SlideShare a Scribd company logo
1 of 55
Download to read offline
Cyber Side-Effects:
Cloud Databases and Modern Malware
Amichai Shulman, CTO, Imperva

1

© 2014 Imperva, Inc. All rights reserved.
Agenda
§  Introduction
§  The story of a malware and a database
§  DAMP – Database as a malware platform J
§  Reflections on malware and DB access
§  Reflections on DBaaS and DB vulnerabilities
§  Summary and conclusion
§  Q&A

2

© 2014 Imperva, Inc. All rights reserved.
Amichai Shulman, CTO, Imperva
§  Speaker at Industry Events
•  RSA, Appsec, Info Security UK, Black Hat

§  Lecturer on Information Security
•  Technion - Israel Institute of Technology

§  Former security consultant to banks & financial services
firms
§  Leads the Application Defense Center (ADC)
•  Discovered over 20 commercial application vulnerabilities
§  Credited by Oracle, MS-SQL, IBM and others

Amichai Shulman one of InfoWorld’s “Top 25 CTOs”

3

© 2014 Imperva, Inc. All rights reserved.
HII Reports
§  Hacker Intelligence Initiative (HII) is focused at
understanding how attackers are operating in practice
•  A different approach from vulnerability research

§  Data set composition
•  ~350 real world applications
•  Anonymous proxies

§  More than 30 months of data
§  Powerful analysis system
•  Combines analytic tools with drill down capabilities

4

© 2014 Imperva, Inc. All rights reserved.

Confidential
The Story of a Malware and a Database

5

© 2014 Imperva, Inc. All rights reserved.
Malware Sample
§  Obtained sample in June 2013
•  Phishing email

§  Made in Brazil
§  Uses popular hosting service for Drop and C&C
•  C&C stores functional code and bot management information
•  Drop server stores stolen information

§  Uses local SQLOLEDB provider for database
communication

6

© 2014 Imperva, Inc. All rights reserved.
Malware Sample – Infection Flow
§  Starts with a phishing email
•  Notice of debt from known bank in Brazil
•  “E-mail verified by windows live anti-spam”
•  Link to alleged pdf file (detailing the debt)

7

© 2014 Imperva, Inc. All rights reserved.
Malware Sample – Infection Flow
§  Starts with a phishing email
•  Notice of debt from known bank in Brazil
•  “E-mail verified by windows live anti-spam”
•  Link to alleged pdf file (detailing the debt)

8

© 2014 Imperva, Inc. All rights reserved.
Malware Sample – Infection Flow
§  Link leads to a screen saver file
§  Practically an executable

9

© 2014 Imperva, Inc. All rights reserved.
Follow the Rabbit

10

© 2014 Imperva, Inc. All rights reserved.
Follow the Rabbit
§  MIM “attack” between payload and hosted database
•  Capture negotiation packet
•  Switch from encrypted to plain text
•  Connect with plaintext credentials to hosted DB

11

© 2014 Imperva, Inc. All rights reserved.
Follow the Rabbit
§  MIM “attack” between payload and hosted database
•  Capture negotiation packet
•  Switch from encrypted to plain text
•  Connect with plaintext credentials to hosted DB

12

© 2014 Imperva, Inc. All rights reserved.
Follow the Rabbit
§  After connection is established to DB
•  Malware stub invokes stored procedure “retorna_dados”
(retrieve data)

•  Retrieves 3 binary payloads from table “carrega” (payload)
•  Stub selects one (according to column number)
§  Saves it in %AppData%
§  Names it govision.dll

13

© 2014 Imperva, Inc. All rights reserved.
Follow the Rabbit
§  VirusTotal results for original binary: 30/46
•  Categorized as “banker”

§  Other 2 binaries less “notorious” achieving 4/47 and
10/47

14

© 2014 Imperva, Inc. All rights reserved.
Follow the Rabbit
§  VirusTotal results for original binary: 30/46
•  Categorized as “banker”

§  Other 2 binaries less “notorious” achieving 4/47 and
10/47

15

© 2014 Imperva, Inc. All rights reserved.
Follow the Rabbit
§  2nd stored procedure called “add_avs”
•  Registers new bot agent in the C&C database

16

© 2014 Imperva, Inc. All rights reserved.
Follow the Rabbit
§  2nd stored procedure called “add_avs”
•  Registers new bot agent in the C&C database
•  Identifier (C volume), version, Windows OS, browsers (Explorer
and FireFox), date and some more ambiguous info “ins###”

17

© 2014 Imperva, Inc. All rights reserved.
Jumping Into the Rabbit Hole

18

© 2014 Imperva, Inc. All rights reserved.
Jumping Into the Rabbit Hole
§  Connecting to the DB and collaborating with the service
provider revealed:
•  5 C&C databases and 2 Drop servers
•  C&C grouped by different binaries in “carrega”
§  CC1.db1, CC1.db2, CC1.db3
§  CC2.db1, CC2.db2

