SlideShare una empresa de Scribd logo
1 de 40
© 2015 Imperva, Inc. All rights reserved.
Man in the Cloud Attacks
Sagie Dulce, Amichai Shulman
August 5th, 2015
© 2015 Imperva, Inc. All rights reserved.
A Little Bit About Us
• Amichai Shulman
• CTO and Co-Founder of Imperva
• >20 Years Information Security
Experience
• >25 Years Information Technology
Experience
• Sagie Dulce
• Research Team Leader in Imperva
• >10 Years Information Security
Experience
2
© 2015 Imperva, Inc. All rights reserved.
Agenda
• Motivation
– What’s wrong with current botnets
– Why cloud file synchronization services
– Why use passwords when you can pass the token
• MITC Attacks
– Concept & details
– Demo
• Resilience of MITC attacks
– How hard is it to detect and mitigate
• Conclusions & Mitigation
3
© 2015 Imperva, Inc. All rights reserved.
Motivation (I)
What’s wrong with current botnets?
1
© 2015 Imperva, Inc. All rights reserved.
Infection Chain Vs. Kill Chain
• Some things you allegedly need for
a botnet
– 0-day exploit
– Injection code
– Malware persistence
– Communication channel and protocol
– C&C and Drop server infrastructure with
your own code
• Some things security solutions claim
to do
– Detect malicious code
– Detect malicious code behavior
– Identify malicious persistent code
– Detect malicious communication
channels
– Detect unusual communication
channels
– Detect communication with bad servers
– Take down malicious servers
5
© 2015 Imperva, Inc. All rights reserved.
The Holy Grail of Attackers
• Don’t use complex exploits
• Don’t need to install malicious
software
• Don’t need to build C&C
infrastructure
• Don’t use shady network protocols
for exfiltration
• Rely on existing software
• Use standard communication
channels
• Rely on existing infrastructure for
C&C and data collection
6
© 2015 Imperva, Inc. All rights reserved.
Motivation (II)
Why Use Cloud File Synchronization Services
2
© 2015 Imperva, Inc. All rights reserved.
Because It’s Cool
8
© 2015 Imperva, Inc. All rights reserved.
Because They are There
• Gartner calls this EFSS
– Enterprise File Sharing and
Synchronization
• 42% of more than 300 surveyed IT
professionals had a corporate
account for online file sharing and
collaboration services this year,
compared to 28% in 2012,
according to McClure
• OneDrive, Google Drive, Box &
DropBox > 65% of business usage
9
Business Usage Survey
451 Research
Mobile Downloads (Millions)
Xyo
© 2015 Imperva, Inc. All rights reserved.
The Workings of EFSS
• Corporate Data accessed
within perimeter
• Downloaded to Mobile
• Accessed by 3rd party apps
10
© 2015 Imperva, Inc. All rights reserved.
EFSS Has All the Right Pieces
• Global robust server deployment
• C&C and data delivery protocols
– Encrypted with TLS
– Whitelisted by perimeter security
• Local software agent for delivering data in and out of the machine
– Whitelisted by any endpoint security software
• Free entry level offerings 
– Business and personal use
• Global mindshare and recognition
11
© 2015 Imperva, Inc. All rights reserved.
Motivation (III)
Why use passwords when you can “Pass The
Token”?
3
© 2015 Imperva, Inc. All rights reserved.
(OAuth) Tokens
• Token is generated through interactive authentication (user name / password)
• Token can be associated with limited set of privileges
– Application access ≠ Account control
• Token is provided to 3rd party application
– Persistently stored as part of the application’s configuration
• Authentication = Present Token
• Revoking the token prevents further access by 3rd party application
13
© 2015 Imperva, Inc. All rights reserved.
Passwords Vs. Tokens
• Passwords are easy to remember –
easy to crack
• Passwords can and need to
frequently change
• Passwords are good for (human)
interactive authentication
• Tokens are difficult to guess
(arbitrarily long and random)
• Do not need to change frequently
• Tokens can be revoked
• Tokens should be used for
application authentication
14
© 2015 Imperva, Inc. All rights reserved.15
Getting Tokens
© 2015 Imperva, Inc. All rights reserved.
Passwords Vs. Tokens (Round 2)
• Password authentication may
require 2FA
• Password authentication is sensitive
to new device, new location
protection
• Password only available when user
types it
• Password is valid through a limited
timeframe
• Token authentication is seamless
• Token authentication is (in practice)
insensitive to new device / new
location protection
• Token is always available as part of
the persistent configuration
• Tokens are forever (sometimes
literally)
• Difficult to attribute
16
© 2015 Imperva, Inc. All rights reserved.
Man In The Cloud (MITC) Attacks
The Sky is Falling
4
17
© 2015 Imperva, Inc. All rights reserved.
Concept
• Abuse cloud file synchronization services
– Data compromise
– Data exfiltration
– C&C and remote access
• Highlights of the attack plan
– Synchronize victim’s machine with attacker controlled account
– Obtain victim’s token through the synchronization mechanism
– Retrieve sensitive data from the victim’s account using the victim’s token
– Potentially send code for remote execution through the synchronization mechanism
18
© 2015 Imperva, Inc. All rights reserved.
Synchronize Victim’s Machine with Attacker Account
• As a first step, attacker creates an account rather than compromise the
victim’s account
– The attacker obtains the authentication token for that account
• Code executes on victim’s machine to “switch” synchronization account
– Stop synchronization application
– Replace the existing token with the attacker token
– Restart synchronization application
19
© 2015 Imperva, Inc. All rights reserved.
Finding and Replacing Tokens
• More details available in our HII report
