announced death.

– It means: the security community had already warned about the problem, and the vulnerability had been previously and openly disclosed, i.e. a “zero day” was announced.

  • It’s something like: “Hei, I warned you!”

37

So, what did change? A lot of things changed through the 2000- 2010 decade.

Simple: There are no more warnings!

  • But not only this…

– To discuss the new scenario, let’s use Stuxnet malware, as an example to show the waters division and the change point.

38

slide-20
SLIDE 20

20

Stuxnet

  • Stuxnet is a highly sophisticated computer worm.

– Discovered in June 2010.

Stuxnet initially spreads using MS Windows and targets Siemens SCADA industrial software and equipment.

  • While it is not the first time that hackers have

targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems.

39

Stuxnet vs Iran

  • Different variants of Stuxnet targeted

five Iranian organizations.

  • Targets: Iran’s uranium enrichment

infrastructure.

40

slide-21
SLIDE 21

21

41

Iranian president Mahmoud Ahmadinejad visits uranium enrichment facilities in 2008.

Picture taken on April 8, 2008. REUTERS / Presidential official website/Handout (IRAN).

42

slide-22
SLIDE 22

22

Stuxnet inovations (1)

  • Stuxnet attacked Windows systems using

an unprecedented 4 undocumented vulnerabilities.

– Known as “zero-day exploits”.

Using four zero-day exploits is unusual, as they are valued.

– Attackers had never seen using more than

  • ne zero-day in same worm.

43

Stuxnet inovations (2)

  • Stuxnet is written in several

different programming languages.

  • It’s is also very rare for malwares.

– A PLC with malicious code.

44

slide-23
SLIDE 23

23

Stuxnet inovations (3) - The PLC rootkit

  • The more malevolent and intriguing parts
  • f the Stuxnet is the PLC rootkit and its

ability to control real-life physical systems.

The attackers are capable of injecting code into industrial control systems and hiding that code from the designers and operators.

It gives the attackers full control over the day-to-day functionality of the physical system under attack.

45

Unnoticed threats

  • Heretofore we know what will

happen. – Now it’s surprise.

Experts initially estimated Stuxnet started spreading around March or April 2010.

  • But the first variant of the worm

appeared in June 2009, unnoticed.

  • (see next slide – updated)

46

slide-24
SLIDE 24

24

47

Update - http://shar.es/jAdrD

Remembering Conficker

Conficker, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008.

– It uses flaws in Windows software and dictionary attacks on administrator passwords to propagate while forming a botnet. – It’s unusually difficult to counter because of its combined use of many advanced malware techniques.

Conficker infected millions of computers in over 200 countries, making it the largest known computer worm infection since the 2003.

48

slide-25
SLIDE 25

25

Stuxnet & Conficker

49

Stuxnet also exploited a Microsoft's Windows bug patched in 2008.

  • That bug was the same vulnerability used

to devastating effect by the notorious Conficker worm in late 2008. So, nowadays it’s possible to assure that Conficker was a testbed to Stuxnet. After Stuxnet

  • Conficker (2008/2009)
  • Stuxnet (2010)
  • DuQu (2011)
  • Flame (2012)

50

Time

slide-26
SLIDE 26

26

Duqu

  • The payload of Duqu is quite different from

Stuxnet.

– As we saw, Stuxnet was designed to sabotage industrial control systems.

  • But Duqu provides remote command and

control capabilities, and sophisticated keylogging and spying tools.

– It seems to be intended to infiltrate and gather sensitive information. – Possibly for use in a future attack of another kind.

51 52

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file

  • again. If the red x still appears, you may have to delete the image and then insert it again.

http://www.pcworld.com/article/242114/duqu_new_malware_is_stuxnet_2.html

"Stuxnet and Duqu Part of Larger Cybermalware Campaign"

slide-27
SLIDE 27

27

Flame: the tool “after” DuQu (1)

  • Flame is a very large attack toolkit with many

individual modules. It can perform a variety of malicious actions, most of which are related to data theft and cyberespionage.

  • Some parts of Flame were written in LUA, a

programming language that's highly uncommon for malware development.

– LUA is often used in the computer gaming industry.

53

Flame: the tool “after” DuQu (2)

  • Following same Stuxnet model, the Flame is very

complex. Its creators used domain names registered with fake names to communicate with infected computers in the Middle East for at least four years ago (24 domains registered since 2008).

  • And Flame was able to spread to new networks by

using a spoofed Microsoft digital certificate.

– A technique used by Stuxnet, using a sophisticated cryptographic attack method.

54

slide-28
SLIDE 28

28

55

http://bit.ly/QWQexh

Shared code indicates Flame and Stuxnet creators worked together

  • By the time Stuxnet was created (January ~ June 2009)

(2007 ??), the Flame platform already existed.

– Date its creation is supposed summer 2008, and already it had modular structure.

The Stuxnet code of 2009 used a module built on the Flame platform.

– Probably created specifically to operate as part of Stuxnet.

  • Apparently, after 2009, the evolution of the Flame

platform continued independently from Stuxnet.

56

slide-29
SLIDE 29

29

You got the idea:

  • Stuxnet, DuQu and Flame changed the

Cybersecurity Landscape.

– Complex code. – Using undocumented vulnerabilities. – Coordinated actions & long preparation. – Spreading quietly times ago. – Lots of investment and knowledge. – Developed by well-financed team(s).

