SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Briefing on recent US
bank attacks and
2012 attack trends

David Hobbs
Director of Security Solutions
Emergency Response Team
DavidH@Radware.com



March 2013




                                 Radware Confidential Jan 2012
AGENDA
2012 Availability-based threats

Attacks on the us banks

Others 2012 popular attack patterns & trends
Radware ERT Survey




Radware Confidential Jan 2012                 Slide 3
2012 Attack Motivation - ERT Survey




Radware Confidential Jan 2012                 Slide 4
2012 Target Trend - ERT Survey




Radware Confidential Jan 2012                   Slide 5
Main Bottlenecks During DoS Attacks - ERT Survey




    Radware Confidential Jan 2012           Slide 6
Attacks Campaigns Duration




Radware Confidential Jan 2012                     Slide 7
Attack Duration Requires IT to Develop New Skills



War Room Skills Are Required




           Radware Confidential Jan 2012            Slide 8
Attacks Traverses CDNs (Dynamic Object Attacks)




   Radware Confidential Jan 2012           Slide 9
AGENDA
2012 Availability-based threats

Attacks on the us banks

Others 2012 popular attack patterns & trends
“Overview”


•   What triggered the recent US attacks?
•   Who was involved in implementing the attacks and name of the operation?
•   How long were the attacks and how many attack vectors were involved?
•   How the attacks work and their effects.
•   How can we prepare ourselves in the future?




                                  Radware Confidential Jan 2012               Slide 11
“What triggered the attacks on the US banks?”



•   Nakoula Basseley Nakoula (Alias- “Sam Bacile”), an Egyption born US resident
    created an anti Islam film.
•   Early September the publication of the „Innocence of Muslims‟ film on YouTube
    invokes demonstrations throughout the Muslim world.
•   The video was 14 minutes though a full length movie was released.




                                   Radware Confidential Jan 2012              Slide 12
“Protests generated by the movie”




Radware Confidential Jan 2012                  Slide 13
The Cyber Response




      Radware Confidential Jan 2012   Slide 14
“Who is the group behind the cyber response?”


•   A hacker group called “Izz as-Din al-Qassam Cyber fighters”.
•   Izz as-Din al-Qassam was a famous Muslim preacher who was a leader in the
    fight against the French, US and Zionist in the 1920‟s and 1930‟s.
•   The group claims not to be affiliated to any government or Anonymous.
•   This group claims to be independent, and it‟s goal is to defend Islam.




                                  Radware Confidential Jan 2012            Slide 15
“Operation Ababil launched!”


•   “Operation Ababil” is the codename of the operation launched on
    Septembetr18th 2012, by the group “Izz as-Din al-Qassam Cyber fighters”
•   The attackers announced they would attack “American and Zionist targets”.
•   “Ababil” translates to “swallow” from Persian. Until today the US thinks the
    Iranian government may be behind the operation.
•   The operations goal is to have “Youtube” remove the anti-muslim film from it‟s
    site. Until today the video has not been removed.




                                    Radware Confidential Jan 2012                      Slide 16
“The attack campaign in 2 phases”


•   The attack campaign was split into 2 phases, a pubic announcement was made
    in each phase.
•   The attacks lasted 10 days, from the 18th until the 28th of September.
•   Phase 1 - Targets > NYSE, BOA, JP Morgan.
•   Phase 2 – Targets > Wells Fargo, US Banks, PNC.




                                  Radware Confidential Jan 2012                 Slide 17
The Attack
Vectors and Tactics!




                       Slide 18
“Attack Vectors”


•    5 Attack vectors were seen by the ERT team during Operation Ababil.
1.   UDP garbage flood.
2.   TCP SYN flood.
3.   Mobile LOIC (Apache killer version).
4.   HTTP Request flood.
5.   ICMP Reply flood. (*Unconfirmed but reported on).

*Note: Data is gathered by Radware as well as it‟s partners.




                                    Radware Confidential Jan 2012
“UDP Garbage Flood”


•   Targeted the DNS servers of the organizations, also HTTP.
•   Up to 1Gbps volume (Possibly higher).
•   All attacks were identical in content and in size (Packet structure).
•   UDP packets sent to port 53 and 80.
•   Customer attacked Sep 18th and on the 19th.




                                     Radware Confidential Jan 2012                  Slide 20
“Tactics used in the UDP garbage flood”


•   Internal DNS servers were targeted , at a high rate.
•   Web servers were also targeted, at a high rate.
•   Spoofed IP‟s (But kept to just a few, this is unusual).
•   ~ 1Gbps.
•   Lasted more than 7 hours initially but still continues...




                                   Packet structure
       Parameter                        Value Port 53                        Value Port 80


       Packet size                      1358 Bytes                           Unknown
       Value in Garbage                 ‘A’ (0x41) characters                “/http1”
                                        repeated                             (x2fx68x74x74x70x
                                                                             31) - repetitive




                                             Radware Confidential Jan 2012                         Slide 21
“DNS Garbage flood packet extract”


•   Some reports of a DNS reflective attack was underway seem to be incorrect.
•   The packets are considered “Malformed” DNS packets, no relevant DNS
    header.




                                   Radware Confidential Jan 2012                 Slide 22
“Attackers objective of the UDP Garbage flood”


•   Saturate bandwidth.
•   Attack will pass through firewall, since port is open.
•   Saturate session tables/CPU resources on any state -full device, L4 routing
    rules any router, FW session tables etc..
•   Returning ICMP type 3 further saturate upstream bandwidth.
•   All combined will lead to a DoS situation if bandwidth and infrastructure cannot
    handle the volume or packet processing.




