Most Read Blogs

Most Read
Blogs
10
Thanks for reading the
Bit9 + Carbon Black Blog!
Here are the most popular
blogs of the year, so far,
as determined by you,
the reader.
9
8
7
6
90% of Security Could
be Fixed by IT
Ben Johnson
Customer Use Case:
“Searching for Zeus,
I found so much more…”
Bit9 Blog Editor
Carbon Black 5.0 Changes
the Endpoint Security Game
with Live Response
Ben Johnson
Screenshot Demo: Detecting
Banking Trojan “Dyre/Dyreza”
with Bit9 + Carbon Black
Rob Eberhardt
Screenshot Demo:
Carbon Black “Live
Response” in Action
Ben Johnson
5
4
3
2
1
Orchestration and Analytics are
the New Infosec Buzzwords
Ben Johnson
Don’t Be Cracked: The Math
Behind Good Online Passwords
Ryan Murphy
5 Ways We Can Address
the Talent Shortage in
Cyber Security
Ben Johnson
With 110 Days Left Until WS2K3
Deadline, Many Organizations
Are Unprepared
Christopher Strand
The March Madness
of Cyber Security
Ben Johnson
10
90% of Security Could be Fixed by IT
JANUARY 28, 2015 º BEN JOHNSON
Anton Chuvakin posted a great LinkedIn Pulse article today
discussing, what he said, is too much focus on defending against
the APT.
In the article “Defeat the Casual Attacker First!!!” Anton wrote:
“Focus on improving your security maturity—not on randomly
picking high-maturity tools (like NFT) and practices (like hunting)
and then declaring success! Before you buy another ‘antiadvanced-anything’ box, THINK—are you handling the basics well
already and, if YES, what is the best direction for improvement
from your current position?”
I happen to wholeheartedly agree with Anton. But allow me rant
for a moment.
As I wrote earlier this week, I chuckle when I hear about security
best practices because most companies aren’t employing
standard practices, let alone anything more. I’m convinced that
90 percent (maybe more) of security issues can be resolved by IT.
Ask yourself these questions:
“Am I doing the basics?”
“Am I leveraging all the tools I have?”
“Am I making the tools talk to each other through security
engineering to help me understand the story behind the
data and the story behind the number of incidents I’m
investigating?”
Unfortunately, there’s still a mindset of installing special APTtargeted defenses to supplement a generally poor security
hygiene. This will not work. The malicious humans are going to
just use metasploit or other simple tools because they still work.
You need to address the commodity malware first, so your team
isn’t fighting the same little brush fires again and again. And,
much like a brush fire, commodity malware can flare up and
grow or, in other words, lead to advanced attacks.
You need to empower your responders, your SOC, and your
jacks-of-all-trades to quickly respond, remediate, and fix the
problems that take up your time. And guess what? Most security
teams are not catching all the simple malware and the nonadvanced threats. Anton’s point is dead on.
So, before we focus on the Chinese, the most sophisticated
cyber mafias, etc., let’s fix the broken windows and clean up our
environment FIRST so we can start hunting the really evil threats.
Anton’s security camera analogy is great: “go look and see what’s
going on by rewinding the tape.”
At Bit9 + Carbon Black we happen to have a good approach to
that. But make sure you’re not just buying tools because they say
“next-gen,” or “advanced.” Make sure these tools are helping you
with all threats, whether commodity, advanced or insider.
Most importantly, make sure the tools you invest in and the
defenses you architect can be utilized by your staff. You want
those technologies to enable your staff to do more with less and
start reclaiming the battlefield.
9
Customer Use Case: “Searching for
Zeus, I found so much more…”
FEBRUARY 19, 2015 º BIT9 BLOG EDITOR
(Editor’s Note: This post was written by an information security engineer
who works for a Bit9 + Carbon Black customer. The engineer submitted
this post after “hunting for evil” using Carbon Black and wanted to share
the information with the #Bit9Blog readership. As a policy, Bit9 + Carbon
Black does not reveal its customer names, so the author of this post and
his employer are anonymous.)
I dug into rpcnetp.exe a little bit for some more detail. It spawns svchost,
of course, but that in turn spawns iexplore (Internet Explorer) and
something called “upgrd.exe.”
