SlideShare una empresa de Scribd logo
1 de 22
2
EXPLOITS – FROM 0DAY TO ONGOING
THREAT
ANDREAS FOBIAN, SECURITY RESEARCHER G DATA
OVERVIEW
 What are Exploits?
 Exploit Evolution
 Change of attack vectors
 Lifecycle of a 0day
 Defensive strategies/ technologies
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 3
EXPLOITS - MOTIVATION
 Definition: „Programm using a vulnerbility to execute
arbitrary programms, not limited to calc.exe “
 Exploit Kits: Framework for infections using exploits
 50 – 200 Mio $ loss using exploit kits
 Bitkom: 14 billon $ loss in buisness sector
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 4
EXPLOITS 101
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 5
Load Website
Create layout
Load images
Render graphic and
show layout
Wait for Input Load Exploit
IEXPLORER.EXE
MSHTML.DLL
HTML
JPG
JS
Malicious
Code
(Shellcode)
JSCRIPT.DLL
ROOT CAUSE: COMPLEXITY
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 6
0.00
2000.00
4000.00
6000.00
8000.00
10000.00
12000.00
14000.00
2007 2008 2009 2010 2011 2012 2013 2014 2015
KLOC (OK)
KLOC (Faults)
EVOLUTION OF ATTACK VECTORS
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 7
0
20
40
60
80
100
120
140
160
Q1/2005
Q2/2005
Q3/2005
Q4/2005
Q1/2006
Q2/2006
Q3/2006
Q4/2006
Q1/2007
Q2/2007
Q3/2007
Q4/2007
Q1/2008
Q2/2008
Q3/2008
Q4/2008
Q1/2009
Q2/2009
Q3/2009
Q4/2009
Q1/2010
Q2/2010
Q3/2010
Q4/2010
Q1/2011
Q2/2011
Q3/2011
Q4/2011
Q1/2012
Q2/2012
Q3/2012
Q4/2012
Q1/2013
Q2/2013
Q3/2013
Q4/2013
Q1/2014
Q2/2014
Q3/2014
Q4/2014
Q1/2015
Q2/2015
Q3/2015
jre_ek
jre
internet_explorer_ek
internet_explorer
flash_player_ek
flash_player
acrobat_reader_ek
acrobat_reader
LIFECYCLE OF AN EXPLOIT
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 8
Vulnerbility
released
Vendor notifies
Vulnerbility
Vulnerbility
published
Vulnerbility
found
Patch released
td
tv
tvd
tpd ta
Zero day Attack
Follow-on Attacks
Patchdeployment
finished
tp
Reactive
Protectionmechanisms
published
ts
TARGETED ATTACK -> EXPLOIT KIT
 3 Flash 0Days
 0-”day”: October 2013 – 5.Juli 2015
 Exploit Kit Integration 7.Juli 2015
 Fixed 10. Juli 2015
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015
Example: Hacking Team
9
EVOLUTION OF ATTACK VECTORS
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 10
0
20
40
60
80
100
120
140
160
Q1/2005
Q2/2005
Q3/2005
Q4/2005
Q1/2006
Q2/2006
Q3/2006
Q4/2006
Q1/2007
Q2/2007
Q3/2007
Q4/2007
Q1/2008
Q2/2008
Q3/2008
Q4/2008
Q1/2009
Q2/2009
Q3/2009
Q4/2009
Q1/2010
Q2/2010
Q3/2010
Q4/2010
Q1/2011
Q2/2011
Q3/2011
Q4/2011
Q1/2012
Q2/2012
Q3/2012
Q4/2012
Q1/2013
Q2/2013
Q3/2013
Q4/2013
Q1/2014
Q2/2014
Q3/2014
Q4/2014
Q1/2015
Q2/2015
Q3/2015
jre_ek
jre
internet_explorer_ek
internet_explorer
flash_player_ek
flash_player
acrobat_reader_ek
acrobat_reader
0
1
2
3
4
5
6
7
8
9
java
internet_explorer
flash_player
acrobat_reader
RELEASED EXPLOITS PER QUARTER
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 11
ASLR/DEP Sandboxing Click to play Vector Check
DEP (DATA EXECUTION PREVENTION)
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 12
Load Website
Create layout
Load images
Render graphic and
show layout
Wait for Input Load Exploit
IEXPLORER.EXE
MSHTML.DLL
HTML
JPG
JS
Malicious
Code
(Shellcode)
JSCRIPT.DLL
DEP (DATA EXECUTION PREVENTION)
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 13
Load Website
Create layout
Load images
Render graphic and
show layout
Wait for Input Load Exploit
IEXPLORER.EXE
MSHTML.DLL
HTML
JPG
JS
Malicious
Code
(Shellcode)
JSCRIPT.DLL
ROP (RETURN ORIENTED PROGRAMMING)
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 14
Load Website
Create layout
Load images
Render graphic and
show layout
Wait for Input Load Exploit
IEXPLORER.EXE
MSHTML.DLL
HTML
JPG
JS
Malicious
Code
(Shellcode)
JSCRIPT.DLL
ASLR (ADDRESS SPACE LAYOUT RANDOMIZATION)
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 15
Load Website
Create layout
Load images
Render graphic and
show layout
Wait for Input Load Exploit
IEXPLORER.EXE
MSHTML.DLL
HTML
JPG
JS
Malicious
Code
(Shellcode)
JSCRIPT.DLL
ASLR (ADDRESS SPACE LAYOUT RANDOMIZATION)
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 16
Load Website
Create layout
Load images
Render graphic and
show layout
Wait for Input Load Exploit
MSHTMT.DLL
JSCRIPT.DLL
JPG
JS
HTML
Malicious
Code
(Shellcode)
IEXPLORER.EXE
14 billon $ loss?
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 17
EXPLOIT PROTECTION
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 18
ADDRESS TABLE FILTER
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 19
Load Website
Create layout
Load images
Render graphic and
show layout
Wait for Input Load Exploit
IEXPLORER.EXE
MSHTML.DLL
HTML
JPG
JS
Malicious
Code
(Shellcode)
JSCRIPT.DLL
CONCLUSION
 Fixing all security bugs is expensive
 A look at the past show:
 Killing offensive techniques forces attackers to develop new techniques
 Goal: Increasing the cost of a functional attack
 Mitigation Software
 Patchmanagement
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 20
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 21
… THANK YOU!
Exploits - from zero day to ongoing threat