20
Synchronization
Application
Token Type OAuth Refresh Token OAuth Refresh Token OAuth Refresh Token Proprietary
Location
Windows Credential
Manager
Windows Credential
Manager
Encrypted in Registry Encrypted SQLite file
© 2015 Imperva, Inc. All rights reserved.
Obtain Victim’s Token
• Put the original token in a file
• Put the file in the synchronization folder
• Wait for the file to appear on the other side of earth
21
© 2015 Imperva, Inc. All rights reserved.
Some Details – Google Drive
• OAuth Refresh Token
• Retrieve token
– Decrypt registry using Windows CryptUnprotectData
HKCUSoftwareGoogleDriveOAuthToken_***unique**
• Replace token (while app inactive)
– Delete “old” registry entry & replace with harvested entry
HKCUSoftwareGoogleDriveOAuthToken_**new**
– Encrypt harvested token using Windows CryptProtectData
– Replace each row inside the data table in sync_config.db with the attacker’s data, except
for the “local_sync_root_path” entry (which holds the path to the vicitm’s synced folder
22
© 2015 Imperva, Inc. All rights reserved.
Some Details – The “Malicious” Code
23
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Quick Double Switch
25
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Quick Double Switch
26
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Quick Double Switch
27
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Remote Code Execution
28
© 2015 Imperva, Inc. All rights reserved.
Remote Code Execution - Details
• WMI event subscription
• Waiting on file creation
in sync folder
• Created file is executed
• “mofcomp config.mof”
29
© 2015 Imperva, Inc. All rights reserved.
Demo
30
© 2015 Imperva, Inc. All rights reserved.
Additional Attack Scenarios
• Waiting for good things to come
– Inject scripts and macros into synchronized documents
– Hope that victim opens such a document
– Increase probability by piggybacking on active documents
• Cloud RansomWare
– Encrypt victim’s data and demand ransom
31
© 2015 Imperva, Inc. All rights reserved.
Native Detection and Mitigation
How bad is it?
5
32
© 2015 Imperva, Inc. All rights reserved.
Detecting a Compromise
33
Synchronization
Application
Proactive (alerts) None None None
None (if attacker spoofs
the device ID)
Reactive (forensics)
Review history of
connected locations and
devices
Review history of
connected locations and
devices
None
Constantly monitor last
connected location
© 2015 Imperva, Inc. All rights reserved.
Recovery From a Compromise
34
Synchronization
Application
Turn on 2FA
Not applicable to
tokens
Not applicable to
tokens
Not applicable to
tokens
Not applicable to
“host_id”
Revoke Stolen Token
Disconnecting
devices doesn’t
revoke token
Disconnect Devices Disconnect devices Disconnect Devices
Change Password
Revokes tokens.
Opened “sessions”
remain open
Specifically Request
to revoke all tokens
Revokes all tokens
Not applicable to
host_id
© 2015 Imperva, Inc. All rights reserved.
Takedown
• IT infrastructure of the Botnet cannot be taken down
– It’s a vital service most of us use
• Attacker’s account is NEVER compromised
– Even if token is exposed during initial infection it is extremely difficult to associate with an
account (with the exception of DropBox )
• It is therefore extremely difficult to take down the specific account used for the
initial compromise
– Moreover, it has no actual effect on existing infections or future ones
35
© 2015 Imperva, Inc. All rights reserved.
Conclusions & Mitigations
6
© 2015 Imperva, Inc. All rights reserved.
Summary
• Cloud file synchronization services can be easily turned into an infrastructure
for endpoint compromise, providing a channel for C&C, data exfiltration, and
remote access
• Compromise can be achieved through the use of tokens rather than
passwords
• Due to the use of tokens, compromise is almost undetectable and sometimes
irreversible (for an account)
• Attacks based on the above architecture have been witnessed in the wild (for
example, in “The Inception Framework ” – analysis by Blue Coat)
37
© 2015 Imperva, Inc. All rights reserved.
Mitigation
• Endpoint and perimeter security measures are incapable of detecting and
mitigating this threat as no malicious code persists on the endpoint, and no
abnormal outbound traffic channels are observed on the wire
• Vendors could do better
– Improve proactive detection (location alerts for tokens)
– 2FA for new devices (even with token access only)
– Allow revocation of any existing application token
• Vendor will always struggle though with the right balance of security and
mobility
38
© 2015 Imperva, Inc. All rights reserved.
Mitigation – Improve Control of EFSS
• Cloud Access Security Broker (CASB) Solutions
– Anomaly detection and device control at the enterprise level rather than the individual
service level
– Apply enterprise wide policies to new devices
– Block & alert on rapid changes in location
– Alert on abnormal usage (file loaded from one device and deleted quickly on another for
example)
39
© 2015 Imperva, Inc. All rights reserved.
Mitigation – It’s All About the Data, Stupid!
• Attackers are after enterprise data and not after individual endpoints
• A successful attack (e.g. 145M user accounts, 70M credit card numbers, 300K
medical records, 4M employee evaluation forms) must express itself in
abusive data access
• Deploy monitoring, detection and control solutions around data repositories
– SQL databases, NoSQL repositories, File servers, SharePoint deployments
– See everything, detect abnormal and abusive access patterns, react by denying further
access to potentially compromised machines and accounts
40
• Download HII report
– https://www.imperva.com/DefenseCenter/HackerIntelligenceReports

