SlideShare ist ein Scribd-Unternehmen logo
1 von 14
AURORA ZERO DAY  EXPLOIT OVERVIEW Providing Comprehensive Systems and Network Security http://www.locked.com  (877) 744-3444 Mission Critical Systems, Inc. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Important terminology for this discussion.. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Aurora Internet Explorer Zero-Day Attack The Aurora attacks leveraged a combination of previously unknown vulnerabilities  in Internet Explorer (IE6, IE7, and IE8) on Windows (XP, Vista, and 7) – as well as nearly a dozen pieces of malware and several levels of encryption to burrow deeply into company networks and obscure their activity.  As early as December 2009, emails containing links to malicious websites which exploited this vulnerability were sent to Google, Adobe, and approximately 30 other companies in a spearphishing attack.  When users clicked on the links, a piece of exploit code on the web site attacked the vulnerability and installed an initial infection of malware onto the users machine.  www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Aurora Internet Explorer Zero-Day Attack Once the malware was installed on the machine, additional malicious code was downloaded.  One of the malicious programs established an encrypted SSL connection to the hackers network. This remote backdoor allowed the hacker unfettered and undetectable access to the users machine. This allowed the attackers ongoing access to the computer and to use it as a “beachhead” into other parts of the network to search for login credentials, intellectual property and whatever else they were seeking. It is believed that the attackers were targeting source-code repositories of many of the companies and succeeded in reaching their target in many cases. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Aurora Internet Explorer Zero-Day Attack The Aurora attach is an example of an Advanced Persistent Threat : •  Advanced  means the adversary can operate in the full spectrum of computer intrusion. •  Persistent  means the adversary is formally tasked to accomplish a mission. •  Threat  means the adversary is not a piece of mindless code. Since the code is now publicly available, we expect the number of attacks of this type will grow with time. It is also expected that the next wave of attacks to come from cybercriminals whose techniques are equally sophisticated, but whose motives are somewhat different. They will most certainly be hunting for data, but it will be for monetary gain rather than information gathering. Essentially, the attack is ongoing.  www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Aurora Internet Explorer Risk by Platform DEP =  Data Execution Prevention (DEP) is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system.  The primary benefit of DEP is to help prevent code execution from data pages. Typically, code is not executed from the default heap and the stack. Hardware-enforced DEP detects code that is running from these locations and raises an exception when execution occurs. Software-enforced DEP can help prevent malicious code from taking advantage of exception-handling mechanisms in Windows. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Attack Timeline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Video of the Exploit in Action www.locked.com 877-744-3444 © 2009 Mission Critical Systems.  Courtesy McAfee : http://www.youtube.com/watch?v=53Yv-xAdstc
Anti-Virus is not enough ! ,[object Object],[object Object],[object Object],[object Object],As of January 21, only 25% of AV vendors tracked protect against the payload according to    www.virustotal.com   www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
- IE is not the only vulnerable application - Vulnerabilities are constantly being discovered ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Exploit Packs Hackers are sharing code and tools. ‘Exploit packs’ suggest a new level of sophistication in attacks and drive-by malware downloads. These are basically packed exploits that intelligently chooses exploits based on the client’s browser, search for vulnerable applications, and then exploit them with the proper exploit. So now its not good enough to just update Internet Explorer. All you apps better be patched, or have alternative protection measures in place.  The window to remediate is growing smaller and the bad guys are getting faster. Its getting tough out there.. Businesses have to adapt to these ever changing threats   www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Solutions.…  Desktop Anti-Virus  ( Symantec ,  McAfee ) –  Host protection is an absolute must, but not necessarily a good FIRST line of defense. Anti-Virus products rely on anti-virus signatures to detect the PAYLOAD – not the exploit used to deliver the payload. You can have thousands of signatures over the course of the exploit.  Vulnerability Scanners  ( eEye ,  Symantec Enterprise Security Manager ,  McAfee  Vulnerability Manager )  – useful for determining what machines are un-patched, but offers no real time protection. DLP  ( Vontu ,  Websense ,  RSA )  – Data Loss Prevention could allow companies to prevent the theft and leakage of confidential data and code, but would not prevent the initial infection or owning of the machines. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Solutions (continued).…  IPS   ( Tipping Point ,  Check Point ,  McAfee )  - Requires a signature update to detect the exploit, but these offer proactive protection against different varieties of payloads. IPS companies are usually given advanced notice of an exploit before announced to the public, making them a good line of defense.  Host IPS  ( McAfee ,  Symantec ,  eEye ) –  Host IPS is an excellent tool for preventing unknown exploits from taking advantage of vulnerabilities, as they are looking for specific behaviors. HIPS complements traditional signature and heuristic antivirus detection methods, since it does not need continuous updates to stay ahead of new malware. Many Anti-Virus packages offer HIPS as an upgrade.  Gateway HTTP and HTTPS Inspection  ( Websense Security Gateway ,  McAfee WebWasher ) -  Gateway Security products are one of the best ways to protect yourself, as they combine Anti-Virus, URL Filtering, and Exploit Protection in a single product. For example, Websense provided its customers of Web Security Gateway with zero day protection from this attack before it began in December (actually the protection mechanisms stopped it as of January 2009.  By correlating spam (Phishing attacks) with malicious links, infected websites, payload delivery sites, as well as exploit/vulnerability protection and antivirus, they were able to determine the attack and block access. They provide inbound inspection for viruses, malicious code, as well as standard URL filtering for HTTP, HTTPS, and FTP.  www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Questions? Providing Comprehensive System and Network Security http://www.locked.com  Mission Critical Systems (877)744-3444 www.locked.com 877-744-3444 © 2009 Mission Critical Systems.