Más contenido relacionado

Similar a Exploits - from zero day to ongoing threat

CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCanSecWest
 
Module 1 - Evolution to Secure DevOps.pptx
Module 1 - Evolution to Secure DevOps.pptxModule 1 - Evolution to Secure DevOps.pptx
Module 1 - Evolution to Secure DevOps.pptxaaronpham13
 
Highway to heaven - Microservices Meetup Munich
Highway to heaven - Microservices Meetup MunichHighway to heaven - Microservices Meetup Munich
Highway to heaven - Microservices Meetup MunichChristian Deger
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software securityMarco Morana
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Improving web application security, part ii
Improving web application security, part iiImproving web application security, part ii
Improving web application security, part iiKangkan Goswami
 
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...Juarez Junior
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaHamilton Oliveira
 
High Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechHigh Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechC4Media
 
Building Microservices in the cloud at AutoScout24
Building Microservices in the cloud at AutoScout24Building Microservices in the cloud at AutoScout24
Building Microservices in the cloud at AutoScout24Christian Deger
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
Software rotting - 28 Apr - DeveloperWeek Europe 2022
Software rotting - 28 Apr - DeveloperWeek Europe 2022Software rotting - 28 Apr - DeveloperWeek Europe 2022
Software rotting - 28 Apr - DeveloperWeek Europe 2022Giulio Vian
 
apidays Paris 2022 - Blurred Lines, Denis Jannot, Solo.io
apidays Paris 2022 - Blurred Lines, Denis Jannot, Solo.ioapidays Paris 2022 - Blurred Lines, Denis Jannot, Solo.io
apidays Paris 2022 - Blurred Lines, Denis Jannot, Solo.ioapidays
 
Continuously Delivering Distributed Systems
Continuously Delivering Distributed SystemsContinuously Delivering Distributed Systems
Continuously Delivering Distributed SystemsDaniel Löffelholz
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien DNUG e.V.
 