Más contenido relacionado

La actualidad más candente

Cài đặt và cấu hình dns server trên windows server 2012
Cài đặt và cấu hình dns server trên windows server 2012Cài đặt và cấu hình dns server trên windows server 2012
Cài đặt và cấu hình dns server trên windows server 2012
laonap166
 
PHÂN TÍCH THIẾT KẾ HỆ THỐNG BÁN HÀNG QUA MẠNG
PHÂN TÍCH THIẾT KẾ HỆ THỐNG BÁN HÀNG QUA MẠNGPHÂN TÍCH THIẾT KẾ HỆ THỐNG BÁN HÀNG QUA MẠNG
PHÂN TÍCH THIẾT KẾ HỆ THỐNG BÁN HÀNG QUA MẠNG
Thùy Linh
 

La actualidad más candente (20)

Mise en place d'une infrastructure basée sur OpenStack
Mise en place d'une infrastructure basée sur OpenStack Mise en place d'une infrastructure basée sur OpenStack
Mise en place d'une infrastructure basée sur OpenStack
 
Cài đặt và cấu hình dns server trên windows server 2012
Cài đặt và cấu hình dns server trên windows server 2012Cài đặt và cấu hình dns server trên windows server 2012
Cài đặt và cấu hình dns server trên windows server 2012
 
Online Leave Management Project
Online Leave Management ProjectOnline Leave Management Project
Online Leave Management Project
 
Tìm hiểu MongoDB
Tìm hiểu MongoDBTìm hiểu MongoDB
Tìm hiểu MongoDB
 
Chapter8 application layer
Chapter8 application layerChapter8 application layer
Chapter8 application layer
 
Báo cáo thực tập công nghệ thông tin.
Báo cáo thực tập công nghệ thông tin.Báo cáo thực tập công nghệ thông tin.
Báo cáo thực tập công nghệ thông tin.
 
