SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
Cyber Vigilantes:
      Turning the Tables on Hackers
Rob Rachwald, Director of Security Strategy, Imperva
                   July 27, 2011
Agenda

  The state of cyber security
     + Reality check #1: Hackers know the value of data
     + Reality check #2: Hackers, by definition, are early adopters
     + Reality check #3: Organizations have more vulnerabilities than
       time or resources can manage
  Four ways to catch the predator
     + Monitor communications
     + Understand the business model
     + Conduct technical attack analysis
     + Analyze traffic via honeypots
  About Imperva
  Q&A session

 2
Today’s Presenter
      Rob Rachwald, Dir. of Security Strategy, Imperva

    Research
        + Directs security strategy
        + Works with the Imperva Application Defense Center
    Security experience
        + Fortify Software and Coverity
        + Helped secure Intel’s supply chain software
        + Extensive international experience in Japan, China, France, and
          Australia
    Thought leadership
        + Presented at RSA, InfoSec, OWASP, ISACA
        + Appearances on CNN, SkyNews, BBC, NY Times, and USA Today
    Graduated from University of California, Berkeley

  3
Cyber Vigilantes:




4
Cyber security today



      Hacking has become industrialized.

       Attack techniques and vectors are
        changing at an ever rapid pace.

         Attack tools and platforms are
                    evolving.


 5
Reality Check #1:
    Hackers know the value of data better
             than the good guys




6
Data is hacker currency
Website access up for sale




 8
Website access up for sale




 9                    - CONFIDENTIAL -
Reality Check #2:
     Hackers, by definition, are early adopters




10
Mobile (in)security


             Hacker Forum Discussion                                           Hacker interest in
                      Analysis
                                                                                mobile has increased
                                                                               Consider 4000+
1800
1600          272


                                                                                mentions in the past
1400
1200                                       233
                            245

                                                                                year versus only 400
1000          901
                                                                    nokia
 800
                            511                                     iphone

                                                                                from 12+ months ago
 600                                       815
                                                                    android
 400                                                      257
              522
 200                        408
                                           171            126
                                                          40
   0
            Last 3      3 to 6         6 to 9       a year ago
            months      months         months        and older
                         ago            ago




              Source: Imperva Application Defense Center Research
       11
Reality Check #3:
     The good guys have more vulnerabilities than
            time or resources can manage




12
WhiteHat Security Top 10 for 2010

      Percentage likelihood of a Web site having at least
              one vulnerability sorted by class




 13
Studying hackers – Why this helps

   Focus on what hackers want helps the good guys
    prioritize
     + Technical insight into hacker activity
     + Business trends in hacker activity
     + Future directions of hacker activity
   Eliminate uncertainties
     + Active attack sources
     + Explicit attack vectors
     + Spam content
   Focus on actual threats
   Devise new defenses based on real data reducing guess
    work
Approach #1:
     Monitoring communications




15
Method: Hacker forums

   Tap into the neighborhood pub
   Analyze activity
      + Quantitative analysis of topics
      + Qualitative analysis of information being disclosed
      + Follow up on interesting issues




 16
SQL injection = Most popular topic




    Source: Imperva Application Defense Center Research
Non-SQL injection exploits

               Exploits (non-SQL injection)
                                Anonymity 6%   Other
                                                8%
                    Shellcode                          LFI / RFI
                      26%                                9%


            Day 0
            17%                                           Hacked Sites
                                 XSS                         17%
                                 17%
I believe in…




  19
Approach #2:
     Understanding hacker business models




20
Example: Rustock




 21
Lessons from the RSA Breach


                “…according to interviews with several
                security experts who keep a close eye on
                these domains, the Web sites in question
                weren’t merely one-time attack staging
                grounds: They had earned a reputation
                as launch pads for the same kind of
                attacks over at least a 12 month period
                prior to the RSA breach disclosure.”