Upgrd.exe runs a batch file “c:\windows\system32\upgrd.bat” that runs
through a number of steps. Details about each step are available within
Carbon Black, but not included here. The Internet Explorer process
makes one connection to “search.namequery.com“:
Here’s the whole process tree:
Computrace has also been known as LoJack and it is an anti-theft BIOS
add-on. One of its capabilities is to provide remote access to your stolen
laptop. Part of the point of the Kaspersky post is that Computrace
exhibits a lot of the same behavior as malware, but is often whitelisted
by AV vendors. I found that out of 57 AV vendors, zero deemed it
malicious.
Recently, I had the opportunity to play with Carbon Black in a live
environment and go hunting for evil.
A common behavior for Zeus malware is to spawn a svchost.exe child
from an unsigned parent process. Though this is not guaranteed
malicious behavior, it’s uncommon enough to be a good place to start
looking for Zeus or other nasty software. To do this in Carbon Black, you’d
run a process search like this:
The Kaspersky researchers are concerned that Computrace could be
hijacked by malicious parties to provide an easy backdoor into a system.
At this point, I had unsigned software spawning Internet Explorer for
beaconing purposes as well as running some kind of batch script. It
looked like malware, it acted like malware, but was it really malware?
This query is looking for unsigned processes (i.e., filter out the processes
with a digital signature) that have a child process of svchost.exe.
I didn’t find Zeus himself, but I did find something that looked pretty
malicious. The bulk of the hits that returned from this search were for a
single host:
Here’s one indication from Carbon Black that we’re talking about the
same thing:
Armed with this information and with these questions in mind, I went
looking around on the Internet to see if I could find anything more.
Luckily, I found a recent article by a Kaspersky researcher about this exact
thing. The article discusses the Absolute Computrace software made by
Absolute Software Corp.
“We believe that Computrace was designed with good intentions, but
our research shows that vulnerabilities in this software can turn a useful
tool into a powerful weapon for cybercriminals,” they said.”
A quick search in Carbon Black for the process rpcnetp.exe can tell you
how many hosts are running this software.
Malicious or not, Carbon Black gave me insight into powerful software
running on endpoints to which other security tools turn a blind eye.
This is clearly useful information and highlights the kind of visibility that
Carbon Black provides.
8
Carbon Black 5.0 Changes the Endpoint
Security Game with Live Response
Enter Live Response
JANUARY 27, 2015 º BEN JOHNSON
Today, we announced the immediate availability of Carbon Black 5.0.
As we have now heard several times from our early access customers,
Carbon Black 5.0 is a “game changer.” Why? Let’s dive in and see.
The root problem in cyber security today is a lack of qualified security
professionals. A big part of the reason for talent shortage is that triaging
day-to-day detection events is too slow and inconclusive. It’s alert
fatigue. Valid alerts are just noise if you can’t respond to them.
where the problem was. That individual (and his or her team) needed
to be better equipped. That’s why Carbon Black continuously records
endpoint activity on Windows, Mac and Linux systems to enable the
responder to rewind the tape and actually see what happened.
Furthermore, it’s a numbers game. With proper visibility comes the true
power—the ability to focus your team on fixing the root cause of suspicious
and malicious activity, and quickly understanding an attack’s scope.
In recent posts, you’ve heard us talk about OODA and feedback loops.
Ultimately, the operational aspect of security needs to be both more
efficient and more effective. You need to prioritize data collection
over detection, meaning you should already have the cyber-security
equivalent of an endpoint surveillance camera installed before
compromise so you’re not scrambling to collect data during the fire drill.
Beyond response and root cause, you can add your own detection
capabilities or use applied threat intelligence that leverages reputation
and other information to score endpoint activity. You might not want
to respond to every instance where a network connection is made to
dropbox.com, but you would probably want to be notified when an
application other than a browser or dropbox.exe makes that connection.
Enter Carbon Black, especially with the new 5.0 capabilities we now
are shipping.
It’s about data understanding, not data volume, and having that clear
visibility is critical to stronger detection. Carbon Black 5.0 enhances
its threat intelligence component with the ability to create feeds for
indicators of attack—going beyond its already strong support of
matching event activity with known indicators of compromise. Also
new in 5.0, are detection feeds from Bit9 that help customers find and
prioritize suspicious or malicious behavior.
Until now, security pros had to respond to alerts without the necessary
recorded history and visibility to allow for fast, efficient triage. That SOC
analyst, the jack-of-all-trades security guy…whomever is looking at that
information security alert, was often reduced to guessing what and
The most exciting part of Carbon Black 5.0 are its “Live Response”
capabilities. What does this mean? Carbon Black has been great at
endpoint threat detection and response. But once you’ve determined
scope, once you’ve walked up and down the process tree to find root
cause, once you’ve quickly triaged and validated that alert, you want to
do something about it.