                                    Radware Confidential Jan 2012                 Slide 23
“TCP SYN flood”


•   Targeted Port 53, 80 and 443.
•   The rate was around 100Mbps with around 135K PPS.
•   This lasted from the Sep 18th for more than 3 days.




                                  Radware Confidential Jan 2012              Slide 24
“SYN flood Packet extract”


-All sources are spoofed.
-Multiple SYN packets to port 443.




                                     Radware Confidential Jan 2012                        Slide 25
“Attackers objective of the TCP SYN floods”


•   SYN floods are a well known attack vector.
•   Can be used to distract from more targeted attacks.
•   The effect of the SYN flood if it slips through can devastate state-full devices
    quickly. This is done by filling up the session table.
•   All state-full device has some performance impact under such a flood.
•   Easy to implement.
•   Incorrect network architecture will quickly have issues.




                                     Radware Confidential Jan 2012                     Slide 26
“Mobile LOIC (Apache killer version)”


•   Mobile LOIC (Low Orbit Iron Cannon) is a DDoS tool written in HTML and
    Javascript.
•   This DDoS Tool does an HTTP GET flood.
•   The tool is designed to do HTTP floods.
•   We have no statistics on the exact traffic of mobile LOIC.




                        *Suspected *Suspected



                                   Radware Confidential Jan 2012                  Slide 27
“Mobile LOIC in a web browser”




Radware Confidential Jan 2012                   Slide 28
“HTTP Request Flood”


•   Between 80K and 100K TPS (Transactions Per second)
•   Port 80
•   Followed the same patterns in the GET request (Except for the Input
    parameter)
•   Dynamic user agent




                                   Radware Confidential Jan 2012                   Slide 29
“HTTP flood packet structure”


•   Sources worldwide (True sources most likely hidden).
•   User agent duplicated.
•   Attack time was short (No confirmed timeline)
•   Rates are unknown.
•   Dynamic Input parameters.

                            GET Requests parameters




                                     Radware Confidential Jan 2012                     Slide 30
“HTTP flood packet parameters identified”


                                   HTTP Request Samples

GET /financial-literacy/all-about-investing/etvs?2408b

GET /financial-literacy/all-about-investing/bonds?4d094

GET /inside-the-exchange/visiting?aad95

GET /


                                    HTTP Request Samples
DoCoMo/2.0 SH902i (compatible; Y!J-SRD/1.0;
http://help.yahoo.co.jp/help/jp/search/indexing/indexing-27.html)
Googlebot/2.1 ( http://www.googlebot.com/bot.html)
IE/5.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR
1.1.4322;)
Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4b) Gecko/20030505 Mozilla Firebird/0.6
Opera/9.00 (Windows NT 5.1; U; en)
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;)
msnbot-Products/1.0 (+http://search.msn.com/msnbot.htm)


                                        Radware Confidential Jan 2012                     Slide 31
“Identified locations of attacking IP‟s”

Worldwide!




             Radware Confidential Jan 2012                     Slide 32
“Attackers objective of the HTTP flood”


•   Bypass CDN services by randomizing the input parameter and user agents.
•   Because of the double user agent there was an flaw in the programming behind
    the attacking tool.
•   Saturating and exhausting web server resources by keeping session table and
    web server connection limits occupied.
•   The attack takes more resources to implement than non connection orientated
    attacks like TCP SYN floods and UDP garbage floods. This is because of the
    need to establish a connection.




                                  Radware Confidential Jan 2012                Slide 33
Unconfirmed Vectors of attack




                                Slide 34
“Unconfirmed attacks”


•   The following 2 attack vectors were reported to us by our customers however
    we have no data internally to indicate these attacks took place.
•   The data was either gathered through intelligence the customer had (IRC chat,
    Forums etc..) or something they suspected and reported to Radware but never
    provided logs for.
•   The 2 other vectors suspected are:
     – ICMP Reply Flood.
     – Dirt Jumper.




                                   Radware Confidential Jan 2012
“ICMP Reply flood”


•   This attack was gathered through Cisco logs at the customers site.
•   We have no statistics on the attack.




                                   Radware Confidential Jan 2012                Slide 36
“ICMP Reply Flood explained”


•   ICMP “Requests” (ICMP Type 8) are sent to the target in order to generate multiple ICMP
    “Reply” (ICMP Type 0) packets.
•   This can also be from spoofed IP‟s (Sent packets, ICMP Type 8).
•    This saturates bandwidth on the servers up/down stream as well as CPU processing to
    process the ICMP packets and respond.
•   To do a replay flood you just spoof the SRC IP of the ICMP request.




                                         Radware Confidential Jan 2012                        Slide 37
“Dirt Jumper”


•   Dirt Jumper is a BOT currently at version 5.
•   Dirt jumper is used in various HTTP floods.
•   POST, GET and download floods are supported by the latest version of Dirt
    Jumper.
•   User Agent and Referrer randomization are supported too.