      Source: http://krebsonsecurity.com/2011/05/rsa-among-dozens-of-firms-breached-by-zero-day-attacks
 22
Spy Eye vs. Zeus

   When installing SpyEye
    there is a “Kill Zeus”
    capability…
      + If chosen, it checks for the
        installation of the Zeus
        Trojan and uninstalls before
        installing SpyEye
   Towards the end of
    October, the bot code
    developers of SpyEye and
    Zeus bots were showing
    signs of a merger


 23
Approach #3:
     Technical attack analysis




24
Getting into command-and-control servers
No honor among thieves
Automated attacks


   Botnets
   Mass SQL injection
    attacks
   Google dorks
And you can monitor trendy attacks
Approach #4:
     Traffic analysis via honeypots




29
Example: DDoS 2.0




 30
HTTP request caught a ToR honeypot




      + POST /.dos/function.php HTTP/1.1
      + User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US;
        rv:1.9.2.3) Gecko/20100409 Gentoo Firefox/3.6.3
      + Parameters
         – ip=82.98.255.161&time=100&port=80




 31
Scale – probably thousands


   Google shows
    hundreds
   Probably only the tip
    of the iceberg




 32
Impact: Who was brought down?

   Only saw it launched against one server
      + IP was Dutch hosting provider
   But there is likely more
      + We only see a fraction of the general traffic on our honeypot
      + This is only one implementation of DoS
   Impact?
      + Depends on the hosting Web server bandwidth
      + A cable modem user typically has a 384Kbs upstream
      + Web host in data center can have 1Gbps pipe
   1 server = 3000 bots



 33
Conclusions




34
Conclusions


 Time to get proactive
     + Scan Google for Dorks with respect to your application
         – Dorks and tools are available on the net
     + Search Google for Honey Tokens
         – Distinguishable credentials or credential sets
         – Specific distinguishable character strings
     + Watch out for name popping in the wrong forums…
 Deploy reputation-based services
 Fight automation
     + CAPTCHA
     + Adaptive authentication
     + Access rate control
     + Click rate control

35
Conclusions


 Application security meets proactive security
     + Quickly identify and block source of recent malicious activity
     + Enhance attack signatures with content from recent attacks
     + Identify sustainable attack platforms
         – Anonymous proxies
         – TOR relays
         – Active bots
     + Identify references from compromised servers
     + Introduce reputation based controls




36
Imperva
     Protecting the data that drives business




37
Imperva background

                     Imperva’s mission is simple:
                     Protect the data that drives business

                     The leader in a new category:
                     Data Security

                     HQ in Redwood Shores CA; Global Presence
                       + Installed in 50+ Countries

                     1,200+ direct customers; 25,000+ cloud users
                       +   3 of the top 5 US banks
                       +   3 of the top 10 financial services firms
                       +   3 of the top 5 Telecoms
                       +   2 of the top 5 food & drug stores
                       +   3 of the top 5 specialty retailers
                       +   Hundreds of small and medium businesses
Imperva: Our story in 60 seconds




        Attack                       Usage
      Protection                     Audit

        Virtual                      Rights
       Patching                    Management

      Reputation                     Access
       Controls                      Control
Webinar materials

      Get LinkedIn to
      Imperva Data Security Direct for…

                              Answers to
           Post-Webinar
                               Attendee
            Discussions
                              Questions



              Webinar
                             Much more…
           Recording Link


 40
Questions




41

Weitere ähnliche Inhalte

Was ist angesagt?

Architecture Extraction From Code
Architecture Extraction From CodeArchitecture Extraction From Code
Architecture Extraction From Codesanyamgoyal
 
European Data Centre Standards
European Data Centre StandardsEuropean Data Centre Standards
European Data Centre StandardsICT FOOTPRINT .eu
 
Tia 942 Data Center Standards
Tia 942 Data Center StandardsTia 942 Data Center Standards
Tia 942 Data Center StandardsSri Chalasani
 
溪湖鎮現況與願景1
溪湖鎮現況與願景1溪湖鎮現況與願景1
溪湖鎮現況與願景1chihu18
 
Datacenter101
Datacenter101Datacenter101
Datacenter101tarundua
 
New product development on antivirus
New product development on antivirusNew product development on antivirus
New product development on antivirusPT Bipin Bhardwaj
 
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001Massimo Talia
 
POWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTERPOWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTERvivekprajapatiankur
 
What are the types of data centers
What are the types of data centersWhat are the types of data centers
What are the types of data centersLivin Jose
 