Juarez Barbosa Junior - Microsoft - OSL19
Juarez Barbosa Junior - Microsoft - OSL19Juarez Barbosa Junior - Microsoft - OSL19
Juarez Barbosa Junior - Microsoft - OSL19marketingsyone
 

Similar a Exploits - from zero day to ongoing threat (20)

Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
 
Module 1 - Evolution to Secure DevOps.pptx
Module 1 - Evolution to Secure DevOps.pptxModule 1 - Evolution to Secure DevOps.pptx
Module 1 - Evolution to Secure DevOps.pptx
 
Highway to heaven - Microservices Meetup Munich
Highway to heaven - Microservices Meetup MunichHighway to heaven - Microservices Meetup Munich
Highway to heaven - Microservices Meetup Munich
 
Infosecurity - CDMX 2018
Infosecurity - CDMX 2018Infosecurity - CDMX 2018
Infosecurity - CDMX 2018
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software security
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Improving web application security, part ii
Improving web application security, part iiImproving web application security, part ii
Improving web application security, part ii
 
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
The Trinity in Exponential Technologies: Open Source, Blockchain and Microsof...
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
High Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechHigh Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in Adtech
 
Building Microservices in the cloud at AutoScout24
Building Microservices in the cloud at AutoScout24Building Microservices in the cloud at AutoScout24
Building Microservices in the cloud at AutoScout24
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Software rotting - 28 Apr - DeveloperWeek Europe 2022
Software rotting - 28 Apr - DeveloperWeek Europe 2022Software rotting - 28 Apr - DeveloperWeek Europe 2022
Software rotting - 28 Apr - DeveloperWeek Europe 2022
 
Security engineering
Security engineeringSecurity engineering
Security engineering
 
apidays Paris 2022 - Blurred Lines, Denis Jannot, Solo.io
apidays Paris 2022 - Blurred Lines, Denis Jannot, Solo.ioapidays Paris 2022 - Blurred Lines, Denis Jannot, Solo.io
apidays Paris 2022 - Blurred Lines, Denis Jannot, Solo.io
 
Continuously Delivering Distributed Systems
Continuously Delivering Distributed SystemsContinuously Delivering Distributed Systems
Continuously Delivering Distributed Systems
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien
 
Juarez Barbosa Junior - Microsoft - OSL19
Juarez Barbosa Junior - Microsoft - OSL19Juarez Barbosa Junior - Microsoft - OSL19
Juarez Barbosa Junior - Microsoft - OSL19
 

Último

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Exploits - from zero day to ongoing threat