•  Drop servers
§  Drop1 – compromised mail accounts
•  Correlated machines from CC1&2 with data in Drop1

§  Drop2 – stolen banking activity information
•  From the same bank in initial phishing email

19

© 2014 Imperva, Inc. All rights reserved.
Jumping Into the Rabbit Hole

20

© 2014 Imperva, Inc. All rights reserved.
C&C Servers
§  Similarities
•  Same table structure
•  Same set of stored procedures
•  Some agents found in multiple tables
§  Due to multiple infections / test machines

•  Binaries (divided to 2 groups)

§  Differences
•  Mostly disjointed sets of agents
•  Names
•  Differences in format of stored data
§  Hyphen instead of parenthesis
§  Version number
21

© 2014 Imperva, Inc. All rights reserved.
C&C Servers

Same machine in all tables

22

© 2014 Imperva, Inc. All rights reserved.
C&C Servers
§  Overall ~350 machines infected between Feb-June 2013

23

© 2014 Imperva, Inc. All rights reserved.
C&C Servers
§  95% of infections occurred between June 3 – June 10
•  Earlier infection perhaps QA tests
•  Attacker ran small simultaneous campaigns – wasn't detected by
anti-spam mechanism

24

© 2014 Imperva, Inc. All rights reserved.
C&C Servers
§  OS distribution
•  54% use old XP OS
•  65.5% enterprise editions

25

© 2014 Imperva, Inc. All rights reserved.
C&C Servers
§  OS distribution
•  54% use old XP OS
•  65.5% enterprise editions

26

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  DROP 1
•  Compromised email accounts
•  SMTP & POP3 servers
•  Contact lists

§  Extracted from Outlook or Outlook express
§  Some “hand picked” accounts were found to be blocked
due to spam
§  From April 10 - June 10, 2013
§  ~600 infected machines & 767 compromised accounts
§  Thousands of stolen contacts

27

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  DROP 1
•  Compromised email accounts
•  SMTP & POP3 servers
•  Contact lists

§  Extracted from Outlook or Outlook express
§  Some “hand picked” accounts were found to be blocked
due to spam
§  From April 10 - June 10, 2013
§  ~600 infected machines & 767 compromised accounts
§  Thousands of stolen contacts

28

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  Drop1 had (only) 7 agents correlated to C&C servers
•  Strengthens the hypothesis that these servers are from the same
family
•  Size of unknown operation much bigger than we had access to
•  Much more C&C servers than Drop servers
§  Infection achieved by multiple small campaigns rather than single large
one
§  Botnet army more resilient to server “takedowns”

29

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  Drop 1 email accounts gives visibility to geographical
distribution
§  Top: Brazil, USA, Argentina, Spain

30

© 2014 Imperva, Inc. All rights reserved.
Drop Servers

31

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  Drop2 contains stolen banking activity
§  Same banking application that was targeted by the
phishing campaign
§  Each record contains
•  Serial number
•  Machine ID
•  Unstructured data
•  Timestamp

§  No machines were correlated with entries in other
databases
§  Over 400 entries from 12 different machines
32

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  Attackers targeted corporate accounts
•  Offer greater financial rewards
•  Bank is dedicated to corporate accounts
•  The bank itself was not breached

§  Timeline between May 17 - June 15, 2013

33

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  Attackers targeted corporate accounts
•  Offer greater financial rewards
•  Bank is dedicated to corporate accounts
•  The bank itself was not breached

§  Timeline between May 17 - June 15, 2013

34

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  Drop2 entries come from 5 different malware versions:
•  118, 126, 127, 128, 129
•  Only one machine “evolved” from 128 to 129

35

© 2014 Imperva, Inc. All rights reserved.
Drop Servers

§  Version entries by date
36

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  Entries in same timeframe contain the same
“CONTROLE” (session) value
§  Entries are a form of stripped HTML pages sent to the
drop server by the malware
§  All accounts are business accounts of small organizations
in Brazil

37

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  Entries in same timeframe contain the same
“CONTROLE” (session) value
§  Entries are a form of stripped HTML pages sent to the
drop server by the malware
§  All accounts are business accounts of small organizations
in Brazil

38

© 2014 Imperva, Inc. All rights reserved.
Drop Servers
§  Entries in same timeframe contain the same
“CONTROLE” (session) value
§  Entries are a form of stripped HTML pages sent to the
drop server by the malware
§  All accounts are business accounts of small organizations
in Brazil

39

© 2014 Imperva, Inc. All rights reserved.
DBaaS as a Malware Service

40

© 2014 Imperva, Inc. All rights reserved.
Database as a Service
§  For legitimate users
•  Easy to setup
•  No maintenance needed

§  For criminals
•  C&C and Drop servers
•  Jeopardize “neighbors”