Datacenter Strategy, Design, and Build
Datacenter Strategy, Design, and BuildDatacenter Strategy, Design, and Build
Datacenter Strategy, Design, and BuildChristopher Kelley
 
Questions for Lesson 5(AL ICT)
Questions for Lesson 5(AL ICT)Questions for Lesson 5(AL ICT)
Questions for Lesson 5(AL ICT)Mahesh Kodituwakku
 
Cloud Computing for Teaching & Learning
Cloud Computing for Teaching & LearningCloud Computing for Teaching & Learning
Cloud Computing for Teaching & LearningZainal Abidin Sayadi
 
【Veeam基礎】簡単解説!バックアップ可能な環境や機能をご紹介
【Veeam基礎】簡単解説!バックアップ可能な環境や機能をご紹介【Veeam基礎】簡単解説!バックアップ可能な環境や機能をご紹介
【Veeam基礎】簡単解説!バックアップ可能な環境や機能をご紹介株式会社クライム
 

Was ist angesagt? (20)

Architecture Extraction From Code
Architecture Extraction From CodeArchitecture Extraction From Code
Architecture Extraction From Code
 
European Data Centre Standards
European Data Centre StandardsEuropean Data Centre Standards
European Data Centre Standards
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
Tia 942 Data Center Standards
Tia 942 Data Center StandardsTia 942 Data Center Standards
Tia 942 Data Center Standards
 
Best Practices for Planning your Datacenter
Best Practices for Planning your DatacenterBest Practices for Planning your Datacenter
Best Practices for Planning your Datacenter
 
溪湖鎮現況與願景1
溪湖鎮現況與願景1溪湖鎮現況與願景1
溪湖鎮現況與願景1
 
Horizon 8 + Instant Clones
Horizon 8 + Instant ClonesHorizon 8 + Instant Clones
Horizon 8 + Instant Clones
 
Datacenter101
Datacenter101Datacenter101
Datacenter101
 
New product development on antivirus
New product development on antivirusNew product development on antivirus
New product development on antivirus
 
2N vs N+1
2N vs N+12N vs N+1
2N vs N+1
 
Data Centre Design Guideline and Standards
Data Centre Design Guideline and StandardsData Centre Design Guideline and Standards
Data Centre Design Guideline and Standards
 
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
 
POWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTERPOWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTER
 
What are the types of data centers
What are the types of data centersWhat are the types of data centers
What are the types of data centers
 
Datacenter Strategy, Design, and Build
Datacenter Strategy, Design, and BuildDatacenter Strategy, Design, and Build
Datacenter Strategy, Design, and Build
 
Data center tier standards
Data center tier standardsData center tier standards
Data center tier standards
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Questions for Lesson 5(AL ICT)
Questions for Lesson 5(AL ICT)Questions for Lesson 5(AL ICT)
Questions for Lesson 5(AL ICT)
 
Cloud Computing for Teaching & Learning
Cloud Computing for Teaching & LearningCloud Computing for Teaching & Learning
Cloud Computing for Teaching & Learning
 
【Veeam基礎】簡単解説!バックアップ可能な環境や機能をご紹介
【Veeam基礎】簡単解説!バックアップ可能な環境や機能をご紹介【Veeam基礎】簡単解説!バックアップ可能な環境や機能をご紹介
【Veeam基礎】簡単解説!バックアップ可能な環境や機能をご紹介
 

Andere mochten auch

Top 11 Data Breaches of 2011
Top 11 Data Breaches of 2011Top 11 Data Breaches of 2011
Top 11 Data Breaches of 2011Imperva
 
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Imperva
 
The State of Application Security: What Hackers Break
The State of Application Security: What Hackers BreakThe State of Application Security: What Hackers Break
The State of Application Security: What Hackers BreakImperva
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusImperva
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised InsiderImperva
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMImperva
 
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity MonitoringSophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity MonitoringImperva
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Imperva
 

Andere mochten auch (8)

Top 11 Data Breaches of 2011
Top 11 Data Breaches of 2011Top 11 Data Breaches of 2011
Top 11 Data Breaches of 2011
 