Đề tài: Quản lý cửa hàng điện thoại di động, HAY
Đề tài: Quản lý cửa hàng điện thoại di động, HAYĐề tài: Quản lý cửa hàng điện thoại di động, HAY
Đề tài: Quản lý cửa hàng điện thoại di động, HAY
 
Phân Tích Thiết Kế Hệ Thống Thông Tin - Quản Lý Điểm
Phân Tích Thiết Kế Hệ Thống Thông Tin -  Quản Lý ĐiểmPhân Tích Thiết Kế Hệ Thống Thông Tin -  Quản Lý Điểm
Phân Tích Thiết Kế Hệ Thống Thông Tin - Quản Lý Điểm
 
Đề tài: Xây dựng trang Web bán hàng điện tử bằng Opencart, HOT
Đề tài: Xây dựng trang Web bán hàng điện tử bằng Opencart, HOTĐề tài: Xây dựng trang Web bán hàng điện tử bằng Opencart, HOT
Đề tài: Xây dựng trang Web bán hàng điện tử bằng Opencart, HOT
 
Cain & abel
Cain & abelCain & abel
Cain & abel
 
Đồ án kiểm thử phần mềm
Đồ án kiểm thử phần mềmĐồ án kiểm thử phần mềm
Đồ án kiểm thử phần mềm
 
Luận văn Thạc sĩ xây dựng website thương mại điện tử, áp dụng cho bán sách tr...
Luận văn Thạc sĩ xây dựng website thương mại điện tử, áp dụng cho bán sách tr...Luận văn Thạc sĩ xây dựng website thương mại điện tử, áp dụng cho bán sách tr...
Luận văn Thạc sĩ xây dựng website thương mại điện tử, áp dụng cho bán sách tr...
 
PHÂN TÍCH THIẾT KẾ HỆ THỐNG BÁN HÀNG QUA MẠNG
PHÂN TÍCH THIẾT KẾ HỆ THỐNG BÁN HÀNG QUA MẠNGPHÂN TÍCH THIẾT KẾ HỆ THỐNG BÁN HÀNG QUA MẠNG
PHÂN TÍCH THIẾT KẾ HỆ THỐNG BÁN HÀNG QUA MẠNG
 
PP Hệ thống thông tin - Hệ thống quản lý khách sạn
PP Hệ thống thông tin - Hệ thống quản lý khách sạnPP Hệ thống thông tin - Hệ thống quản lý khách sạn
PP Hệ thống thông tin - Hệ thống quản lý khách sạn
 
Student Database Management System
Student Database Management SystemStudent Database Management System
Student Database Management System
 
Data center proposal
Data center proposalData center proposal
Data center proposal
 
Bài 4: Triển khai Active Directory: Quản trị nhóm - Giáo trình FPT
Bài 4: Triển khai Active Directory: Quản trị nhóm - Giáo trình FPTBài 4: Triển khai Active Directory: Quản trị nhóm - Giáo trình FPT
Bài 4: Triển khai Active Directory: Quản trị nhóm - Giáo trình FPT
 
Uml hà
Uml hàUml hà
Uml hà
 
Luan van xay_dung_he_thong_mang_lan_cho_truong_dai_hoc
Luan van xay_dung_he_thong_mang_lan_cho_truong_dai_hocLuan van xay_dung_he_thong_mang_lan_cho_truong_dai_hoc
Luan van xay_dung_he_thong_mang_lan_cho_truong_dai_hoc
 
Chuong 1. cnpm
Chuong 1. cnpmChuong 1. cnpm
Chuong 1. cnpm
 

Destacado

IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
Irissolution
 

Destacado (20)