                                   Radware Confidential Jan 2012                Slide 38
“Dirt Jumper C&C”




Radware Confidential Jan 2012               Slide 39
AGENDA
2012 Availability-based threats

Attacks on the us banks

Others 2012 popular attack patterns & trends
Availability-based Threats Tree


                             Availability-
                            based Threats




   Network Floods     Application                             Single-packet
                                          Low-and-Slow
    (Volumetric)        Floods                                    DoS



ICMP                 Web
Flood                        DNS         SMTP
                    Flood


UPD
Flood               HTTPS


 SYN
Flood




                             Radware Confidential Jan 2012                     Slide 41
Asymmetric Attacks




Radware Confidential Jan 2012                Slide 42
HTTP Reflection Attack




Attacker

                  Website A                           Website B
                                                       (Victim)


           HTTP
           GET




                     Radware Confidential Jan 2012
                                                                       Slide
HTTP Reflection Attack Example



iframe, width=1, height=1




                   search.php



                   Radware Confidential Jan 2012
                                                                   Slide
HTTPS – SSL Re Negotiation Attack




THC-SSL DoS
THC-SSL DOS was developed by a hacking group called The Hacker‟s Choice (THC), as a proof-
of-concept to encourage vendors to patch a serious SSL vulnerability. THC-SSL-DOS, as with other
“low and slow” attacks, requires only a small number of packets to cause denial-of-service for a
fairly large server. It works by initiating a regular SSL handshake and then immediately requesting
for the renegotiation of the encryption key, constantly repeating this server resource-intensive
renegotiation request until all server resources have been exhausted.
                                          Radware Confidential Jan 2012                     Slide 45
Low & Slow


                             Availability-
                            based Threats




   Network Floods     Application                            Single-packet
                                          Low-and-Slow
    (Volumetric)        Floods                                   DoS



ICMP                 Web
Flood                        DNS         SMTP
                    Flood


UPD
Flood               HTTPS


 SYN
Flood




                             Radware Confidential Jan 2012                     Slide 46
Low & Slow




•   Slowloris
•   Sockstress
•   R.U.D.Y.
•   Simultaneous Connection Saturation




              Radware Confidential Jan 2012         Slide 47
R.U.D.Y (R-U-Dead-Yet)




R.U.D.Y. (R-U-Dead-Yet?)
R.U.D.Y. (R-U-Dead-Yet?) is a slow-rate HTTP POST (Layer 7) denial-of-service tool created by Raviv Raz and
named after the Children of Bodom album “Are You Dead Yet?” It achieves denial-of-service by using long form
field submissions. By injecting one byte of information into an application POST field at a time and then waiting,
R.U.D.Y. causes application threads to await the end of never-ending posts in order to perform processing (this
behavior is necessary in order to allow web servers to support users with slower connections). Since R.U.D.Y.
causes the target webserver to hang while waiting for the rest of an HTTP POST request, by initiating
simultaneous connections to the server the attacker is ultimately able to exhaust the server‟s connection table and
create a denial-of-service condition.

                                                 Radware Confidential Jan 2012                             Slide 48
Slowloris




Slowloris
Slowloris is a denial-of-service (DoS) tool developed by the grey hat hacker “RSnake” that causes DoS by using a very slow
HTTP request. By sending HTTP headers to the target site in tiny chunks as slow as possible (waiting to send the next tiny
chunk until just before the server would time out the request), the server is forced to continue to wait for the headers to
arrive. If enough connections are opened to the server in this fashion, it is quickly unable to handle legitimate requests.
Slowloris is cross-platform, except due to Windows’ ~130 simultaneous socket use limit, it is only effective from UNIX-based
systems which allow for more connections to be opened in parallel to a target server (although a GUI Python version of
Slowloris dubbed PyLoris was able to overcome this limiting factor on Windows).
                                                     Radware Confidential Jan 2012                                  Slide 49
Radware Security Products Portfolio


DefensePro
Network & Server attack prevention device


AppWall
Web Application Firewall (WAF)


APSolute Vision
Management and security reporting &
compliance




                                            Slide 50
Thank You
www.radware.com




                  Radware Confidential Jan 2012

Weitere ähnliche Inhalte

Andere mochten auch

Simulacro votaciones 2013
Simulacro votaciones 2013Simulacro votaciones 2013
Simulacro votaciones 2013Radio 102nueve
 
sherwin-williams _2005_AR
sherwin-williams  _2005_ARsherwin-williams  _2005_AR
sherwin-williams _2005_ARfinance29
 
Cultivo de naranjas tradicionales para realzar sus propiedades naturales
Cultivo de naranjas tradicionales para realzar sus propiedades naturalesCultivo de naranjas tradicionales para realzar sus propiedades naturales
Cultivo de naranjas tradicionales para realzar sus propiedades naturalesNaranjas Tradicionales
 
Putting A Price On Happiness
Putting A Price On HappinessPutting A Price On Happiness
Putting A Price On HappinessGroup 8A
 
City Water International Inc v Polex Manufacturing Ltd
City Water International Inc  v  Polex Manufacturing Ltd City Water International Inc  v  Polex Manufacturing Ltd
City Water International Inc v Polex Manufacturing Ltd Matthew Riddell
 
Medios de comunicación y cambio climático. (Rogelio fernández Flores) Lectura...
Medios de comunicación y cambio climático. (Rogelio fernández Flores) Lectura...Medios de comunicación y cambio climático. (Rogelio fernández Flores) Lectura...
Medios de comunicación y cambio climático. (Rogelio fernández Flores) Lectura...Ecologistas en Accion
 
Jetspeed-2 Overview
Jetspeed-2 OverviewJetspeed-2 Overview
Jetspeed-2 Overviewbettlebrox
 
Empresa electromega
Empresa electromegaEmpresa electromega
Empresa electromegaSolo Panas
 
Funciones de Google drive descripción y categorias
Funciones de Google drive descripción y categoriasFunciones de Google drive descripción y categorias
Funciones de Google drive descripción y categoriasAndrea Belén Díaz Correa
 
Traders entrevista erik németh
Traders entrevista erik némethTraders entrevista erik németh
Traders entrevista erik némethOpciónMaestro.com
 