41

© 2014 Imperva, Inc. All rights reserved.
Database as a Malware Service
§  Cheap and safe playground for hackers
•  Easy to setup
•  Anonymous
•  Affordable

§  Hiding in plain sight
•  Hacker activity is masked with normal activity
•  Difficult to pick up the specific DB used by hacker

§  Resilient
•  Certainly impossible to take down the entire DB machine
•  Impossible to “hijack” C&C DNS
•  IP blacklisting is not possible
42

© 2014 Imperva, Inc. All rights reserved.
Reflections on Malware & DB Access

43

© 2014 Imperva, Inc. All rights reserved.
DB Access by Malware
§  Embedded Code (TrendMICRO report)
§  Packaging DB drivers into modern malware modules
§  Malware access C&C databases
§  Stuxnet manipulating internal database

44

© 2014 Imperva, Inc. All rights reserved.
DB Access by Malware
§  Stuxnet

§  Narilam
•  Updates MSSQL accessible by OLEDB & tamper stored data

§  Kulouz

45

© 2014 Imperva, Inc. All rights reserved.
Reflections on DB Vulnerabilities

46

© 2014 Imperva, Inc. All rights reserved.
DB Vulnerabilities
§  DB vulnerabilities pose small risk to enterprises
§  None of the breaches of past decade involving internal
DB were attributed to vulnerabilities
§  Internal breaches usually carried out by non technical
perpetrators
BUT
§  Hosted databases are exposed to the web
§  “Sitting duck” for criminal hackers

47

© 2014 Imperva, Inc. All rights reserved.
Protocol Layer Vulnerabilities
§  DB protocols are a mess
•  Proprietary, ill documented (to say the least)
•  Designed for internal network use

§  In DBaaS they become web protocols used over public
networks
§  CVE-2013-1899 open source PostgreSQL DB
•  Sample exploit: psql --host 10.1.1.1 --dbname=”-rpg_hab.conf” –
user=”aaaaaaa”
•  DoS of the entire server
•  Catastrophic results in shared environment

48

© 2014 Imperva, Inc. All rights reserved.
Knock Knock Jokes
§  CVSS 2.0 is the standard for computing risk score of a
vulnerability
§  Authentication requirement accounts for 1 point out of 10
§  In a shared DB hosting environment everyone can
authenticate to the DB
§  CVE-2012-5611 MySQL vulnerability
•  Sample exploit: GRANT select ON
MYSQssssssssssssssssssssssssssssssssssssssssssssssssssss
sssssssssssssssssLqqqqaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.* TO ‘user11’@’%’
•  DoS of the entire server

49

© 2014 Imperva, Inc. All rights reserved.
Who Stole My Cheese?

50

© 2014 Imperva, Inc. All rights reserved.
Summary & Conclusion

51

© 2014 Imperva, Inc. All rights reserved.
Summary
§  Attackers continue to show creativity
•  Using cloud DB offering as an alternative to traditional C&C / Drop
servers
•  Harder detection and takedown

§  Commercial malware is gradually becoming more
“database aware”
•  Attackers have the tools to pry into your database
•  Next step: autonomous malware targeting internal databases

§  Shared DB hosting platforms imply higher risk
•  Exposure to protocol layer vulnerabilities
•  Actual vulnerability score is at least 1 point higher

52

© 2014 Imperva, Inc. All rights reserved.
Recommendations
§  It’s all about the data, stupid!
§  While “network” and “end point” hygiene is important,
attackers are ultimately looking for your data
•  In large, modern, enterprise networks – infection is inevitable

§  Enterprise must invest in security layers closer to their
data assets
§  DB service providers (and their customers) must re-asses
risks and invest in virtual patching

53

© 2014 Imperva, Inc. All rights reserved.
Webinar Materials
Join Imperva LinkedIn Group,
Imperva Data Security Direct, for…
Post-Webinar
Discussions

Webinar
Recording Link

54

Answers to
Attendee
Questions

Join Group

© 2014 Imperva, Inc. All rights reserved.
www.imperva.com

55

© 2014 Imperva, Inc. All rights reserved.

More Related Content

What's hot

SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceJason Trost
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowImperva Incapsula
 
Open Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOCOpen Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOCSheetal Dolas
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application SecurityChong-Kuan Chen
 
Zombie DNS
Zombie DNSZombie DNS
Zombie DNSAPNIC
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceImperva Incapsula
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...Hortonworks
 
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programBhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programAPNIC
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1Chong-Kuan Chen
 
Defcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networksDefcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networksPriyanka Aash
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksMedia Perspectives
 
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 editionHadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 editionSteve Loughran
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big DataRommel Garcia
 

What's hot (16)

SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
 
Become a Cloud Security Ninja
Become a Cloud Security NinjaBecome a Cloud Security Ninja
Become a Cloud Security Ninja
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
 
Open Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOCOpen Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOC
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application Security
 
Zombie DNS
Zombie DNSZombie DNS
Zombie DNS
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...
 