  • 1.
  • 2. 2 EXPLOITS – FROM 0DAY TO ONGOING THREAT ANDREAS FOBIAN, SECURITY RESEARCHER G DATA
  • 3. OVERVIEW  What are Exploits?  Exploit Evolution  Change of attack vectors  Lifecycle of a 0day  Defensive strategies/ technologies G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 3
  • 4. EXPLOITS - MOTIVATION  Definition: „Programm using a vulnerbility to execute arbitrary programms, not limited to calc.exe “  Exploit Kits: Framework for infections using exploits  50 – 200 Mio $ loss using exploit kits  Bitkom: 14 billon $ loss in buisness sector G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 4
  • 5. EXPLOITS 101 G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 5 Load Website Create layout Load images Render graphic and show layout Wait for Input Load Exploit IEXPLORER.EXE MSHTML.DLL HTML JPG JS Malicious Code (Shellcode) JSCRIPT.DLL
  • 6. ROOT CAUSE: COMPLEXITY G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 6 0.00 2000.00 4000.00 6000.00 8000.00 10000.00 12000.00 14000.00 2007 2008 2009 2010 2011 2012 2013 2014 2015 KLOC (OK) KLOC (Faults)
  • 7. EVOLUTION OF ATTACK VECTORS G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 7 0 20 40 60 80 100 120 140 160 Q1/2005 Q2/2005 Q3/2005 Q4/2005 Q1/2006 Q2/2006 Q3/2006 Q4/2006 Q1/2007 Q2/2007 Q3/2007 Q4/2007 Q1/2008 Q2/2008 Q3/2008 Q4/2008 Q1/2009 Q2/2009 Q3/2009 Q4/2009 Q1/2010 Q2/2010 Q3/2010 Q4/2010 Q1/2011 Q2/2011 Q3/2011 Q4/2011 Q1/2012 Q2/2012 Q3/2012 Q4/2012 Q1/2013 Q2/2013 Q3/2013 Q4/2013 Q1/2014 Q2/2014 Q3/2014 Q4/2014 Q1/2015 Q2/2015 Q3/2015 jre_ek jre internet_explorer_ek internet_explorer flash_player_ek flash_player acrobat_reader_ek acrobat_reader
  • 8. LIFECYCLE OF AN EXPLOIT G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 8 Vulnerbility released Vendor notifies Vulnerbility Vulnerbility published Vulnerbility found Patch released td tv tvd tpd ta Zero day Attack Follow-on Attacks Patchdeployment finished tp Reactive Protectionmechanisms published ts
  • 9. TARGETED ATTACK -> EXPLOIT KIT  3 Flash 0Days  0-”day”: October 2013 – 5.Juli 2015  Exploit Kit Integration 7.Juli 2015  Fixed 10. Juli 2015 G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 Example: Hacking Team 9
  • 10. EVOLUTION OF ATTACK VECTORS G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 10 0 20 40 60 80 100 120 140 160 Q1/2005 Q2/2005 Q3/2005 Q4/2005 Q1/2006 Q2/2006 Q3/2006 Q4/2006 Q1/2007 Q2/2007 Q3/2007 Q4/2007 Q1/2008 Q2/2008 Q3/2008 Q4/2008 Q1/2009 Q2/2009 Q3/2009 Q4/2009 Q1/2010 Q2/2010 Q3/2010 Q4/2010 Q1/2011 Q2/2011 Q3/2011 Q4/2011 Q1/2012 Q2/2012 Q3/2012 Q4/2012 Q1/2013 Q2/2013 Q3/2013 Q4/2013 Q1/2014 Q2/2014 Q3/2014 Q4/2014 Q1/2015 Q2/2015 Q3/2015 jre_ek jre internet_explorer_ek internet_explorer flash_player_ek flash_player acrobat_reader_ek acrobat_reader
  • 11. 0 1 2 3 4 5 6 7 8 9 java internet_explorer flash_player acrobat_reader RELEASED EXPLOITS PER QUARTER G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 11 ASLR/DEP Sandboxing Click to play Vector Check
  • 12. DEP (DATA EXECUTION PREVENTION) G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 12 Load Website Create layout Load images Render graphic and show layout Wait for Input Load Exploit IEXPLORER.EXE MSHTML.DLL HTML JPG JS Malicious Code (Shellcode) JSCRIPT.DLL
  • 13. DEP (DATA EXECUTION PREVENTION) G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 13 Load Website Create layout Load images Render graphic and show layout Wait for Input Load Exploit IEXPLORER.EXE MSHTML.DLL HTML JPG JS Malicious Code (Shellcode) JSCRIPT.DLL
  • 14. ROP (RETURN ORIENTED PROGRAMMING) G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 14 Load Website Create layout Load images Render graphic and show layout Wait for Input Load Exploit IEXPLORER.EXE MSHTML.DLL HTML JPG JS Malicious Code (Shellcode) JSCRIPT.DLL
  • 15. ASLR (ADDRESS SPACE LAYOUT RANDOMIZATION) G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 15 Load Website Create layout Load images Render graphic and show layout Wait for Input Load Exploit IEXPLORER.EXE MSHTML.DLL HTML JPG JS Malicious Code (Shellcode) JSCRIPT.DLL
  • 16. ASLR (ADDRESS SPACE LAYOUT RANDOMIZATION) G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 16 Load Website Create layout Load images Render graphic and show layout Wait for Input Load Exploit MSHTMT.DLL JSCRIPT.DLL JPG JS HTML Malicious Code (Shellcode) IEXPLORER.EXE
  • 17. 14 billon $ loss? G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 17
  • 18. EXPLOIT PROTECTION G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 18
  • 19. ADDRESS TABLE FILTER G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 19 Load Website Create layout Load images Render graphic and show layout Wait for Input Load Exploit IEXPLORER.EXE MSHTML.DLL HTML JPG JS Malicious Code (Shellcode) JSCRIPT.DLL
  • 20. CONCLUSION  Fixing all security bugs is expensive  A look at the past show:  Killing offensive techniques forces attackers to develop new techniques  Goal: Increasing the cost of a functional attack  Mitigation Software  Patchmanagement G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 20
  • 21. G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 21 … THANK YOU!