Palazzo Madama at Museumnext 2014. A museum crowdfunding experience
Palazzo Madama at Museumnext 2014. A museum crowdfunding experience Palazzo Madama at Museumnext 2014. A museum crowdfunding experience
Palazzo Madama at Museumnext 2014. A museum crowdfunding experience Carlotta Margarone
 
Evento en Córdoba 2016 - Taller de testing exploratorio - Federico Toledo
Evento en Córdoba 2016 - Taller de testing exploratorio - Federico ToledoEvento en Córdoba 2016 - Taller de testing exploratorio - Federico Toledo
Evento en Córdoba 2016 - Taller de testing exploratorio - Federico ToledoFederico Toledo
 

Andere mochten auch (20)

Simulacro votaciones 2013
Simulacro votaciones 2013Simulacro votaciones 2013
Simulacro votaciones 2013
 
Museo
MuseoMuseo
Museo
 
sherwin-williams _2005_AR
sherwin-williams  _2005_ARsherwin-williams  _2005_AR
sherwin-williams _2005_AR
 
Abecedaris il.lustrats
Abecedaris il.lustratsAbecedaris il.lustrats
Abecedaris il.lustrats
 
Endevinalles classe 5è
Endevinalles classe 5èEndevinalles classe 5è
Endevinalles classe 5è
 
Restaurante y Hoteles
Restaurante y HotelesRestaurante y Hoteles
Restaurante y Hoteles
 
Cultivo de naranjas tradicionales para realzar sus propiedades naturales
Cultivo de naranjas tradicionales para realzar sus propiedades naturalesCultivo de naranjas tradicionales para realzar sus propiedades naturales
Cultivo de naranjas tradicionales para realzar sus propiedades naturales
 
Putting A Price On Happiness
Putting A Price On HappinessPutting A Price On Happiness
Putting A Price On Happiness
 
City Water International Inc v Polex Manufacturing Ltd
City Water International Inc  v  Polex Manufacturing Ltd City Water International Inc  v  Polex Manufacturing Ltd
City Water International Inc v Polex Manufacturing Ltd
 
Medios de comunicación y cambio climático. (Rogelio fernández Flores) Lectura...
Medios de comunicación y cambio climático. (Rogelio fernández Flores) Lectura...Medios de comunicación y cambio climático. (Rogelio fernández Flores) Lectura...
Medios de comunicación y cambio climático. (Rogelio fernández Flores) Lectura...
 
Jetspeed-2 Overview
Jetspeed-2 OverviewJetspeed-2 Overview
Jetspeed-2 Overview
 
slide 8051
slide 8051 slide 8051
slide 8051
 
Empresa electromega
Empresa electromegaEmpresa electromega
Empresa electromega
 
Funciones de Google drive descripción y categorias
Funciones de Google drive descripción y categoriasFunciones de Google drive descripción y categorias
Funciones de Google drive descripción y categorias
 
Traders entrevista erik németh
Traders entrevista erik némethTraders entrevista erik németh
Traders entrevista erik németh
 
CT Conjunta - 22.03.16 - Vigiasus - Experiência do Paraná com Incentivo de Re...
CT Conjunta - 22.03.16 - Vigiasus - Experiência do Paraná com Incentivo de Re...CT Conjunta - 22.03.16 - Vigiasus - Experiência do Paraná com Incentivo de Re...
CT Conjunta - 22.03.16 - Vigiasus - Experiência do Paraná com Incentivo de Re...
 
Palazzo Madama at Museumnext 2014. A museum crowdfunding experience
Palazzo Madama at Museumnext 2014. A museum crowdfunding experience Palazzo Madama at Museumnext 2014. A museum crowdfunding experience
Palazzo Madama at Museumnext 2014. A museum crowdfunding experience
 
El rock alternativo
El rock alternativoEl rock alternativo
El rock alternativo
 
Evento en Córdoba 2016 - Taller de testing exploratorio - Federico Toledo
Evento en Córdoba 2016 - Taller de testing exploratorio - Federico ToledoEvento en Córdoba 2016 - Taller de testing exploratorio - Federico Toledo
Evento en Córdoba 2016 - Taller de testing exploratorio - Federico Toledo
 
4º y 5º secund
4º y 5º secund4º y 5º secund
4º y 5º secund
 

Ähnlich wie Briefing on Recent US Bank Attacks and 2012 Attack Trends

Unmasking Anonymous: An Eyewitness Account of a Hacktivist Attack
Unmasking Anonymous: An Eyewitness Account of a Hacktivist AttackUnmasking Anonymous: An Eyewitness Account of a Hacktivist Attack
Unmasking Anonymous: An Eyewitness Account of a Hacktivist AttackImperva
 
Linked Data Book: Cambridge Semantic Web Meetup 20130108
Linked Data Book: Cambridge Semantic Web Meetup 20130108Linked Data Book: Cambridge Semantic Web Meetup 20130108
Linked Data Book: Cambridge Semantic Web Meetup 201301083 Round Stones
 
Robin Hoods And Criminals
Robin Hoods And CriminalsRobin Hoods And Criminals
Robin Hoods And CriminalsZiv Ichilov
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving TheatreRadware
 
Ddos and mitigation methods.pptx
Ddos and mitigation methods.pptxDdos and mitigation methods.pptx
Ddos and mitigation methods.pptxOzkan E
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough? Zscaler
 
The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce...
 The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce... The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce...
The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce...SignalSEC Ltd.
 