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programBhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1
 
Defcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networksDefcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networks
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
 
Supply Chain Attack Backdooring Your Networks
 Supply Chain Attack Backdooring Your Networks   Supply Chain Attack Backdooring Your Networks
Supply Chain Attack Backdooring Your Networks
 
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 editionHadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
 

Viewers also liked

Nippon telegraph and telephone corporation
Nippon telegraph and telephone corporationNippon telegraph and telephone corporation
Nippon telegraph and telephone corporationAjitesh srivastava
 
Morri Eire 2012 Show me the money!
Morri   Eire 2012 Show me the money!Morri   Eire 2012 Show me the money!
Morri Eire 2012 Show me the money!Giacomo Morri
 
Informe semanal Andbank 13 de julio
Informe semanal Andbank 13 de julioInforme semanal Andbank 13 de julio
Informe semanal Andbank 13 de julioAndbank
 
Barnes Group Investor Overview - July 2015
Barnes Group Investor Overview - July 2015Barnes Group Investor Overview - July 2015
Barnes Group Investor Overview - July 2015Barnes_Group
 
fluor annual reports 2005
fluor annual reports 2005fluor annual reports 2005
fluor annual reports 2005finance15
 
Kolors Switches Dynamic User Interface and Product Select
Kolors Switches Dynamic User Interface and Product SelectKolors Switches Dynamic User Interface and Product Select
Kolors Switches Dynamic User Interface and Product SelectSohel Patel
 
Barnes Group Inc. Investor Overview - April 2016
Barnes Group Inc. Investor Overview - April 2016Barnes Group Inc. Investor Overview - April 2016
Barnes Group Inc. Investor Overview - April 2016Terri Chapman
 
HPHT Ultrasonic Solutions by Meggitt Piezo Technologies
HPHT Ultrasonic Solutions by Meggitt Piezo TechnologiesHPHT Ultrasonic Solutions by Meggitt Piezo Technologies
HPHT Ultrasonic Solutions by Meggitt Piezo TechnologiesPiezoEcho
 
북한채권처리의시급성_정연욱
북한채권처리의시급성_정연욱북한채권처리의시급성_정연욱
북한채권처리의시급성_정연욱Yeon Wook Chung
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackImperva
 
BE 500 Index - Dividends and Implied Volatility Surfaces Parameters
 BE 500 Index - Dividends and Implied Volatility Surfaces Parameters BE 500 Index - Dividends and Implied Volatility Surfaces Parameters
BE 500 Index - Dividends and Implied Volatility Surfaces ParametersBCV
 
Databases and Dragons
Databases and DragonsDatabases and Dragons
Databases and DragonsNew Relic
 
Barrier Reverse Convertibles - Swiss Equity Leader Index
Barrier Reverse Convertibles - Swiss Equity Leader IndexBarrier Reverse Convertibles - Swiss Equity Leader Index
Barrier Reverse Convertibles - Swiss Equity Leader IndexBCV
 
Juicing The Return
Juicing The ReturnJuicing The Return
Juicing The ReturnBoyboy cute
 
Climate Leadership 2014 - Report by The Carbon Disclosure Project (CDP)
Climate Leadership 2014 - Report by The Carbon Disclosure Project (CDP)Climate Leadership 2014 - Report by The Carbon Disclosure Project (CDP)
Climate Leadership 2014 - Report by The Carbon Disclosure Project (CDP)Turlough Guerin GAICD FGIA
 
Stoxx 600 index dividends and implied volatility surfaces parameters
Stoxx 600 index   dividends and implied volatility surfaces parametersStoxx 600 index   dividends and implied volatility surfaces parameters
Stoxx 600 index dividends and implied volatility surfaces parametersBCV
 
Apple Inc in 2010 - Case Analysis
Apple Inc in 2010 - Case AnalysisApple Inc in 2010 - Case Analysis
Apple Inc in 2010 - Case AnalysisSIVA PRIYA
 

Viewers also liked (20)

Nippon telegraph and telephone corporation
Nippon telegraph and telephone corporationNippon telegraph and telephone corporation
Nippon telegraph and telephone corporation
 
Morri Eire 2012 Show me the money!
Morri   Eire 2012 Show me the money!Morri   Eire 2012 Show me the money!
Morri Eire 2012 Show me the money!
 