Notas del editor

  1. Kurzer Aufriss Überblick, was sind Exploits? Entwicklung auf dem Gebiet: Veränderungen der Angriffsvektoren Zeitlicher Verlauf eines Exploits Entdeckung, Ausnutzung, Patch Gewonnene Erkenntniss Umsetzen zur Bekämpfung
  2. -Was ist eine Exploit? -Definition -Grobe Hochrechnung, Marktanteil eines EK - Hochrechnung Magnitude EK + CryptoWall - 60k Pro Woche - CryptoWall 23des Traffics - 31% Marktanzeil
  3. Highlevel Überblick auf Broswer Exploit Als erstes Normaler Ablauf Dann Unterschied zu Exploit Lila: ProgrammCode Gelb: Daten
  4. - Können wir einfach alle Bugs Patchen? -> Nein Komplexität Windows Quellcode, 1993 -2007 1993 Windows NT 3.1 - 4-5 Mio 1994 Windows NT 3.5 – 7-8 Mio 1996 Windows NT 4.0 – 11-12 Mio 2000 Windows 2000 – 29 Mio 2001 Windows XP – 40 Mio 2007 Windows Vista - 50Mio 10 -50 Fehler pro 1000 Zeilen Code Nicht alle ausnutzbar Statistik über Schwachstellen folgt jetzt
  5. Zeitliche Analyze der CVE Datenbank CVE( Common Vulnerabilties and Exposures)) Java, Internet Explorer, Flash, Acrobat Reader Generell steigender Trend In the wild Angriffe: Nur wenige Wirklich Ausgenutzt
  6. Start : Sicherheitslücke wird eingebaut Exploits existieren vor Ihrer Veröffentlichung: 300 Tage Response/Patch Zeit: XXX Tage Patch Deployment Zeit: XXX Tage abhängig von AutoUpdate und anderen Faktoren
  7. Beispiel aus der nahen Vergangenheit Hacking Team Breach
  8. Zeitliche Analyze der CVE Datenbank CVE( Common Vulnerabilties and Exposures)) Java, Internet Explorer, Flash, Acrobat Reader Generell steigender Trend In the wild Angriffe: Nur wenige Wirklich Ausgenutzt
  9. ASLR/DEP: 2 Sicherheitsfeatures, werden gleich ausführlicher (IE,ADOBE,FLASH) Adobe Sandboxing: ein erfolgreicher Angriff ist nicht mehr so interessant Java Click2play: Sicherheitsabfrage im Browser Flash Vector Checking: neuer Sicherheitscheck, es wird sich zeigen welche Veränderung daraus folgt
  10. - Was kann man umsetzen, um die Situation zu verbessern?