HITCON 2015 - DGAs, DNS and Threat Intelligence
HITCON 2015 - DGAs, DNS and Threat IntelligenceHITCON 2015 - DGAs, DNS and Threat Intelligence
HITCON 2015 - DGAs, DNS and Threat IntelligenceJohn Bambenek
 
2012 Global Application and Network Security Report
2012 Global Application and Network Security Report2012 Global Application and Network Security Report
2012 Global Application and Network Security ReportRadware
 
Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoSDrilling Down Into DNS DDoS
Drilling Down Into DNS DDoSAPNIC
 
Crouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden TrojanCrouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden Trojanguest17b7c7
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?Saumil Shah
 
Cyber-Security Product
Cyber-Security ProductCyber-Security Product
Cyber-Security ProductAli Hamieh
 
Layer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dosLayer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dosfangjiafu
 
Layer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dosLayer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dosfangjiafu
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsJames Wickett
 

Ähnlich wie Briefing on Recent US Bank Attacks and 2012 Attack Trends (20)

Unmasking Anonymous: An Eyewitness Account of a Hacktivist Attack
Unmasking Anonymous: An Eyewitness Account of a Hacktivist AttackUnmasking Anonymous: An Eyewitness Account of a Hacktivist Attack
Unmasking Anonymous: An Eyewitness Account of a Hacktivist Attack
 
Linked Data Book: Cambridge Semantic Web Meetup 20130108
Linked Data Book: Cambridge Semantic Web Meetup 20130108Linked Data Book: Cambridge Semantic Web Meetup 20130108
Linked Data Book: Cambridge Semantic Web Meetup 20130108
 
Robin Hoods And Criminals
Robin Hoods And CriminalsRobin Hoods And Criminals
Robin Hoods And Criminals
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
OMG Data-Distribution Service Security
OMG Data-Distribution Service SecurityOMG Data-Distribution Service Security
OMG Data-Distribution Service Security
 
Ddos and mitigation methods.pptx
Ddos and mitigation methods.pptxDdos and mitigation methods.pptx
Ddos and mitigation methods.pptx
 
Denial of Service
Denial of ServiceDenial of Service
Denial of Service
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 
Security events in 2014
Security events in 2014Security events in 2014
Security events in 2014
 
The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce...
 The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce... The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce...
The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce...
 
HITCON 2015 - DGAs, DNS and Threat Intelligence
HITCON 2015 - DGAs, DNS and Threat IntelligenceHITCON 2015 - DGAs, DNS and Threat Intelligence
HITCON 2015 - DGAs, DNS and Threat Intelligence
 
2012 Global Application and Network Security Report
2012 Global Application and Network Security Report2012 Global Application and Network Security Report
2012 Global Application and Network Security Report
 
Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoSDrilling Down Into DNS DDoS
Drilling Down Into DNS DDoS
 
Crouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden TrojanCrouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden Trojan
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
Cyber-Security Product
Cyber-Security ProductCyber-Security Product
Cyber-Security Product
 
Layer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dosLayer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dos
 
Layer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dosLayer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dos
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
 

Mehr von Radware

Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Radware
 
What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)Radware
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16Radware
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security ServicesRadware
 
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...Radware
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]Radware
 
The Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs DowntimeThe Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs DowntimeRadware
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?Radware
 
Radware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock BashRadware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock BashRadware
 
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor PerformanceRadware
 
Emotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionEmotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionRadware
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber WarRadware
 
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...Radware
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksRadware
 
Providing best response times, tightest security and highest availability for...
Providing best response times, tightest security and highest availability for...Providing best response times, tightest security and highest availability for...
Providing best response times, tightest security and highest availability for...Radware
 
Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks
Stock Exchanges in the Line of Fire-Morphology of Cyber AttacksStock Exchanges in the Line of Fire-Morphology of Cyber Attacks
Stock Exchanges in the Line of Fire-Morphology of Cyber AttacksRadware
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumRadware
 

Mehr von Radware (20)

Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)
 
What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF Service
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
The Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs DowntimeThe Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs Downtime
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
Radware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock BashRadware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock Bash
 
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
 
Emotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionEmotional Engagement and Brand Perception
Emotional Engagement and Brand Perception
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
Providing best response times, tightest security and highest availability for...
Providing best response times, tightest security and highest availability for...Providing best response times, tightest security and highest availability for...
Providing best response times, tightest security and highest availability for...
 
Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks
Stock Exchanges in the Line of Fire-Morphology of Cyber AttacksStock Exchanges in the Line of Fire-Morphology of Cyber Attacks
Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the Equilibrium
 

Kürzlich hochgeladen

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Briefing on Recent US Bank Attacks and 2012 Attack Trends