2008 10 payoff magazine
2008 10 payoff magazine2008 10 payoff magazine
2008 10 payoff magazine
 
Informe semanal Andbank 13 de julio
Informe semanal Andbank 13 de julioInforme semanal Andbank 13 de julio
Informe semanal Andbank 13 de julio
 
Barnes Group Investor Overview - July 2015
Barnes Group Investor Overview - July 2015Barnes Group Investor Overview - July 2015
Barnes Group Investor Overview - July 2015
 
fluor annual reports 2005
fluor annual reports 2005fluor annual reports 2005
fluor annual reports 2005
 
Kolors Switches Dynamic User Interface and Product Select
Kolors Switches Dynamic User Interface and Product SelectKolors Switches Dynamic User Interface and Product Select
Kolors Switches Dynamic User Interface and Product Select
 
Barnes Group Inc. Investor Overview - April 2016
Barnes Group Inc. Investor Overview - April 2016Barnes Group Inc. Investor Overview - April 2016
Barnes Group Inc. Investor Overview - April 2016
 
S_150107_BANKIA_JPI2_OVIEDO_ACCIONES
S_150107_BANKIA_JPI2_OVIEDO_ACCIONESS_150107_BANKIA_JPI2_OVIEDO_ACCIONES
S_150107_BANKIA_JPI2_OVIEDO_ACCIONES
 
HPHT Ultrasonic Solutions by Meggitt Piezo Technologies
HPHT Ultrasonic Solutions by Meggitt Piezo TechnologiesHPHT Ultrasonic Solutions by Meggitt Piezo Technologies
HPHT Ultrasonic Solutions by Meggitt Piezo Technologies
 
북한채권처리의시급성_정연욱
북한채권처리의시급성_정연욱북한채권처리의시급성_정연욱
북한채권처리의시급성_정연욱
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
Newsletter IK im Fokus 2/2014
Newsletter IK im Fokus 2/2014Newsletter IK im Fokus 2/2014
Newsletter IK im Fokus 2/2014
 
BE 500 Index - Dividends and Implied Volatility Surfaces Parameters
 BE 500 Index - Dividends and Implied Volatility Surfaces Parameters BE 500 Index - Dividends and Implied Volatility Surfaces Parameters
BE 500 Index - Dividends and Implied Volatility Surfaces Parameters
 
Databases and Dragons
Databases and DragonsDatabases and Dragons
Databases and Dragons
 
Barrier Reverse Convertibles - Swiss Equity Leader Index
Barrier Reverse Convertibles - Swiss Equity Leader IndexBarrier Reverse Convertibles - Swiss Equity Leader Index
Barrier Reverse Convertibles - Swiss Equity Leader Index
 
Juicing The Return
Juicing The ReturnJuicing The Return
Juicing The Return
 
Climate Leadership 2014 - Report by The Carbon Disclosure Project (CDP)
Climate Leadership 2014 - Report by The Carbon Disclosure Project (CDP)Climate Leadership 2014 - Report by The Carbon Disclosure Project (CDP)
Climate Leadership 2014 - Report by The Carbon Disclosure Project (CDP)
 
Stoxx 600 index dividends and implied volatility surfaces parameters
Stoxx 600 index   dividends and implied volatility surfaces parametersStoxx 600 index   dividends and implied volatility surfaces parameters
Stoxx 600 index dividends and implied volatility surfaces parameters
 
Apple Inc in 2010 - Case Analysis
Apple Inc in 2010 - Case AnalysisApple Inc in 2010 - Case Analysis
Apple Inc in 2010 - Case Analysis
 

Similar to Cyber Side-Effects - Cloud Databases and Modern Malware

Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014Imperva
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesImperva
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Niel Dunnage
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackImperva
 
A Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalA Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalImperva
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 sebaSebastien Deleersnyder
 
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
A Profile of the Backoff PoS Malware that Hit 1000+ Retail BusinessesA Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
A Profile of the Backoff PoS Malware that Hit 1000+ Retail BusinessesLastline, Inc.
 
The Non-Advanced Persistent Threat
The Non-Advanced Persistent ThreatThe Non-Advanced Persistent Threat
The Non-Advanced Persistent ThreatImperva
 
Gimme shelter: Tips on protecting proprietary and open source code
Gimme shelter: Tips on protecting proprietary and open source codeGimme shelter: Tips on protecting proprietary and open source code
Gimme shelter: Tips on protecting proprietary and open source codeRogue Wave Software
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeCyren, Inc
 
(Isc)² secure johannesburg
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg Tunde Ogunkoya
 
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017Splunk
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationGeorg Knon
 

Similar to Cyber Side-Effects - Cloud Databases and Modern Malware (20)

Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
 
A Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalA Blueprint for Web Attack Survival
A Blueprint for Web Attack Survival
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
A Profile of the Backoff PoS Malware that Hit 1000+ Retail BusinessesA Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
 
The Non-Advanced Persistent Threat
The Non-Advanced Persistent ThreatThe Non-Advanced Persistent Threat
The Non-Advanced Persistent Threat
 
Gimme shelter: Tips on protecting proprietary and open source code
Gimme shelter: Tips on protecting proprietary and open source codeGimme shelter: Tips on protecting proprietary and open source code
Gimme shelter: Tips on protecting proprietary and open source code
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle Cybercrime
 
(Isc)² secure johannesburg
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg
 
