Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Advertisements

Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
OWASP Web Vulnerabilities and Auditing
SEC835 OWASP Top Ten Project.
Parameter Tampering. Attacking the Ecommerce Shopping Cart In the above image we see that a user who wants to purchase a Television visits an online Store.
Welcome to SpyEye Front-end interface called “CN 1” or “Main Access Panel.”
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
#AVeSPresents AVeS Cyber Security Confidence in your Digital Information 2014/09/25 Charl Ueckermann Managing Director AVeS Cyber Security Lex Informatica.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security Issues and Challenges in Cloud Computing
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Phishing – Read Behind The Lines Veljko Pejović
Dec 13 th CS555 presentation1 Yiwen Wang --“Securing the DB may be the single biggest action an organization can take to protect its assets” David C. Knox.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Norman SecureSurf Protect your users when surfing the Internet.
OWASP Mobile Top 10 Why They Matter and What We Can Do
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
Cyber Crimes.
OWASP Zed Attack Proxy Project Lead
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Security Management prepared by Dean Hipwell, CISSP
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Honeypot and Intrusion Detection System
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Security Testing Vinay Srinivasan cell:
An Inside Look at Mobile Security Android & iOS Zachary Hance & Andrew Phifer Dr Harold Grossman.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
OWASP OWASP top 10 - Agenda  Background  Risk based  Top 10 items 1 – 6  Live demo  Top 10 items 7 – 10  OWASP resources.
A practical overview on how the bad guys adopt and circumvent security initiatives Commercial – in - Confidence Alex Shipp Imagineer.
Deconstructing API Security
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Information Systems Design and Development Security Precautions Computing Science.
James F. Fox MENA Cyber Security Practice Lead Presenters Cyber Security in a Mobile and “Always-on” World Booz | Allen | Hamilton.
Web Application Vulnerabilities
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Critical Security Controls
Securing Your Web Application in Azure with a WAF
TOPIC: Web Security (Part-4)
Secure Software Confidentiality Integrity Data Security Authentication
Penetration Testing following OWASP
Riding Someone Else’s Wave with CSRF
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP Hardening web applications against malware attacks Erwin Geirnaert OWASP BE Board Member ZION SECURITY January 2012

OWASP Agenda My definition of malware Hardening applications?! Malware attacks Special thanks to Trusteer for slides and additional statistics!

OWASP My definition of malware

OWASP Malware My definition: Non-destructive malicious software that steals information, hijacks credentials and injects fraudulent transactions Examples: Zeus, SpyEye, … Note: targets also non-financial applications: Facebook, Twitter, Gmail, Yahoo … My prediction: attacks against cloud apps like Salesforce, Google Apps,..

OWASP Malware Infection Methods  Drive-by-Download Legitimate web sites that are hacked Malicious web sites that include exploit code … target unpatched vulnerabilitiesBuy exploit code…

OWASP Closer Look: Exploit Services For Hire Posted on August 27, :10 RU: $ 40 UA: $ 30 KZ: $ 20 PL: $ 90 BY: $ 40 Mix w / o asia: $ 30 asia: $ 10 World mix: $ 20 Rules Ship your software via non-resident loader. Infecting with DDoS bots, ZeuS, SpyEye, Click-bots, SPAM-bots, SOCKS, etc. Return customer preferred Minimum of 2K infections I can also infect with your malware per customer demand No re-distributors Provide each customer with personal statistics If lockers shipped, price is discussed separately. Communication via icq Additionally Private exe polymorphic creator from $ 25 to $ 50 Maintenance agreement We will check your file twice per day, ifgoes idle we will remove if from the computer 1 week = $ 20 1 month = $ 100 Features of the extra service files Unique encryption - Unique encryption to avoid AV signatures Files do not require any additional libraries. (The file will work on all systems) Files not detected by Anti virus No loader required, exploit based infection Competitor prevention AV antidote