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012
 
The State of Application Security: What Hackers Break
The State of Application Security: What Hackers BreakThe State of Application Security: What Hackers Break
The State of Application Security: What Hackers Break
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAM
 
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity MonitoringSophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 

Ähnlich wie Cyber Vigilantes: Turning the Tables on Hackers

The State of Application Security: What Hackers Break
The State of Application Security: What Hackers BreakThe State of Application Security: What Hackers Break
The State of Application Security: What Hackers BreakImperva
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machinePriyanka Aash
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemskhalavak
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
Cyber security company
Cyber security companyCyber security company
Cyber security companyCompanySeceon
 
SQL Injection - The Unknown Story
SQL Injection - The Unknown StorySQL Injection - The Unknown Story
SQL Injection - The Unknown StoryImperva
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsTim Mackey
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network securityBev Robb
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityCyphort
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseLuca Simonelli
 
Why Organisations Need_Barac
Why Organisations Need_BaracWhy Organisations Need_Barac
Why Organisations Need_BaracBarac
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version externalZscaler
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?Saumil Shah
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Sophos Benelux
 

Ähnlich wie Cyber Vigilantes: Turning the Tables on Hackers (20)

The State of Application Security: What Hackers Break
The State of Application Security: What Hackers BreakThe State of Application Security: What Hackers Break
The State of Application Security: What Hackers Break
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machine
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Cyber security company
Cyber security companyCyber security company
Cyber security company
 
SQL Injection - The Unknown Story
SQL Injection - The Unknown StorySQL Injection - The Unknown Story
SQL Injection - The Unknown Story
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
Secureview 3
Secureview 3Secureview 3
Secureview 3
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and Defense
 
Why Organisations Need_Barac
Why Organisations Need_BaracWhy Organisations Need_Barac
Why Organisations Need_Barac
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 

Mehr von Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 

Mehr von Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Kürzlich hochgeladen

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Cyber Vigilantes: Turning the Tables on Hackers