  • 1. Briefing on recent US bank attacks and 2012 attack trends David Hobbs Director of Security Solutions Emergency Response Team DavidH@Radware.com March 2013 Radware Confidential Jan 2012
  • 2. AGENDA 2012 Availability-based threats Attacks on the us banks Others 2012 popular attack patterns & trends
  • 3. Radware ERT Survey Radware Confidential Jan 2012 Slide 3
  • 4. 2012 Attack Motivation - ERT Survey Radware Confidential Jan 2012 Slide 4
  • 5. 2012 Target Trend - ERT Survey Radware Confidential Jan 2012 Slide 5
  • 6. Main Bottlenecks During DoS Attacks - ERT Survey Radware Confidential Jan 2012 Slide 6
  • 7. Attacks Campaigns Duration Radware Confidential Jan 2012 Slide 7
  • 8. Attack Duration Requires IT to Develop New Skills War Room Skills Are Required Radware Confidential Jan 2012 Slide 8
  • 9. Attacks Traverses CDNs (Dynamic Object Attacks) Radware Confidential Jan 2012 Slide 9
  • 10. AGENDA 2012 Availability-based threats Attacks on the us banks Others 2012 popular attack patterns & trends
  • 11. “Overview” • What triggered the recent US attacks? • Who was involved in implementing the attacks and name of the operation? • How long were the attacks and how many attack vectors were involved? • How the attacks work and their effects. • How can we prepare ourselves in the future? Radware Confidential Jan 2012 Slide 11
  • 12. “What triggered the attacks on the US banks?” • Nakoula Basseley Nakoula (Alias- “Sam Bacile”), an Egyption born US resident created an anti Islam film. • Early September the publication of the „Innocence of Muslims‟ film on YouTube invokes demonstrations throughout the Muslim world. • The video was 14 minutes though a full length movie was released. Radware Confidential Jan 2012 Slide 12
  • 13. “Protests generated by the movie” Radware Confidential Jan 2012 Slide 13
  • 14. The Cyber Response Radware Confidential Jan 2012 Slide 14
  • 15. “Who is the group behind the cyber response?” • A hacker group called “Izz as-Din al-Qassam Cyber fighters”. • Izz as-Din al-Qassam was a famous Muslim preacher who was a leader in the fight against the French, US and Zionist in the 1920‟s and 1930‟s. • The group claims not to be affiliated to any government or Anonymous. • This group claims to be independent, and it‟s goal is to defend Islam. Radware Confidential Jan 2012 Slide 15
  • 16. “Operation Ababil launched!” • “Operation Ababil” is the codename of the operation launched on Septembetr18th 2012, by the group “Izz as-Din al-Qassam Cyber fighters” • The attackers announced they would attack “American and Zionist targets”. • “Ababil” translates to “swallow” from Persian. Until today the US thinks the Iranian government may be behind the operation. • The operations goal is to have “Youtube” remove the anti-muslim film from it‟s site. Until today the video has not been removed. Radware Confidential Jan 2012 Slide 16
  • 17. “The attack campaign in 2 phases” • The attack campaign was split into 2 phases, a pubic announcement was made in each phase. • The attacks lasted 10 days, from the 18th until the 28th of September. • Phase 1 - Targets > NYSE, BOA, JP Morgan. • Phase 2 – Targets > Wells Fargo, US Banks, PNC. Radware Confidential Jan 2012 Slide 17
  • 18. The Attack Vectors and Tactics! Slide 18
  • 19. “Attack Vectors” • 5 Attack vectors were seen by the ERT team during Operation Ababil. 1. UDP garbage flood. 2. TCP SYN flood. 3. Mobile LOIC (Apache killer version). 4. HTTP Request flood. 5. ICMP Reply flood. (*Unconfirmed but reported on). *Note: Data is gathered by Radware as well as it‟s partners. Radware Confidential Jan 2012
  • 20. “UDP Garbage Flood” • Targeted the DNS servers of the organizations, also HTTP. • Up to 1Gbps volume (Possibly higher). • All attacks were identical in content and in size (Packet structure). • UDP packets sent to port 53 and 80. • Customer attacked Sep 18th and on the 19th. Radware Confidential Jan 2012 Slide 20
  • 21. “Tactics used in the UDP garbage flood” • Internal DNS servers were targeted , at a high rate. • Web servers were also targeted, at a high rate. • Spoofed IP‟s (But kept to just a few, this is unusual). • ~ 1Gbps. • Lasted more than 7 hours initially but still continues... Packet structure Parameter Value Port 53 Value Port 80 Packet size 1358 Bytes Unknown Value in Garbage ‘A’ (0x41) characters “/http1” repeated (x2fx68x74x74x70x 31) - repetitive Radware Confidential Jan 2012 Slide 21
  • 22. “DNS Garbage flood packet extract” • Some reports of a DNS reflective attack was underway seem to be incorrect. • The packets are considered “Malformed” DNS packets, no relevant DNS header. Radware Confidential Jan 2012 Slide 22
  • 23. “Attackers objective of the UDP Garbage flood” • Saturate bandwidth. • Attack will pass through firewall, since port is open. • Saturate session tables/CPU resources on any state -full device, L4 routing rules any router, FW session tables etc.. • Returning ICMP type 3 further saturate upstream bandwidth. • All combined will lead to a DoS situation if bandwidth and infrastructure cannot handle the volume or packet processing. Radware Confidential Jan 2012 Slide 23
  • 24. “TCP SYN flood” • Targeted Port 53, 80 and 443. • The rate was around 100Mbps with around 135K PPS. • This lasted from the Sep 18th for more than 3 days. Radware Confidential Jan 2012 Slide 24
  • 25. “SYN flood Packet extract” -All sources are spoofed. -Multiple SYN packets to port 443. Radware Confidential Jan 2012 Slide 25
  • 26. “Attackers objective of the TCP SYN floods” • SYN floods are a well known attack vector. • Can be used to distract from more targeted attacks. • The effect of the SYN flood if it slips through can devastate state-full devices quickly. This is done by filling up the session table. • All state-full device has some performance impact under such a flood. • Easy to implement. • Incorrect network architecture will quickly have issues. Radware Confidential Jan 2012 Slide 26
  • 27. “Mobile LOIC (Apache killer version)” • Mobile LOIC (Low Orbit Iron Cannon) is a DDoS tool written in HTML and Javascript. • This DDoS Tool does an HTTP GET flood. • The tool is designed to do HTTP floods. • We have no statistics on the exact traffic of mobile LOIC. *Suspected *Suspected Radware Confidential Jan 2012 Slide 27
  • 28. “Mobile LOIC in a web browser” Radware Confidential Jan 2012 Slide 28
  • 29. “HTTP Request Flood” • Between 80K and 100K TPS (Transactions Per second) • Port 80 • Followed the same patterns in the GET request (Except for the Input parameter) • Dynamic user agent Radware Confidential Jan 2012 Slide 29