OWASP Malware Attack Technique: Fake Web Content injection  Manipulate/Insert Web Content – on the fly Capture and deliver sensitive data (not part of the original app logic) Credentials, credit card information, personal information  Typical configuration Hundreds of such “webinjects”

OWASP Capture payment card Live attack: Inject data capture form

OWASP Bypass two factor authentication: Capture Token for real-time Transaction Verification Live attack of Zeus on a major U.S. bank Before After

OWASP Bypass two factor authentication: Do nothing Authenticate Login Successful Fraudulent Transaction (from the user machine)

OWASP Bypass HW transaction verification: Device “training” with Dummy Trx Initiate Transfer Get target account (mule) from C&C Transfer to target account ($1,000) “Dummy transfer” inject Hide real balance Balance: “$10,000” [$9,000 actually] inject Logi n Balance: $10,000

OWASP Bypass Out-of-band verification by changing the phone number on the account Inject: “New Security Measure, enter phone number and wait for code to arrive in SMS” Initiate phone number change in the background. bank sends code to old phone to verify change Users enter code into fake form Malware completes the change Fraudster can now transfer money and execute approval from his phone User Malware Appreciates the Bank security innovation

OWASP Bypass Out-of-band verification by changing the phone number on the account (cont.)

OWASP More out-of-band channel attacks: Bypass Confirmation  Zeus eliminates transfer/payment confirmation from web mail From a recent Zeus configuration:  Users don’t know funds were stolen if( document.getElementById("datatable").rows[i].innerHTML.indexOf( "Faster Payment Confirmation" ) != -1 || document.getElementById("datatable").rows[i].innerHTML.indexOf( "Payment Created" ) ) { //Faster Payment Confirmation | Payment Created document.getElementById("datatable").rows[i].style.display = "none"; } if( document.getElementById("datatable").rows[i].innerHTML.indexOf( "Faster Payment Confirmation" ) != -1 || document.getElementById("datatable").rows[i].innerHTML.indexOf( "Payment Created" ) ) { //Faster Payment Confirmation | Payment Created document.getElementById("datatable").rows[i].style.display = "none"; }

OWASP Bypass virtual keyboard, VPN credentials compromised  Zeus = take screenshot of mouse vicinity when left button is clicked (defeat virtual keyboard anti key logging capability) “citrix” = only when this keyword is in the URL  Password is collected as a series of screenshots showing password letters

OWASP Malware Command & Control 5 5 SMS with link to Mobile malware (“install new certificate”) SMS with link to Mobile malware (“install new certificate”) 3 3 Mobile out-of-band verification attack Legitimate Website User Accesses Site 1 1 Malware transfers funds (PC is proxy) 5 5 Malware forwards approval SMS 7 7 Download Malware 4 4 Transaction approved using stolen SMS 8 8 “Please provide your mobile phone number” 2 2 Transaction Approval SMS Transaction Approval SMS 6 6

OWASP Evade server side fraud detection  Cookies used for malware state management Server side detection of specific cookies (in practice since 2010 – Gartner) New SpyEye now uses non-cookie mechanisms  Bare-bone transactions Server side detection of missing pages/parameters New SpyEye now simulates full “human” flow, including button clicks  Computer interaction time scale Server side detection of “too quick” submissions New SpyEye introduces time delays

OWASP How (not) to prevent exploitation “We analyze data collected over a four year period and study the most popular practices that challenge four of the most prevalent web-malware detection systems: Virtual Machine client honeypots Browser Emulator client honeypots Classification based on domain reputation Anti-Virus engines Our results show that none of these systems are effective in isolation” Trends in Circumventing Web-Malware Detection Google Technical Report, July 2011

OWASP Hardening applications?!