Now, with Carbon Black 5.0, in the same console (and programmatically
via our API), you can perform endpoint isolation to quarantine that
endpoint from the network, and connect to it to do further investigation,
preserve state, and take action.
The Carbon Black sensor is already there, so you don’t have to scramble
to get IT to install a post-mortem toolset, and you don’t have to login
locally using privileged credentials that the attacker might be hoping
for. The workflow, all within the Carbon Black 5.0 console, enables you
to quickly triage your alert, isolate that endpoint from all others, and
drop into a powerful shell that connects you to that system to pull files,
kill processes, dump memory, and run any additional tools that your
response workflow includes.
From here you can easily create new watchlists so that as soon as those
TTPs (or some part of that attack) occur again anywhere else in the
enterprise, you’ll be notified. This gives your security team true endpoint
visibility and control.
Carbon Black 5.0 includes other new features, such as cross-process
memory events, a new dashboard, and more. See our product page for
more detailed information about the features in 5.0.
Your most junior folks now have a tool that gives them great visibility
and quick triage capabilities, and your more experienced security
professionals can incorporate Carbon Black programmatically into your
overall cyber defense orchestration. Blend this with dwell-time statistics,
system hygiene, event prevalence, frequency, root cause, and applied
threat intelligence, and you get, as the first users of Carbon Black 5.0
have told us, a true “game changer.”
7
Screenshot Demo: Detecting Banking Trojan
“Dyre/Dyreza” with Bit9 + Carbon Black
Opening a new view of Explorer.exe during the same time frame gets
interesting:
If Dyre evades detection, the malware grabs sensitive user information
such as credentials, certificates, and session information, using a browser
man-in-the-middle attack. There are many variants of Dyre in the wild,
and they typically target very specific activities, such as banking websites
and even data-storing sites like Salesforce.com.
ppparent_name:iscsicli.exe modload: cmd.exe
Unsigned processes with cross-process activity into explorer.exe:
Checking network connections of Explorer.exe shows some interesting
behavior as well:
SHA-256: 05edcc3e5679ee254c78058c4f446e195544d3ff3374bd
141c1895e7ed6a410b
ppConnection to Google.com (Checking to see if it has internet)
ppConnection to a STUN (session traversal utilities for NAT) server to
create an SSL-encrypted session
ppConnections to other IPs that happen to be on some RBLs (realtime blacklists)
ppSecond tested Sample showed different connections, albeit similar
behavior
Some items of interest to consider:
ppThe Creation/execution of “Googleupdaterr.exe” or “exe:zone.
identifier”
ppLocation of file creation “C:\users\CURRENTUSER\appdata\local”
Detection via Watchlist
Dyre/Dyreza has plenty of variants and behaviors. The list below may not
be 100 percent comprehensive for your sample. Below are some of the
recurring patterns that should make detection via watchlist very easy.
Carbon Black watchlist query strings to get you started:
SHA-256: 523b9e8057ef0905e2c7d51b742d4be9374cf2eee5a81
0f05d987604847c549d
ppTested as Document-772976_829712.scr
Upon execution, Bit9 in medium enforcement prompted for execution.
I clicked “Allow” to allow execution. The root executable immediately
disappeared (deleted itself ) and the machine seemed otherwise
unaffected.
ppalliance_score_virustotal:[10 TO *] netconn_count:[1 TO *]
Bit9 rules and suggestions:
ppAutoruns (at least alert – will block legitimate modifications)
• Registry rule
• Write action: prompt or alert
• Registry path: *\software\microsoft\windows\currentversion\
run\*
• Process: any process
ppAlternative autoruns method
ppTested as Dyre_Unpacked.exe
We created a firewall rule to disallow ANY Internet connectivity from this
particular VM and I highly recommend isolating this host on an alternate
VM network, as well.