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
 

More from Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 

More from Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Recently uploaded

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Cyber Side-Effects - Cloud Databases and Modern Malware

  • 1. Cyber Side-Effects: Cloud Databases and Modern Malware Amichai Shulman, CTO, Imperva 1 © 2014 Imperva, Inc. All rights reserved.
  • 2. Agenda §  Introduction §  The story of a malware and a database §  DAMP – Database as a malware platform J §  Reflections on malware and DB access §  Reflections on DBaaS and DB vulnerabilities §  Summary and conclusion §  Q&A 2 © 2014 Imperva, Inc. All rights reserved.
  • 3. Amichai Shulman, CTO, Imperva §  Speaker at Industry Events •  RSA, Appsec, Info Security UK, Black Hat §  Lecturer on Information Security •  Technion - Israel Institute of Technology §  Former security consultant to banks & financial services firms §  Leads the Application Defense Center (ADC) •  Discovered over 20 commercial application vulnerabilities §  Credited by Oracle, MS-SQL, IBM and others Amichai Shulman one of InfoWorld’s “Top 25 CTOs” 3 © 2014 Imperva, Inc. All rights reserved.
  • 4. HII Reports §  Hacker Intelligence Initiative (HII) is focused at understanding how attackers are operating in practice •  A different approach from vulnerability research §  Data set composition •  ~350 real world applications •  Anonymous proxies §  More than 30 months of data §  Powerful analysis system •  Combines analytic tools with drill down capabilities 4 © 2014 Imperva, Inc. All rights reserved. Confidential
  • 5. The Story of a Malware and a Database 5 © 2014 Imperva, Inc. All rights reserved.
  • 6. Malware Sample §  Obtained sample in June 2013 •  Phishing email §  Made in Brazil §  Uses popular hosting service for Drop and C&C •  C&C stores functional code and bot management information •  Drop server stores stolen information §  Uses local SQLOLEDB provider for database communication 6 © 2014 Imperva, Inc. All rights reserved.
  • 7. Malware Sample – Infection Flow §  Starts with a phishing email •  Notice of debt from known bank in Brazil •  “E-mail verified by windows live anti-spam” •  Link to alleged pdf file (detailing the debt) 7 © 2014 Imperva, Inc. All rights reserved.
  • 8. Malware Sample – Infection Flow §  Starts with a phishing email •  Notice of debt from known bank in Brazil •  “E-mail verified by windows live anti-spam” •  Link to alleged pdf file (detailing the debt) 8 © 2014 Imperva, Inc. All rights reserved.
  • 9. Malware Sample – Infection Flow §  Link leads to a screen saver file §  Practically an executable 9 © 2014 Imperva, Inc. All rights reserved.
  • 10. Follow the Rabbit 10 © 2014 Imperva, Inc. All rights reserved.
  • 11. Follow the Rabbit §  MIM “attack” between payload and hosted database •  Capture negotiation packet •  Switch from encrypted to plain text •  Connect with plaintext credentials to hosted DB 11 © 2014 Imperva, Inc. All rights reserved.
  • 12. Follow the Rabbit §  MIM “attack” between payload and hosted database •  Capture negotiation packet •  Switch from encrypted to plain text •  Connect with plaintext credentials to hosted DB 12 © 2014 Imperva, Inc. All rights reserved.
  • 13. Follow the Rabbit §  After connection is established to DB •  Malware stub invokes stored procedure “retorna_dados” (retrieve data) •  Retrieves 3 binary payloads from table “carrega” (payload) •  Stub selects one (according to column number) §  Saves it in %AppData% §  Names it govision.dll 13 © 2014 Imperva, Inc. All rights reserved.
  • 14. Follow the Rabbit §  VirusTotal results for original binary: 30/46 •  Categorized as “banker” §  Other 2 binaries less “notorious” achieving 4/47 and 10/47 14 © 2014 Imperva, Inc. All rights reserved.
  • 15. Follow the Rabbit §  VirusTotal results for original binary: 30/46 •  Categorized as “banker” §  Other 2 binaries less “notorious” achieving 4/47 and 10/47 15 © 2014 Imperva, Inc. All rights reserved.
  • 16. Follow the Rabbit §  2nd stored procedure called “add_avs” •  Registers new bot agent in the C&C database 16 © 2014 Imperva, Inc. All rights reserved.
  • 17. Follow the Rabbit §  2nd stored procedure called “add_avs” •  Registers new bot agent in the C&C database •  Identifier (C volume), version, Windows OS, browsers (Explorer and FireFox), date and some more ambiguous info “ins###” 17 © 2014 Imperva, Inc. All rights reserved.
  • 18. Jumping Into the Rabbit Hole 18 © 2014 Imperva, Inc. All rights reserved.