The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsThe State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
 
Saving The Internet of Things: Presentation to Facebook
Saving The Internet of Things: Presentation to FacebookSaving The Internet of Things: Presentation to Facebook
Saving The Internet of Things: Presentation to Facebook
 
Intimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of ThingsIntimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of Things
 
2015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
2015년 2분기 주요 정보보안 소식 차민석 공개판_201508102015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
2015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted Attacks
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat Intelligence
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 

Similar a Man in the Cloud Attacks

Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
WithTheBest
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 

Similar a Man in the Cloud Attacks (20)

Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADE
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
Going Beyond the Device Heart Beat
Going Beyond the Device Heart BeatGoing Beyond the Device Heart Beat
Going Beyond the Device Heart Beat
 
C days2015
C days2015C days2015
C days2015
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT Security
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 

Más de Imperva

Más de Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Man in the Cloud Attacks

  • 1. © 2015 Imperva, Inc. All rights reserved. Man in the Cloud Attacks Sagie Dulce, Amichai Shulman August 5th, 2015
  • 2. © 2015 Imperva, Inc. All rights reserved. A Little Bit About Us • Amichai Shulman • CTO and Co-Founder of Imperva • >20 Years Information Security Experience • >25 Years Information Technology Experience • Sagie Dulce • Research Team Leader in Imperva • >10 Years Information Security Experience 2
  • 3. © 2015 Imperva, Inc. All rights reserved. Agenda • Motivation – What’s wrong with current botnets – Why cloud file synchronization services – Why use passwords when you can pass the token • MITC Attacks – Concept & details – Demo • Resilience of MITC attacks – How hard is it to detect and mitigate • Conclusions & Mitigation 3
  • 4. © 2015 Imperva, Inc. All rights reserved. Motivation (I) What’s wrong with current botnets? 1
  • 5. © 2015 Imperva, Inc. All rights reserved. Infection Chain Vs. Kill Chain • Some things you allegedly need for a botnet – 0-day exploit – Injection code – Malware persistence – Communication channel and protocol – C&C and Drop server infrastructure with your own code • Some things security solutions claim to do – Detect malicious code – Detect malicious code behavior – Identify malicious persistent code – Detect malicious communication channels – Detect unusual communication channels – Detect communication with bad servers – Take down malicious servers 5
  • 6. © 2015 Imperva, Inc. All rights reserved. The Holy Grail of Attackers • Don’t use complex exploits • Don’t need to install malicious software • Don’t need to build C&C infrastructure • Don’t use shady network protocols for exfiltration • Rely on existing software • Use standard communication channels • Rely on existing infrastructure for C&C and data collection 6
  • 7. © 2015 Imperva, Inc. All rights reserved. Motivation (II) Why Use Cloud File Synchronization Services 2
  • 8. © 2015 Imperva, Inc. All rights reserved. Because It’s Cool 8
  • 9. © 2015 Imperva, Inc. All rights reserved. Because They are There • Gartner calls this EFSS – Enterprise File Sharing and Synchronization • 42% of more than 300 surveyed IT professionals had a corporate account for online file sharing and collaboration services this year, compared to 28% in 2012, according to McClure • OneDrive, Google Drive, Box & DropBox > 65% of business usage 9 Business Usage Survey 451 Research Mobile Downloads (Millions) Xyo
  • 10. © 2015 Imperva, Inc. All rights reserved. The Workings of EFSS • Corporate Data accessed within perimeter • Downloaded to Mobile • Accessed by 3rd party apps 10
  • 11. © 2015 Imperva, Inc. All rights reserved. EFSS Has All the Right Pieces • Global robust server deployment • C&C and data delivery protocols – Encrypted with TLS – Whitelisted by perimeter security • Local software agent for delivering data in and out of the machine – Whitelisted by any endpoint security software • Free entry level offerings  – Business and personal use • Global mindshare and recognition 11
  • 12. © 2015 Imperva, Inc. All rights reserved. Motivation (III) Why use passwords when you can “Pass The Token”? 3