Binaries of a malicious nature attempting to make network connections
(low hit count, as Dyre seems to make connections from legitimate
processes):
Use DNS RBLs (real-time blacklists) to fortify Carbon Black and alert on
connections to known-bad IPs/DNS entries
Process Analysis shows root executable and child process of
“Googleupdaterr.exe”
(IMPORTANT: ALWAYS CREATE VM SNAPSHOTS and ALWAYS LOCK
DOWN NETWORKING FROM INFECTED HOST)
Two Dyre samples were tested:
ppcrossproc_name: “explorer.exe” digsig_result: “Unsigned”
I then opened the Carbon Black console and searched for the root
executable:
Dyre and its ever-changing list of variants have proven difficult or even
impossible to detect by antivirus, memory-based scanning products, and
next-gen perimeter defenses. In this screenshot tutorial, we will dissect
a basic Dyre infection to show some simple methods of detection and
prevention using Bit9 + Carbon Black.
As with most malware, there are many variants and behavioral
differences between samples. Testing for this tutorial was done on a
Windows 7 Virtual Machine with both Carbon Black 5.0 and Bit9 7.2
agents loaded (Bit9 in medium enforcement mode Bit9)
pppath:c:\users\*\appdata\local\* -path:c:\users\*\appdata\local\*\*
iSCSI client loading a child process of cmd.exe:
FEBRUARY 9, 2015 º ROB EBERHARDT
Within the last year, a new banking trojan has begun targeting large
enterprises and major financial institutions. The malware, called “Dyre” or
“Dyreza,” is typically spread through spam or phishing emails.
Execution directly from Users Application Data folders:
The second stage payload items of interest below:
ppFirst stage payload deleted itself
ppResulting executable “Googleupdaterr.exe” makes itself resident in
the registry
ppexe creates a mutex/process injected into explorer.exe
Windows Explorer.exe is making multiple network connections (UNC
and other connections typically come from ntoskrnl.exe, svchost.exe,
etc. Explorer tends to make domain-local connections on rare occasions
for local-network discovery. 1 might be a bit noisy, 2-3 might be a good
starting point):
ppnetconn_count:[1 TO *] process_name:explorer.exe
Typical Dyre/Dyreza registry modification to maintain persistence:
ppregmod:software\microsoft\windows\currentversion\run
Other Dyre/Dyreza earmarks:
pppath:c:\windows\*.exe -path:c:\windows\*\* -process_
name:explorer.exe-process_name:regedit.exe -process_
name:splwow64.exe
• Registry rule
• Write action: block
• Registry path: *\software\microsoft\windows\currentversion\
run\*
• Process: googleupdaterr.exe or iscsicli.exe
ppBlock batch files from executing inside of AppData (You can get less
specific on the Path, but risk blocking custom apps)
•
•
•
•
Custom rule
Rule type: execution control
Execution action: block
Path or file: C:\Users\*\AppData\Local\Temp\*
ppBlock (and alert) on creation of the typical Dyre/Dyreza
configuration file
•
•
•
•
•
Custom rule
Rule type: file creation control
Write action: block
Path or file: C:\users\appdata\local\userdata.dat
Process: any process
ppMove machines to high-enforcement mode
**A special thanks to a Carbon Black customer who contributed some
content ideas for this blog**
6
Screenshot Demo: Carbon Black
“Live Response” in Action
Here’s the nice shot of the process tree for this example attack:
Time to do more investigation and begin your cleanup and recovery:
JANUARY 28, 2015 º BEN JOHNSON
For a long time, security professionals over invested in “set-it-and-forgetit” detection capabilities like antivirus. We’ve since wised up and moved
on to detection, detection, and more detection, but as a result, we
started to drown in a sea of alerts. Even valid alerts are just noise if you
can’t appropriately respond to them.
On the left, you have Outlook.exe, which started this whole thing via
Internet Explorer and Acrobat, On the right, you have what occurred
after including eventguide.pdf, svchost.exe, and a bunch of other
commands and utilities to help accomplish the attacker’s goal. It doesn’t
take much digging to see what occurred.
Cyber defense, after all, is about humans fighting humans. It’s no longer
AV fighting worms. So the true problem is that most of us are in a state
of continuous response, handling many, many alerts every day and often
guessing what to do based on inconclusive information.
When an alert deserves actual attention, we cobble together several
tools and often have to lean on IT to help us put our tools on the asset
in question to start collecting evidence and taking action. It’s a losing
game. Not anymore. Enter Carbon Black 5.0, introduced on January 27.
The continuous recording and centralized storage inherent in Carbon
Black enables you to quickly gain access to endpoint context and
visibility, regardless of which thread you have to pull:
So, you pull on that thread, be it an IP-address, filepath, or hash (or many,
many others), and you get hits. You get process instances that match
those attributes.