  • 19. Jumping Into the Rabbit Hole §  Connecting to the DB and collaborating with the service provider revealed: •  5 C&C databases and 2 Drop servers •  C&C grouped by different binaries in “carrega” §  CC1.db1, CC1.db2, CC1.db3 §  CC2.db1, CC2.db2 •  Drop servers §  Drop1 – compromised mail accounts •  Correlated machines from CC1&2 with data in Drop1 §  Drop2 – stolen banking activity information •  From the same bank in initial phishing email 19 © 2014 Imperva, Inc. All rights reserved.
  • 20. Jumping Into the Rabbit Hole 20 © 2014 Imperva, Inc. All rights reserved.
  • 21. C&C Servers §  Similarities •  Same table structure •  Same set of stored procedures •  Some agents found in multiple tables §  Due to multiple infections / test machines •  Binaries (divided to 2 groups) §  Differences •  Mostly disjointed sets of agents •  Names •  Differences in format of stored data §  Hyphen instead of parenthesis §  Version number 21 © 2014 Imperva, Inc. All rights reserved.
  • 22. C&C Servers Same machine in all tables 22 © 2014 Imperva, Inc. All rights reserved.
  • 23. C&C Servers §  Overall ~350 machines infected between Feb-June 2013 23 © 2014 Imperva, Inc. All rights reserved.
  • 24. C&C Servers §  95% of infections occurred between June 3 – June 10 •  Earlier infection perhaps QA tests •  Attacker ran small simultaneous campaigns – wasn't detected by anti-spam mechanism 24 © 2014 Imperva, Inc. All rights reserved.
  • 25. C&C Servers §  OS distribution •  54% use old XP OS •  65.5% enterprise editions 25 © 2014 Imperva, Inc. All rights reserved.
  • 26. C&C Servers §  OS distribution •  54% use old XP OS •  65.5% enterprise editions 26 © 2014 Imperva, Inc. All rights reserved.
  • 27. Drop Servers §  DROP 1 •  Compromised email accounts •  SMTP & POP3 servers •  Contact lists §  Extracted from Outlook or Outlook express §  Some “hand picked” accounts were found to be blocked due to spam §  From April 10 - June 10, 2013 §  ~600 infected machines & 767 compromised accounts §  Thousands of stolen contacts 27 © 2014 Imperva, Inc. All rights reserved.
  • 28. Drop Servers §  DROP 1 •  Compromised email accounts •  SMTP & POP3 servers •  Contact lists §  Extracted from Outlook or Outlook express §  Some “hand picked” accounts were found to be blocked due to spam §  From April 10 - June 10, 2013 §  ~600 infected machines & 767 compromised accounts §  Thousands of stolen contacts 28 © 2014 Imperva, Inc. All rights reserved.
  • 29. Drop Servers §  Drop1 had (only) 7 agents correlated to C&C servers •  Strengthens the hypothesis that these servers are from the same family •  Size of unknown operation much bigger than we had access to •  Much more C&C servers than Drop servers §  Infection achieved by multiple small campaigns rather than single large one §  Botnet army more resilient to server “takedowns” 29 © 2014 Imperva, Inc. All rights reserved.
  • 30. Drop Servers §  Drop 1 email accounts gives visibility to geographical distribution §  Top: Brazil, USA, Argentina, Spain 30 © 2014 Imperva, Inc. All rights reserved.
  • 31. Drop Servers 31 © 2014 Imperva, Inc. All rights reserved.
  • 32. Drop Servers §  Drop2 contains stolen banking activity §  Same banking application that was targeted by the phishing campaign §  Each record contains •  Serial number •  Machine ID •  Unstructured data •  Timestamp §  No machines were correlated with entries in other databases §  Over 400 entries from 12 different machines 32 © 2014 Imperva, Inc. All rights reserved.
  • 33. Drop Servers §  Attackers targeted corporate accounts •  Offer greater financial rewards •  Bank is dedicated to corporate accounts •  The bank itself was not breached §  Timeline between May 17 - June 15, 2013 33 © 2014 Imperva, Inc. All rights reserved.
  • 34. Drop Servers §  Attackers targeted corporate accounts •  Offer greater financial rewards •  Bank is dedicated to corporate accounts •  The bank itself was not breached §  Timeline between May 17 - June 15, 2013 34 © 2014 Imperva, Inc. All rights reserved.
  • 35. Drop Servers §  Drop2 entries come from 5 different malware versions: •  118, 126, 127, 128, 129 •  Only one machine “evolved” from 128 to 129 35 © 2014 Imperva, Inc. All rights reserved.
  • 36. Drop Servers §  Version entries by date 36 © 2014 Imperva, Inc. All rights reserved.
  • 37. Drop Servers §  Entries in same timeframe contain the same “CONTROLE” (session) value §  Entries are a form of stripped HTML pages sent to the drop server by the malware §  All accounts are business accounts of small organizations in Brazil 37 © 2014 Imperva, Inc. All rights reserved.