  • 30. “HTTP flood packet structure” • Sources worldwide (True sources most likely hidden). • User agent duplicated. • Attack time was short (No confirmed timeline) • Rates are unknown. • Dynamic Input parameters. GET Requests parameters Radware Confidential Jan 2012 Slide 30
  • 31. “HTTP flood packet parameters identified” HTTP Request Samples GET /financial-literacy/all-about-investing/etvs?2408b GET /financial-literacy/all-about-investing/bonds?4d094 GET /inside-the-exchange/visiting?aad95 GET / HTTP Request Samples DoCoMo/2.0 SH902i (compatible; Y!J-SRD/1.0; http://help.yahoo.co.jp/help/jp/search/indexing/indexing-27.html) Googlebot/2.1 ( http://www.googlebot.com/bot.html) IE/5.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 1.1.4322;) Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4b) Gecko/20030505 Mozilla Firebird/0.6 Opera/9.00 (Windows NT 5.1; U; en) User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;) msnbot-Products/1.0 (+http://search.msn.com/msnbot.htm) Radware Confidential Jan 2012 Slide 31
  • 32. “Identified locations of attacking IP‟s” Worldwide! Radware Confidential Jan 2012 Slide 32
  • 33. “Attackers objective of the HTTP flood” • Bypass CDN services by randomizing the input parameter and user agents. • Because of the double user agent there was an flaw in the programming behind the attacking tool. • Saturating and exhausting web server resources by keeping session table and web server connection limits occupied. • The attack takes more resources to implement than non connection orientated attacks like TCP SYN floods and UDP garbage floods. This is because of the need to establish a connection. Radware Confidential Jan 2012 Slide 33
  • 34. Unconfirmed Vectors of attack Slide 34
  • 35. “Unconfirmed attacks” • The following 2 attack vectors were reported to us by our customers however we have no data internally to indicate these attacks took place. • The data was either gathered through intelligence the customer had (IRC chat, Forums etc..) or something they suspected and reported to Radware but never provided logs for. • The 2 other vectors suspected are: – ICMP Reply Flood. – Dirt Jumper. Radware Confidential Jan 2012
  • 36. “ICMP Reply flood” • This attack was gathered through Cisco logs at the customers site. • We have no statistics on the attack. Radware Confidential Jan 2012 Slide 36
  • 37. “ICMP Reply Flood explained” • ICMP “Requests” (ICMP Type 8) are sent to the target in order to generate multiple ICMP “Reply” (ICMP Type 0) packets. • This can also be from spoofed IP‟s (Sent packets, ICMP Type 8). • This saturates bandwidth on the servers up/down stream as well as CPU processing to process the ICMP packets and respond. • To do a replay flood you just spoof the SRC IP of the ICMP request. Radware Confidential Jan 2012 Slide 37
  • 38. “Dirt Jumper” • Dirt Jumper is a BOT currently at version 5. • Dirt jumper is used in various HTTP floods. • POST, GET and download floods are supported by the latest version of Dirt Jumper. • User Agent and Referrer randomization are supported too. Radware Confidential Jan 2012 Slide 38
  • 39. “Dirt Jumper C&C” Radware Confidential Jan 2012 Slide 39
  • 40. AGENDA 2012 Availability-based threats Attacks on the us banks Others 2012 popular attack patterns & trends
  • 41. Availability-based Threats Tree Availability- based Threats Network Floods Application Single-packet Low-and-Slow (Volumetric) Floods DoS ICMP Web Flood DNS SMTP Flood UPD Flood HTTPS SYN Flood Radware Confidential Jan 2012 Slide 41
  • 43. HTTP Reflection Attack Attacker Website A Website B (Victim) HTTP GET Radware Confidential Jan 2012 Slide
  • 44. HTTP Reflection Attack Example iframe, width=1, height=1 search.php Radware Confidential Jan 2012 Slide
  • 45. HTTPS – SSL Re Negotiation Attack THC-SSL DoS THC-SSL DOS was developed by a hacking group called The Hacker‟s Choice (THC), as a proof- of-concept to encourage vendors to patch a serious SSL vulnerability. THC-SSL-DOS, as with other “low and slow” attacks, requires only a small number of packets to cause denial-of-service for a fairly large server. It works by initiating a regular SSL handshake and then immediately requesting for the renegotiation of the encryption key, constantly repeating this server resource-intensive renegotiation request until all server resources have been exhausted. Radware Confidential Jan 2012 Slide 45
  • 46. Low & Slow Availability- based Threats Network Floods Application Single-packet Low-and-Slow (Volumetric) Floods DoS ICMP Web Flood DNS SMTP Flood UPD Flood HTTPS SYN Flood Radware Confidential Jan 2012 Slide 46
  • 47. Low & Slow • Slowloris • Sockstress • R.U.D.Y. • Simultaneous Connection Saturation Radware Confidential Jan 2012 Slide 47
  • 48. R.U.D.Y (R-U-Dead-Yet) R.U.D.Y. (R-U-Dead-Yet?) R.U.D.Y. (R-U-Dead-Yet?) is a slow-rate HTTP POST (Layer 7) denial-of-service tool created by Raviv Raz and named after the Children of Bodom album “Are You Dead Yet?” It achieves denial-of-service by using long form field submissions. By injecting one byte of information into an application POST field at a time and then waiting, R.U.D.Y. causes application threads to await the end of never-ending posts in order to perform processing (this behavior is necessary in order to allow web servers to support users with slower connections). Since R.U.D.Y. causes the target webserver to hang while waiting for the rest of an HTTP POST request, by initiating simultaneous connections to the server the attacker is ultimately able to exhaust the server‟s connection table and create a denial-of-service condition. Radware Confidential Jan 2012 Slide 48
  • 49. Slowloris Slowloris Slowloris is a denial-of-service (DoS) tool developed by the grey hat hacker “RSnake” that causes DoS by using a very slow HTTP request. By sending HTTP headers to the target site in tiny chunks as slow as possible (waiting to send the next tiny chunk until just before the server would time out the request), the server is forced to continue to wait for the headers to arrive. If enough connections are opened to the server in this fashion, it is quickly unable to handle legitimate requests. Slowloris is cross-platform, except due to Windows’ ~130 simultaneous socket use limit, it is only effective from UNIX-based systems which allow for more connections to be opened in parallel to a target server (although a GUI Python version of Slowloris dubbed PyLoris was able to overcome this limiting factor on Windows). Radware Confidential Jan 2012 Slide 49
  • 50. Radware Security Products Portfolio DefensePro Network & Server attack prevention device AppWall Web Application Firewall (WAF) APSolute Vision Management and security reporting & compliance Slide 50
  • 51. Thank You www.radware.com Radware Confidential Jan 2012