  • 13. © 2015 Imperva, Inc. All rights reserved. (OAuth) Tokens • Token is generated through interactive authentication (user name / password) • Token can be associated with limited set of privileges – Application access ≠ Account control • Token is provided to 3rd party application – Persistently stored as part of the application’s configuration • Authentication = Present Token • Revoking the token prevents further access by 3rd party application 13
  • 14. © 2015 Imperva, Inc. All rights reserved. Passwords Vs. Tokens • Passwords are easy to remember – easy to crack • Passwords can and need to frequently change • Passwords are good for (human) interactive authentication • Tokens are difficult to guess (arbitrarily long and random) • Do not need to change frequently • Tokens can be revoked • Tokens should be used for application authentication 14
  • 15. © 2015 Imperva, Inc. All rights reserved.15 Getting Tokens
  • 16. © 2015 Imperva, Inc. All rights reserved. Passwords Vs. Tokens (Round 2) • Password authentication may require 2FA • Password authentication is sensitive to new device, new location protection • Password only available when user types it • Password is valid through a limited timeframe • Token authentication is seamless • Token authentication is (in practice) insensitive to new device / new location protection • Token is always available as part of the persistent configuration • Tokens are forever (sometimes literally) • Difficult to attribute 16
  • 17. © 2015 Imperva, Inc. All rights reserved. Man In The Cloud (MITC) Attacks The Sky is Falling 4 17
  • 18. © 2015 Imperva, Inc. All rights reserved. Concept • Abuse cloud file synchronization services – Data compromise – Data exfiltration – C&C and remote access • Highlights of the attack plan – Synchronize victim’s machine with attacker controlled account – Obtain victim’s token through the synchronization mechanism – Retrieve sensitive data from the victim’s account using the victim’s token – Potentially send code for remote execution through the synchronization mechanism 18
  • 19. © 2015 Imperva, Inc. All rights reserved. Synchronize Victim’s Machine with Attacker Account • As a first step, attacker creates an account rather than compromise the victim’s account – The attacker obtains the authentication token for that account • Code executes on victim’s machine to “switch” synchronization account – Stop synchronization application – Replace the existing token with the attacker token – Restart synchronization application 19
  • 20. © 2015 Imperva, Inc. All rights reserved. Finding and Replacing Tokens • More details available in our HII report 20 Synchronization Application Token Type OAuth Refresh Token OAuth Refresh Token OAuth Refresh Token Proprietary Location Windows Credential Manager Windows Credential Manager Encrypted in Registry Encrypted SQLite file
  • 21. © 2015 Imperva, Inc. All rights reserved. Obtain Victim’s Token • Put the original token in a file • Put the file in the synchronization folder • Wait for the file to appear on the other side of earth 21
  • 22. © 2015 Imperva, Inc. All rights reserved. Some Details – Google Drive • OAuth Refresh Token • Retrieve token – Decrypt registry using Windows CryptUnprotectData HKCUSoftwareGoogleDriveOAuthToken_***unique** • Replace token (while app inactive) – Delete “old” registry entry & replace with harvested entry HKCUSoftwareGoogleDriveOAuthToken_**new** – Encrypt harvested token using Windows CryptProtectData – Replace each row inside the data table in sync_config.db with the attacker’s data, except for the “local_sync_root_path” entry (which holds the path to the vicitm’s synced folder 22
  • 23. © 2015 Imperva, Inc. All rights reserved. Some Details – The “Malicious” Code 23
  • 24. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Quick Double Switch 25
  • 25. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Quick Double Switch 26
  • 26. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Quick Double Switch 27
  • 27. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Remote Code Execution 28
  • 28. © 2015 Imperva, Inc. All rights reserved. Remote Code Execution - Details • WMI event subscription • Waiting on file creation in sync folder • Created file is executed • “mofcomp config.mof” 29
  • 29. © 2015 Imperva, Inc. All rights reserved. Demo 30
  • 30. © 2015 Imperva, Inc. All rights reserved. Additional Attack Scenarios • Waiting for good things to come – Inject scripts and macros into synchronized documents – Hope that victim opens such a document – Increase probability by piggybacking on active documents • Cloud RansomWare – Encrypt victim’s data and demand ransom 31