OWASP What is hardening Definition of hardening: Reduce the attack surface Eliminate vulnerabilities Mitigate the impact of a vulnerability

OWASP

Hardening books

OWASP

The GAP Hardening applications is not only: Hardening the architecture (DMZ, reverse proxy,..) Hardening the OS Hardening the web server Hardening applications is: Building and maintaining secure code OWASP Top 10 Application Security Risks

OWASP Hardening applications? Hardening is eliminating vulnerabilities by: Disabling unneeded services/functions Limiting access to specific IP addresses/users… How can you harden an application? Disable admin access Disable CMS Do you know all the security bugs in an application that was build during 1 year by 10 people?

OWASP Hardening applications? Most used solution today: web application firewall: Detect attacks Block attacks (if you have a WAF, are you sure it’s blocking?) Alert and react But to be effective you need to know the vulnerabilities in the application = virtual patching

OWASP OWASP Top 10 A1: Injection A2: Cross-Site Scripting (XSS) A3: Broken Authentication and Session Management A4: Insecure Direct Object References A5: Cross-Site Request Forgery (CSRF) A6: Security Misconfiguration A7: Insecure Cryptographic Storage A8: Failure to Restrict URL Access A9: Insufficient Transport Layer Protection A10: Unvalidated Redirects and Forwards

OWASP Hardening OS and Network A1: Injection A2: Cross-Site Scripting (XSS) A3: Broken Authentication and Session Management A4: Insecure Direct Object References A5: Cross-Site Request Forgery (CSRF) A6: Security Misconfiguration A7: Insecure Cryptographic Storage A8: Failure to Restrict URL Access A9: Insufficient Transport Layer Protection A10: Unvalidated Redirects and Forwards Exposure after hardening OS and Network

OWASP Web application firewall A1: Injection A2: Cross-Site Scripting (XSS) A3: Broken Authentication and Session Management A4: Insecure Direct Object References A5: Cross-Site Request Forgery (CSRF) A6: Security Misconfiguration A7: Insecure Cryptographic Storage A8: Failure to Restrict URL Access A9: Insufficient Transport Layer Protection A10: Unvalidated Redirects and Forwards Exposure after virtual patching with web application firewall

OWASP Analyzing the effectiveness of web application firewalls – Larry Suto 11/11

OWASP History of malware attacks Malware attacks against web applications started years ago: Code Red in 2001: buffer overflow in IIS Santy in 2004: phpBB command execution Asprox in 2008: SQL Injection -Infected 6 million URLs on websites Lizamoon in 2011: SQL Injection – Infected 1.5 million URLs

OWASP Hardening OS, network and WAF A1: Injection A2: Cross-Site Scripting (XSS) A3: Broken Authentication and Session Management A4: Insecure Direct Object References A5: Cross-Site Request Forgery (CSRF) A6: Security Misconfiguration A7: Insecure Cryptographic Storage A8: Failure to Restrict URL Access A9: Insufficient Transport Layer Protection A10: Unvalidated Redirects and Forwards Exposure after hardening OS, network and WAF

OWASP Malware vs hardening Hardening OS, infra & WAF will stop most mass malware attacks Can we go have a beer now? What about:

OWASP The end point is the weakest link Cyber Criminals Easy End Point Security AV Sensitive Data and Apps Perimeter Security Difficult

OWASP Hardening the browser Weakest link today: the browser Easy to infect with drive-by-download This malware is not impacting the user: 1.Observe: take screenshots, log HTTP requests, wait for instructions 2.Update: configuration to attack specific web applications (banking, cloud apps, remote access,..) 3.Attack: all infected machines attack

OWASP Trusteer malware statistics

OWASP Trusteer Malware Statistics

OWASP Hardening the browser Hardening the user: One-time-password tokens Transaction signing with tokens (and bankcard) Hardening the browser: Secure sandbox Patching/AV/FW Hardening the mobile (iOS, Android, Win): Secure mobile

OWASP APT against end-user

OWASP

Wrap-up Hardening web applications requires: Secure web applications running on hardened network and infrastructure Hardened browsers Hardened mobile client Hardened user

OWASP