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Empfohlen

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Empfohlen (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Aurora Internet Explorer Zero Day Attack

  • 1. AURORA ZERO DAY EXPLOIT OVERVIEW Providing Comprehensive Systems and Network Security http://www.locked.com (877) 744-3444 Mission Critical Systems, Inc. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 2.
  • 3. Aurora Internet Explorer Zero-Day Attack The Aurora attacks leveraged a combination of previously unknown vulnerabilities in Internet Explorer (IE6, IE7, and IE8) on Windows (XP, Vista, and 7) – as well as nearly a dozen pieces of malware and several levels of encryption to burrow deeply into company networks and obscure their activity. As early as December 2009, emails containing links to malicious websites which exploited this vulnerability were sent to Google, Adobe, and approximately 30 other companies in a spearphishing attack.  When users clicked on the links, a piece of exploit code on the web site attacked the vulnerability and installed an initial infection of malware onto the users machine. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 4. Aurora Internet Explorer Zero-Day Attack Once the malware was installed on the machine, additional malicious code was downloaded. One of the malicious programs established an encrypted SSL connection to the hackers network. This remote backdoor allowed the hacker unfettered and undetectable access to the users machine. This allowed the attackers ongoing access to the computer and to use it as a “beachhead” into other parts of the network to search for login credentials, intellectual property and whatever else they were seeking. It is believed that the attackers were targeting source-code repositories of many of the companies and succeeded in reaching their target in many cases. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 5. Aurora Internet Explorer Zero-Day Attack The Aurora attach is an example of an Advanced Persistent Threat : •  Advanced means the adversary can operate in the full spectrum of computer intrusion. •  Persistent means the adversary is formally tasked to accomplish a mission. •  Threat means the adversary is not a piece of mindless code. Since the code is now publicly available, we expect the number of attacks of this type will grow with time. It is also expected that the next wave of attacks to come from cybercriminals whose techniques are equally sophisticated, but whose motives are somewhat different. They will most certainly be hunting for data, but it will be for monetary gain rather than information gathering. Essentially, the attack is ongoing.  www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 6. Aurora Internet Explorer Risk by Platform DEP = Data Execution Prevention (DEP) is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system. The primary benefit of DEP is to help prevent code execution from data pages. Typically, code is not executed from the default heap and the stack. Hardware-enforced DEP detects code that is running from these locations and raises an exception when execution occurs. Software-enforced DEP can help prevent malicious code from taking advantage of exception-handling mechanisms in Windows. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 7.
  • 8. Video of the Exploit in Action www.locked.com 877-744-3444 © 2009 Mission Critical Systems. Courtesy McAfee : http://www.youtube.com/watch?v=53Yv-xAdstc
  • 9.
  • 10.
  • 11. Exploit Packs Hackers are sharing code and tools. ‘Exploit packs’ suggest a new level of sophistication in attacks and drive-by malware downloads. These are basically packed exploits that intelligently chooses exploits based on the client’s browser, search for vulnerable applications, and then exploit them with the proper exploit. So now its not good enough to just update Internet Explorer. All you apps better be patched, or have alternative protection measures in place. The window to remediate is growing smaller and the bad guys are getting faster. Its getting tough out there.. Businesses have to adapt to these ever changing threats www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 12. Solutions.… Desktop Anti-Virus ( Symantec , McAfee ) – Host protection is an absolute must, but not necessarily a good FIRST line of defense. Anti-Virus products rely on anti-virus signatures to detect the PAYLOAD – not the exploit used to deliver the payload. You can have thousands of signatures over the course of the exploit. Vulnerability Scanners ( eEye , Symantec Enterprise Security Manager , McAfee Vulnerability Manager ) – useful for determining what machines are un-patched, but offers no real time protection. DLP ( Vontu , Websense , RSA ) – Data Loss Prevention could allow companies to prevent the theft and leakage of confidential data and code, but would not prevent the initial infection or owning of the machines. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 13. Solutions (continued).… IPS ( Tipping Point , Check Point , McAfee ) - Requires a signature update to detect the exploit, but these offer proactive protection against different varieties of payloads. IPS companies are usually given advanced notice of an exploit before announced to the public, making them a good line of defense. Host IPS ( McAfee , Symantec , eEye ) – Host IPS is an excellent tool for preventing unknown exploits from taking advantage of vulnerabilities, as they are looking for specific behaviors. HIPS complements traditional signature and heuristic antivirus detection methods, since it does not need continuous updates to stay ahead of new malware. Many Anti-Virus packages offer HIPS as an upgrade. Gateway HTTP and HTTPS Inspection ( Websense Security Gateway , McAfee WebWasher ) - Gateway Security products are one of the best ways to protect yourself, as they combine Anti-Virus, URL Filtering, and Exploit Protection in a single product. For example, Websense provided its customers of Web Security Gateway with zero day protection from this attack before it began in December (actually the protection mechanisms stopped it as of January 2009.  By correlating spam (Phishing attacks) with malicious links, infected websites, payload delivery sites, as well as exploit/vulnerability protection and antivirus, they were able to determine the attack and block access. They provide inbound inspection for viruses, malicious code, as well as standard URL filtering for HTTP, HTTPS, and FTP. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 14. Questions? Providing Comprehensive System and Network Security http://www.locked.com Mission Critical Systems (877)744-3444 www.locked.com 877-744-3444 © 2009 Mission Critical Systems.