Let’s dive in to start doing triage and analysis:
(Note: I’m skipping over a lot of events that would easily raise eyebrows,
because the point isn’t to explain this specific attack; it’s to show you
how you can be more operationally effective.)
With Carbon Black, we’re trying to put all this information at your
fingertips. We want you to easily answer questions such as: “When
did this process start?” “Who is its parent?” “Does it have children?” “Is it
signed?” etc. But more than just answering these questions, Carbon Black
shows you the various events the process was performing:
But what’s your immediate goal? As a responder, you’re trying to quickly
assess root cause and understand what occurred. With Carbon Black,
you can walk up and down the tree and see all the event activity that
occurred for each process.
Several built-in commands give you unprecedented control and action
capabilities within your endpoint threat detection and response solution:
So what now? Call IT and re-image? Go grab a forensics tool, walk to the
person’s desk (or hope IT can push it out for you) and start collecting
more data?
Not anymore. Carbon Black 5.0 enables you to respond LIVE!
Live Response
The first thing a responder would most likely want to do is STOP THE
BLEEDING. With Carbon Black 5.0, we have built-in endpoint isolation
where our sensor can stop all communications except with our server.
The compromised endpoint won’t be able to do anything, but you’ll still
have communications with it:
Ok great, bleeding stopped, but you can do more. With Live Response,
Carbon Black gives you a terminal right in our Web console and via the
already-existing sensor on the endpoint. You just click “Go Live” and
you’re in.
Want to dump memory to preserve it for analysis or litigation? Just
upload something like Winpmem and you’re all set.
5
Additionally, you can look at registry key values, files and more:
Orchestration and Analytics
are the New Infosec Buzzwords
MARCH 11, 2015 º BEN JOHNSON
(Editor’s Note: this article originally appeared as a contributed piece on
infosecurity-magazine.com)
From here, as a responder, I would take various IOCs, IOAs, and
behavioral information from this attack and convert those into watchlists
and feeds to drive detection.
As cyber security gets hotter (or maybe more and more depressing,
depending on how you look at it), new buzzwords come to dominate
our discussions.
The next time these hashes, IPs, or patterns of compromise are used,
I will be alerted on them quickly. And, with Carbon Black 5.0, you can
spend your time inside the new “Alert Triage” section to help prioritize,
resolve and score your alerts:
We’re all sick of ‘APT’ and ‘threat intelligence’ (at least I know I am). We’ve
also begun to tire of hearing words such as ‘breach,’ and even ‘cyber’ itself.
However, buzzwords have a place. They are a good barometer of the
focus of both the security industry and the general population.
I predict that ‘orchestration’ and ‘analytics’ will be the industry’s next top
buzzwords. Let me explain why.
‘Analytics’ isn’t necessarily a new buzzword, but it’s a bit behind ‘threat
intelligence’. Everyone was saying ‘threat intelligence’ in 2014 (and some
of 2013), but it only recently started to become more concrete and
standardized in its definition.
Carbon Black 5.0 also computes dwell time, machine hygiene, top
offenders, best alert resolvers, and more, enabling you to directly
measure your team’s improvement over time. Now, show your
organization’s leaders how effective—and fast—you are at battling
threats.
Early-adopter customers have called Carbon Black 5.0 a “game
changer.” It’s already helped them take action and leverage more threat
intelligence than ever before from our partners and our own Threat
Intelligence Cloud.
We’ve also added new event types such as remote thread injection
and other activities that memory attacks leverage. Additionally we’ve
introduced more partnerships and integrations with on-premises
network security products to move toward the one-plus-one-equalsthree solution.
Feel free to reach out to us and make the call for yourself as to whether
or not Carbon Black 5.0 is truly a “game changer.”
‘Analytics’ is lagging behind. But we need analytics as attacks become
increasingly complex and diverse. Once intruders obtain access, they
often start using built-in tools or tactics to blend in with the noise
of regular environment activity. Detection is becoming increasingly
difficult, so we turn to analytics.
Think of credit card fraud. Financial companies don’t know exactly how
a stolen credit card will be used. It could be to buy iTunes credits online,
electronics in a store in Hong Kong, or any of a million other things.
To detect credit card fraud companies look at known good and bad
transactions and try to profile expected normal behavior. When activity
begins to fall outside that fuzzy box, you’re notified.