  • 38. Drop Servers §  Entries in same timeframe contain the same “CONTROLE” (session) value §  Entries are a form of stripped HTML pages sent to the drop server by the malware §  All accounts are business accounts of small organizations in Brazil 38 © 2014 Imperva, Inc. All rights reserved.
  • 39. Drop Servers §  Entries in same timeframe contain the same “CONTROLE” (session) value §  Entries are a form of stripped HTML pages sent to the drop server by the malware §  All accounts are business accounts of small organizations in Brazil 39 © 2014 Imperva, Inc. All rights reserved.
  • 40. DBaaS as a Malware Service 40 © 2014 Imperva, Inc. All rights reserved.
  • 41. Database as a Service §  For legitimate users •  Easy to setup •  No maintenance needed §  For criminals •  C&C and Drop servers •  Jeopardize “neighbors” 41 © 2014 Imperva, Inc. All rights reserved.
  • 42. Database as a Malware Service §  Cheap and safe playground for hackers •  Easy to setup •  Anonymous •  Affordable §  Hiding in plain sight •  Hacker activity is masked with normal activity •  Difficult to pick up the specific DB used by hacker §  Resilient •  Certainly impossible to take down the entire DB machine •  Impossible to “hijack” C&C DNS •  IP blacklisting is not possible 42 © 2014 Imperva, Inc. All rights reserved.
  • 43. Reflections on Malware & DB Access 43 © 2014 Imperva, Inc. All rights reserved.
  • 44. DB Access by Malware §  Embedded Code (TrendMICRO report) §  Packaging DB drivers into modern malware modules §  Malware access C&C databases §  Stuxnet manipulating internal database 44 © 2014 Imperva, Inc. All rights reserved.
  • 45. DB Access by Malware §  Stuxnet §  Narilam •  Updates MSSQL accessible by OLEDB & tamper stored data §  Kulouz 45 © 2014 Imperva, Inc. All rights reserved.
  • 46. Reflections on DB Vulnerabilities 46 © 2014 Imperva, Inc. All rights reserved.
  • 47. DB Vulnerabilities §  DB vulnerabilities pose small risk to enterprises §  None of the breaches of past decade involving internal DB were attributed to vulnerabilities §  Internal breaches usually carried out by non technical perpetrators BUT §  Hosted databases are exposed to the web §  “Sitting duck” for criminal hackers 47 © 2014 Imperva, Inc. All rights reserved.
  • 48. Protocol Layer Vulnerabilities §  DB protocols are a mess •  Proprietary, ill documented (to say the least) •  Designed for internal network use §  In DBaaS they become web protocols used over public networks §  CVE-2013-1899 open source PostgreSQL DB •  Sample exploit: psql --host 10.1.1.1 --dbname=”-rpg_hab.conf” – user=”aaaaaaa” •  DoS of the entire server •  Catastrophic results in shared environment 48 © 2014 Imperva, Inc. All rights reserved.
  • 49. Knock Knock Jokes §  CVSS 2.0 is the standard for computing risk score of a vulnerability §  Authentication requirement accounts for 1 point out of 10 §  In a shared DB hosting environment everyone can authenticate to the DB §  CVE-2012-5611 MySQL vulnerability •  Sample exploit: GRANT select ON MYSQssssssssssssssssssssssssssssssssssssssssssssssssssss sssssssssssssssssLqqqqaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.* TO ‘user11’@’%’ •  DoS of the entire server 49 © 2014 Imperva, Inc. All rights reserved.
  • 50. Who Stole My Cheese? 50 © 2014 Imperva, Inc. All rights reserved.
  • 51. Summary & Conclusion 51 © 2014 Imperva, Inc. All rights reserved.
  • 52. Summary §  Attackers continue to show creativity •  Using cloud DB offering as an alternative to traditional C&C / Drop servers •  Harder detection and takedown §  Commercial malware is gradually becoming more “database aware” •  Attackers have the tools to pry into your database •  Next step: autonomous malware targeting internal databases §  Shared DB hosting platforms imply higher risk •  Exposure to protocol layer vulnerabilities •  Actual vulnerability score is at least 1 point higher 52 © 2014 Imperva, Inc. All rights reserved.
  • 53. Recommendations §  It’s all about the data, stupid! §  While “network” and “end point” hygiene is important, attackers are ultimately looking for your data •  In large, modern, enterprise networks – infection is inevitable §  Enterprise must invest in security layers closer to their data assets §  DB service providers (and their customers) must re-asses risks and invest in virtual patching 53 © 2014 Imperva, Inc. All rights reserved.
  • 54. Webinar Materials Join Imperva LinkedIn Group, Imperva Data Security Direct, for… Post-Webinar Discussions Webinar Recording Link 54 Answers to Attendee Questions Join Group © 2014 Imperva, Inc. All rights reserved.
  • 55. www.imperva.com 55 © 2014 Imperva, Inc. All rights reserved.