57

Were we are:

  • New Cybernetic Global Order
  • Cyber threats.
  • The present and future threat scenarios.
  • The scenario in Brazil.
  • Final Considerations.

58

slide-30
SLIDE 30

30

Since is understood there are new threads, let’s understand how to see the new scenario

59

What is needed in order to a cyber attack?

60

Vulnerability(ies)

Access Payload

slide-31
SLIDE 31

31

Vulnerabilities are related to:

61

Hardware; Software; Peopleware; Access are related to:

62

Configuration; Communication channels; Media operators; Financial support;

  • etc. ... etc. ... etc. ...
slide-32
SLIDE 32

32

Payload related to:

63

… the load effect of an attack that has been delivered to a target.

A cyber attack payload elements :

Direct (or immediate). Indirect.

64

It is usual that direct target is not the primary objective.

slide-33
SLIDE 33

33

Elements of an indirect cyberattack. The indirect effects are, most often, the main objective of a cyber attack.

  • Usually they are not reversible.

– Example: an attack over a software running

  • n power generator can incapacitate the

appliance forever.

  • The software is the direct element, but the

target is the generator.

  • Damaging the generator is the indirect effect.

65

The analysis of a cyber attack

66

slide-34
SLIDE 34

34

The analysis of a cyber attack:

Attribution. Intent.

67

If possible, should be based on:

Attribution

  • Efforts to identify the source

responsible for a cyber attack;

– The goal is to assign an attack to a source through technical means, based on information provided by the cyber attack itself.

68

slide-35
SLIDE 35

35

The problem with the attribution is…

69

“ bits do not wear uniforms ”

.

Intent

70

Attribution helps to define the intent. HOWEVER ... if the counterparty has no stated intentions, it will be virtually impossible to determine the intent with reliability.

slide-36
SLIDE 36

36

So, the problem really is…

71

Determining intent and attribution are often complicated and improperly biased, by lack of information.

Were we are:

  • New Cybernetic Global Order
  • Cyber threats.
  • The present and future threat scenarios.
  • The scenario in Brazil.
  • Final Considerations.

72

slide-37
SLIDE 37

37

The threat scenarios What are the most important and challenger threats related to technological developments

73

Technological developments and threats:

74

Cloud computing: Ten out of ten biggest problems in the security area include cloud computing.

http://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf

slide-38
SLIDE 38

38

Technological developments and threats:

75

slide-39
SLIDE 39

39

Mas a Internet não foi feita pra isso!

Technological developments and threats:

78

  • Social networking has opened up new

doorways for cyber-crime and cyberspionage.

  • Many people on social networks are

completely new to technology and totally ignorant about online self security.

Social Media Usage Increases Risk of Malware

slide-40
SLIDE 40

40

The threat scenarios

  • Then, in short, for now and the near

future we should be aware of:

– Cloud computing. – IoT. – Social Networks (People & Systems).

79

Were we are:

  • New Cybernetic Global Order
  • Cyber threats.
  • The present and future threat scenarios.
  • The scenario in Brazil.
  • Final Considerations.

80

slide-41
SLIDE 41

41

And how about Brazil ?

81

The scenario in Brazil

  • The scenario of attacks on network and

infrastructure in Brazil is not quite different from the rest of the world.

  • The systems and infrastructure in Brazil

has been ”pooked “ all the time.

  • The problem is that, in general, Brazil is

fewer prepared to react.

82

slide-42
SLIDE 42

42

June 2011 attacks over Brazil

  • In June/2011 the service interruption of

government websites and the disclosure

  • f the supposedly personal data of top-

ranking politicians claimed by hacking group LulzSec is part of a string of cyber attacks that have taken place in Brazil.

– This is considered the largest cyber offensive in Brazilian history.

83

Brazil concerns

  • June attacks drew attention to the risks of

cyber attacks on Brazil critical infrastructures.

84

slide-43
SLIDE 43

43

Brazil CDCiber unit - 2011

  • In 2011 Brazilian government launched a

cyber defense unit staffed by the Armed Forces to protect the country’s critical infrastructure and enable the mitigation of cyber attacks.

– Running by the Institutional Security Office (GSI), the body responsible for security measures in Brazil public federal administration.

85

But…

  • In February 2012 McAfee and European

Security and Defence Agenda (SDA) released their Global Cyber Defense Report.

– The report examines the current state of cyber-preparedness around the world – It was created to help governments and

  • rganizations understand how their cyber

defense compares to other countries and

  • rganizations.

86

slide-44
SLIDE 44

44

But…

  • Regarding this report, Brazil is almost at

the bottom of the international league for cybersecurity, ranked alongside Romania and India, with Mexico being the only major country to be even worse.

– In short: Brazil does not have the IT security it needs.

87

Agenda

  • New Cybernetic Global Order
  • Cyber threats.
  • The present and future threat scenarios.
  • The scenario in Brazil.
  • Final Considerations.

88

slide-45
SLIDE 45

45

Final Considerations

89

Considerations

  • Cybersecurity is in complex issue with

many ramifications;

– We must have a holistic vision.

  • Analysis should consider the multiplicity
  • f knowledge areas.
  • Its is a group effort: it can not be seen

as single player responsibility.

90

slide-46
SLIDE 46

46

Considerations

  • Cyberthreats are much more than just an

issue of defense.

  • It is a matter which depends on

integrated inter-relationships among the areas of critical infrastructure constituents in a country.

91

adriano@acmesecurity.org

92