Analytics is the comparison of current user, system or network activity
against historical activity and current behavior by other parts of the
environment – and it is going to become hot over the next year. We
will still be authorizing applications and detecting known bad binaries,
network sites, and behavior, but analytics will continue to rise as the use
of stolen credentials and insider threats becomes increasingly prevalent.
I’ve been at Fortune 50 companies where the only quick way to detect
where Chinese hackers were ‘living off the land’ (inside the environment,
lurking, watching and learning) was to look for things such as strange
network-share usage; abnormal command-lines for cmd.exe, ftp.exe,
and robocopy.exe; and other unusual behavior. Analytics could quickly
identify what otherwise would take weeks.
This brings us to ‘orchestration’—the overall quarterbacking of your
environment when analyzing a detection event, responding to an
incident, or performing risk hunting. When doing this, we need speed.
We need faster OODA loops (an aerial dogfighting term for feedback
loops). And we have complex environments and various tools and teams
that have to synchronize.
Orchestration focuses on people, processes and teams. We need to be
organized in this world of continuous response where we are putting
out multiple fires. We need to be able to quickly add context about what
should be occurring and what particular systems are used for. We need
to know more rather than think more during our security investigations.
And we cannot afford sloppy processes or missing information.
We also need faster feedback loops. The bad guys move quickly,
especially when there are malicious humans at work. But even with
malware, it’s often tough to keep up with the dangerous activities
being performed. With today’s technology, we need orchestration of
our defensive technologies. We need to quickly stop the bleeding. We
need to be able to retrieve reputation, classification and attribution
information without much (or hopefully any) effort.
We need to be able to disrupt and contain live attacks, and we need to
be able to quickly disregard alerts that turn out to be false positives or
not urgent. After all, valid alerts are just noise if we cannot appropriately
respond to them.
We need orchestration, and more specifically, orchestration through
APIs, security engineering, and automation. We need our network,
endpoint, data and communications defenses to inform each other, to
change analysis weightings based on each other’s current state, and we
need to give a human operator quick access to all the data.
We need introspection and retrospection to be quick and painless so
we are informed. Remember analytics? We need our systems to work
together to tell us if this behavior is normal, how prevalent it is, and
what other groups think about it (remember threat intelligence?). As an
industry, we’re moving in that direction, but we’re not there yet. I hope
we make big strides very soon.
The biggest problem in cyber security is the shortage of people. I believe
analytics and orchestration can help to significantly reduce this gap. We
have the computing power; let’s put it to good use. Let’s build, create
and innovate in the areas of analytics and orchestration.
4
Don’t Be Cracked: The Math
Behind Good Online Passwords
LC = lowercase
UC = uppercase
SC = special characters (!@#$%^&*, etc.)
MARCH 15, 2015 º RYAN MURPHY
When weak-password stories come up, the focus often turns to advice
about what to do: “be sure to change your passwords immediately…” “
Follow these 8 tips to stay safe online…” You’ve seen them all.
Unfortunately, these warnings and tips seem to fall on deaf ears. Data
from previous password breaches shows that people are still routinely
using common passwords like “password” “qwerty” or “123456.” There’s
math behind why passwords like those are are weak and why others, like
“p@s$w0rdD0gB1t3” are strong. The good news is that creating more
secure passwords might be as simple as adding two more characters.
The Basics: Password Storage & Hashes
Organizations usually store passwords in one of two ways – 1) as plain
text or 2) as hashes. Plain text storage means that an intrusion of the
database would give away complete login details, full username and
password – not a good idea. Hashes provide an extra layer of security.
Hash operations are one-way mathematical formulas that take input, like
a password, and transform it into a hash (see table below). The beauty
of the hash is that it’s very difficult to get the original password from just
the hash. You are able to turn a password into a hash very easily, but it’s
impossible to turn a hash into a password. Think of a broken window.
You can turn a window into shattered glass, but it’d be near impossible
to turn that shattered glass back into a window. It’s a one-way street.
Username
Password Hash
[email protected]
2ac9cb7dc02b3c0083eb70898e549b63
[email protected]
2455640b3bb59c197e714c8600dff64c
[email protected]
b194a20eb542608fb54b17ce8f4a77e1
Systems typically store passwords as one-way hashes, like the ones
above, so when a user tries to log in using their password, that text is
transformed into the corresponding hash and cross referenced against
the hash stored in the system for that user.
How Do Hackers Get Passwords?