  • 31. © 2015 Imperva, Inc. All rights reserved. Native Detection and Mitigation How bad is it? 5 32
  • 32. © 2015 Imperva, Inc. All rights reserved. Detecting a Compromise 33 Synchronization Application Proactive (alerts) None None None None (if attacker spoofs the device ID) Reactive (forensics) Review history of connected locations and devices Review history of connected locations and devices None Constantly monitor last connected location
  • 33. © 2015 Imperva, Inc. All rights reserved. Recovery From a Compromise 34 Synchronization Application Turn on 2FA Not applicable to tokens Not applicable to tokens Not applicable to tokens Not applicable to “host_id” Revoke Stolen Token Disconnecting devices doesn’t revoke token Disconnect Devices Disconnect devices Disconnect Devices Change Password Revokes tokens. Opened “sessions” remain open Specifically Request to revoke all tokens Revokes all tokens Not applicable to host_id
  • 34. © 2015 Imperva, Inc. All rights reserved. Takedown • IT infrastructure of the Botnet cannot be taken down – It’s a vital service most of us use • Attacker’s account is NEVER compromised – Even if token is exposed during initial infection it is extremely difficult to associate with an account (with the exception of DropBox ) • It is therefore extremely difficult to take down the specific account used for the initial compromise – Moreover, it has no actual effect on existing infections or future ones 35
  • 35. © 2015 Imperva, Inc. All rights reserved. Conclusions & Mitigations 6
  • 36. © 2015 Imperva, Inc. All rights reserved. Summary • Cloud file synchronization services can be easily turned into an infrastructure for endpoint compromise, providing a channel for C&C, data exfiltration, and remote access • Compromise can be achieved through the use of tokens rather than passwords • Due to the use of tokens, compromise is almost undetectable and sometimes irreversible (for an account) • Attacks based on the above architecture have been witnessed in the wild (for example, in “The Inception Framework ” – analysis by Blue Coat) 37
  • 37. © 2015 Imperva, Inc. All rights reserved. Mitigation • Endpoint and perimeter security measures are incapable of detecting and mitigating this threat as no malicious code persists on the endpoint, and no abnormal outbound traffic channels are observed on the wire • Vendors could do better – Improve proactive detection (location alerts for tokens) – 2FA for new devices (even with token access only) – Allow revocation of any existing application token • Vendor will always struggle though with the right balance of security and mobility 38
  • 38. © 2015 Imperva, Inc. All rights reserved. Mitigation – Improve Control of EFSS • Cloud Access Security Broker (CASB) Solutions – Anomaly detection and device control at the enterprise level rather than the individual service level – Apply enterprise wide policies to new devices – Block & alert on rapid changes in location – Alert on abnormal usage (file loaded from one device and deleted quickly on another for example) 39
  • 39. © 2015 Imperva, Inc. All rights reserved. Mitigation – It’s All About the Data, Stupid! • Attackers are after enterprise data and not after individual endpoints • A successful attack (e.g. 145M user accounts, 70M credit card numbers, 300K medical records, 4M employee evaluation forms) must express itself in abusive data access • Deploy monitoring, detection and control solutions around data repositories – SQL databases, NoSQL repositories, File servers, SharePoint deployments – See everything, detect abnormal and abusive access patterns, react by denying further access to potentially compromised machines and accounts 40
  • 40. • Download HII report – https://www.imperva.com/DefenseCenter/HackerIntelligenceReports

Notas del editor

  1. Let’s build this slide on the content of this URL: http://searchcloudstorage.techtarget.com/news/2240237177/Enterprise-file-sync-and-share-expands-in-2014 Found more stats here techcrunch.com/2014/11/27/the-most-popular-enterprise-storage-product-might-surprise-you/Pai
  2. We have slides describing 3 parts of the attack plan. The 3rd one – retrieving data is trivial as it is provided by the platform.
  3. Attacker can anonymously create a free account with any of the major EFSS vendors.
  4. Encryption uses current user context and therefore decryption does not require a key, but rather code running in the user’s context.
  5. It’s not clear how to disinfect an account in OneDrive