Hinweis der Redaktion

  1. -This pic is from the very beginning of the video, stating “There is an angry mob in the middle of the street”*Notes -  On September 9, 2012, an excerpt of the YouTube video was broadcast on Al-Nas TV, an Egyptian Islamist television station.[11][12]Demonstrations and violent protests against the film broke out on September 11 in Egypt and spread to other Arab and Muslim nations and some western countries.
  2. -Libyan riots top left - http://www.foreignpolicy.com/articles/2012/09/14/why_the_embassy_riots_wont_stop.-Lebonon riots bottom left - http://au.ibtimes.com/articles_slideshows/384606/20120915/lebanon-protesters-destroy-kentucky-fried-chicken-and-hardees-over-innocence-of-muslims-film-photos.htm
  3. Links about Izz as-Din al-Quassam The preacher - http://en.wikipedia.org/wiki/Izz_ad-Din_al-Qassam *Notes - The Levant includes most of modern Lebanon, Syria, Jordan, State of Palestine, Israel, Cyprus, Hatay Province of Turkey, some regions of northwestern Iraq and theSinai Peninsula.Links about the Cyber hacker group - http://www.globalpost.com/dispatches/globalpost-blogs/the-grid/who-are-the-izz-ad-din-al-qassam-cyber-fightershttp://www.ehackingnews.com/2012/12/izz-ad-din-al-qassam-cyber-fighters.htmlPic from - http://www.standupamericaus.org/terror-jihad/cyber-fighters-of-izz-al-din-al-qassam-alert-to-banks-in-usa/
  4. Links for translation of ababil - http://en.wikipedia.org/wiki/Ghods_AbabilThe pic from - http://en.wikipedia.org/wiki/File:Hirundo_abyssinica.jpgClaims of Iranian involvement -http://betabeat.com/2012/09/iran-possibly-behind-operation-ababil-cyber-attacks-against-financial-institutions/http://features.rr.com/article/0coOckreSy1vL?q=Bank+of+America
  5. Data taken from internal doc.
  6. Pic taken from - http://news.yahoo.com/americas-failing-grade-cyber-attack-readiness-153640058--abc-news-topstories.html
  7. -Taken from internal report.
  8. -Taken from internal report.
  9. Reflective attack - Attackers send forged requests of some type to a very large number of computers that will reply to the requests. Using spoofed SRC IP’s of the victim, which means all the replies will go to (and flood) the target.
  10. -Stateful inspection in the DNS area is limited. Was in smartdefense at CP, but how many people use it?-The server is forced to respond with ICMP packets “Destination Unreachable” (ICMP type3 Code 3) for port closed when udp packet arrives.-Returning ICMP type 3 further saturate (Packet size in return will be close to received packet).
  11. -Internal data.
  12. -The SYN flood attack simply sends a high rate of SYN’s with spoofed IP’s and the server is left waiting for the ACK.-This means the attacker needs much fewer hosts to exhaust target machine because no session is actually kept alive on the “Attackers” side.-You exhaust the Backlog of the TCP stack (Linux default is 3mins and Win2k is 45 sec. for half open timeouts, these can be changed). So the server can no longer accept a new connection.-
  13. -Another reported attack technique that was allegedly used during this campaign is a custom version of the Mobile LOIC tool (aka Mobile LOIC - Apache Killer) which is designed to exploit a known vulnerability in Apache servers – corresponding to CVE-2011-3192.-This attack tool targets Apache servers using Apache HTTP server versions 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19.
  14. Target URL- Specifies the URL of the attacked target. Must start with http://. Requests per second-Specifies the number of desired requests to be sent per second. Append message-Specifies the content for the “msg” parameter to be sent within the URL of HTTP requests
  15. Resource internal.
  16. -This value is unique since it seems to contain a typo which is caused by placing the “User Agent:” string inside the user agent value itself.Resource internal.
  17. Resource internal.
  18. Resource internal.
  19. Internal resources.
  20. -Taken from Radware internal resources.
  21. The image above shows how the agent controls the Botnet: The „Today‟ and „Online‟ shows the number of computers under its control, the „URLs‟ specify the URLs to be attacked, the „Flows‟ specify the attack vector and attack intensity, and the „Start‟ and „Stop‟ allows the agent to inflict pain and voluntarily stop it.
  22. Identification: referrer (ask the audience)