  • 1. Cyber Vigilantes: Turning the Tables on Hackers Rob Rachwald, Director of Security Strategy, Imperva July 27, 2011
  • 2. Agenda  The state of cyber security + Reality check #1: Hackers know the value of data + Reality check #2: Hackers, by definition, are early adopters + Reality check #3: Organizations have more vulnerabilities than time or resources can manage  Four ways to catch the predator + Monitor communications + Understand the business model + Conduct technical attack analysis + Analyze traffic via honeypots  About Imperva  Q&A session 2
  • 3. Today’s Presenter Rob Rachwald, Dir. of Security Strategy, Imperva  Research + Directs security strategy + Works with the Imperva Application Defense Center  Security experience + Fortify Software and Coverity + Helped secure Intel’s supply chain software + Extensive international experience in Japan, China, France, and Australia  Thought leadership + Presented at RSA, InfoSec, OWASP, ISACA + Appearances on CNN, SkyNews, BBC, NY Times, and USA Today  Graduated from University of California, Berkeley 3
  • 5. Cyber security today Hacking has become industrialized. Attack techniques and vectors are changing at an ever rapid pace. Attack tools and platforms are evolving. 5
  • 6. Reality Check #1: Hackers know the value of data better than the good guys 6
  • 7. Data is hacker currency
  • 8. Website access up for sale 8
  • 9. Website access up for sale 9 - CONFIDENTIAL -
  • 10. Reality Check #2: Hackers, by definition, are early adopters 10
  • 11. Mobile (in)security Hacker Forum Discussion  Hacker interest in Analysis mobile has increased  Consider 4000+ 1800 1600 272 mentions in the past 1400 1200 233 245 year versus only 400 1000 901 nokia 800 511 iphone from 12+ months ago 600 815 android 400 257 522 200 408 171 126 40 0 Last 3 3 to 6 6 to 9 a year ago months months months and older ago ago Source: Imperva Application Defense Center Research 11
  • 12. Reality Check #3: The good guys have more vulnerabilities than time or resources can manage 12
  • 13. WhiteHat Security Top 10 for 2010 Percentage likelihood of a Web site having at least one vulnerability sorted by class 13
  • 14. Studying hackers – Why this helps  Focus on what hackers want helps the good guys prioritize + Technical insight into hacker activity + Business trends in hacker activity + Future directions of hacker activity  Eliminate uncertainties + Active attack sources + Explicit attack vectors + Spam content  Focus on actual threats  Devise new defenses based on real data reducing guess work
  • 15. Approach #1: Monitoring communications 15
  • 16. Method: Hacker forums  Tap into the neighborhood pub  Analyze activity + Quantitative analysis of topics + Qualitative analysis of information being disclosed + Follow up on interesting issues 16
  • 17. SQL injection = Most popular topic Source: Imperva Application Defense Center Research
  • 18. Non-SQL injection exploits Exploits (non-SQL injection) Anonymity 6% Other 8% Shellcode LFI / RFI 26% 9% Day 0 17% Hacked Sites XSS 17% 17%
  • 20. Approach #2: Understanding hacker business models 20
  • 22. Lessons from the RSA Breach “…according to interviews with several security experts who keep a close eye on these domains, the Web sites in question weren’t merely one-time attack staging grounds: They had earned a reputation as launch pads for the same kind of attacks over at least a 12 month period prior to the RSA breach disclosure.” Source: http://krebsonsecurity.com/2011/05/rsa-among-dozens-of-firms-breached-by-zero-day-attacks 22
  • 23. Spy Eye vs. Zeus  When installing SpyEye there is a “Kill Zeus” capability… + If chosen, it checks for the installation of the Zeus Trojan and uninstalls before installing SpyEye  Towards the end of October, the bot code developers of SpyEye and Zeus bots were showing signs of a merger 23
  • 24. Approach #3: Technical attack analysis 24
  • 26. No honor among thieves
  • 27. Automated attacks  Botnets  Mass SQL injection attacks  Google dorks
  • 28. And you can monitor trendy attacks
  • 29. Approach #4: Traffic analysis via honeypots 29
  • 31. HTTP request caught a ToR honeypot + POST /.dos/function.php HTTP/1.1 + User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.3) Gecko/20100409 Gentoo Firefox/3.6.3 + Parameters – ip=82.98.255.161&time=100&port=80 31
  • 32. Scale – probably thousands  Google shows hundreds  Probably only the tip of the iceberg 32
  • 33. Impact: Who was brought down?  Only saw it launched against one server + IP was Dutch hosting provider  But there is likely more + We only see a fraction of the general traffic on our honeypot + This is only one implementation of DoS  Impact? + Depends on the hosting Web server bandwidth + A cable modem user typically has a 384Kbs upstream + Web host in data center can have 1Gbps pipe  1 server = 3000 bots 33
  • 35. Conclusions  Time to get proactive + Scan Google for Dorks with respect to your application – Dorks and tools are available on the net + Search Google for Honey Tokens – Distinguishable credentials or credential sets – Specific distinguishable character strings + Watch out for name popping in the wrong forums…  Deploy reputation-based services  Fight automation + CAPTCHA + Adaptive authentication + Access rate control + Click rate control 35
  • 36. Conclusions  Application security meets proactive security + Quickly identify and block source of recent malicious activity + Enhance attack signatures with content from recent attacks + Identify sustainable attack platforms – Anonymous proxies – TOR relays – Active bots + Identify references from compromised servers + Introduce reputation based controls 36
  • 37. Imperva Protecting the data that drives business 37
  • 38. Imperva background Imperva’s mission is simple: Protect the data that drives business The leader in a new category: Data Security HQ in Redwood Shores CA; Global Presence + Installed in 50+ Countries 1,200+ direct customers; 25,000+ cloud users + 3 of the top 5 US banks + 3 of the top 10 financial services firms + 3 of the top 5 Telecoms + 2 of the top 5 food & drug stores + 3 of the top 5 specialty retailers + Hundreds of small and medium businesses
  • 39. Imperva: Our story in 60 seconds Attack Usage Protection Audit Virtual Rights Patching Management Reputation Access Controls Control
  • 40. Webinar materials Get LinkedIn to Imperva Data Security Direct for… Answers to Post-Webinar Attendee Discussions Questions Webinar Much more… Recording Link 40