Sometimes a hacker will exploit a vulnerability in the system and get
access to the data in the table above. The hacker has his hands on the
usernames and the password hashes but needs the actual password to
login in to the account.
Remember, it’s impossible to go backwards from the hash to password.
The hacker’s only option is to “go forward” as many times as he needs to.
“Going forward” means the hacker is performing the same hash-
producing mathematical operation (with computer-generated guesses)
on a variety of passwords until the right hash is produced.
For example, using [email protected], the hacker might perform
the hash operation on the commonly used password “Password” and
get the following result: “dc647eb65e6711e155375218212b3964,” which
according to the table above, is not a correct hash match, thus not the
right password.
The hacker’s computer keeps trying and trying and trying again,
with billions of random and commonly known passwords until he
arrives at “Password1” which, here, matches the hash in the table
above:“2ac9cb7dc02b3c0083eb70898e549b63.” Now he knows that
[email protected]’s password is “Password1”. Although this may
seem laborious, a computer can easily guess over 1 billion passwords
per second.
How Long Does It Take for a Hacker to Get Your Password?
Note the bottom right corner of the table. If your password is 12
characters long, contains uppercase and lowercase characters, a digit
and a special character it may take over 15 million years for a hacker
to guess your password. This is the simple math behind blanket
recommendations to increase your password complexity.
NOTE: The math in the above assumes the hacker is randomly
generating password guesses.
So What Makes a Password Secure?
Above, we tackled the basics about password storage, the value of hashes
and then calculated how long it takes a hacker to get your password
using brute force cracking – as quickly as 3.5 minutes in some cases.
What we hope our readers got out of what’s above is that the longer
and more complex a password is (complex as defined as containing an
uppercase character, lowercase character, number and special character)
the longer it takes a hacker to crack.
A 12-character password with each of those elements would take as
long as 15,091,334 years to crack with a single computer.
•If your password is eight characters long and all lower-case, like
“password,” it would take a hacker 3.5 minutes to guess it.
For many people, 15 million years of “protection” might create better
peace-of-mind. However, the unfortunate reality with online passwords
is that even these long and complex passwords are susceptible to
cracking. Here’s why:
•Changing one of those lowercase characters to an uppercase
character, like “Password,” means it would take him almost 15 hours.
In order for a password to be considered secure, it needs to be truly
random and unique.
•Replacing any letter with a special character and keeping the
uppercase character, like “P@ssword,” means it would take the hacker
70 days to guess your password.
What Does it Mean to Be Truly Random?
The short answer: it depends, but very quickly if your password is weak.
•If you added a single character to “P@ssword” to form “P@ssword1” it
would take the hacker 18 years to guess the password.
•If you added two characters to “P@ssword,” to form “P@ssword11” it
would take the hacker 1,707 years to guess the password.
So on and so forth until you arrive at some astronomical numbers. See
the table below:
8 character
9 character
10 character
11 character
12 character
208 seconds
90 minutes
39 hours
42 days
3 years
LC & UC
14 hours
32 days
4.5 years
238 years
12,394
years
LC & UC
& Digits
2.5 days
.5 years
26 years
1,650 years
102,304
years
LC & UC
& Digits
& SC
70 days
18 years
1,707 years
169,546
years
15,091,334
year
LC
Many people often choose a base word for their password, like
“password,” and transform it to be logically “complex.” So they’ll replace
letters with special characters or digits and add some capitalizations.
So a password that was “password” becomes P@55w0rD. In fact, if each
letter could be one of an uppercase, lowercase, or special character,
there are 6,561 (38) versions of “password” — which is far from an
unbreakable amount.
Thus, a hacker using a brute force technique isn’t just going to start with
“aaaaaaaa” and go down the list, “aaaaaaab”, “aaaaaaac”, etc. He is going to
apply intelligence to the cracking. That intelligence most often involves
using common base words. So not only will he try cracking the very
simple “password” but also all 6,561 versions, to include the complex
“P@55w0rD”.
There are approximately 220,000 dictionary base words, meaning that
even if you added up to three extra digits to your transformed, baseword-based password and formed something like “P@55w0rD123,” a
computer would take about 26 minutes to crack it — no matter how
long the password is. With complete randomness in a password, hackers
can’t make common base word assumptions about your password and
cut down the brute force space.
But that’s not all. A secure password must also be unique.
What Does it Mean to Be Unique?
Unfortunately, some companies still store actual text passwords in their
databases instead of the hashes so if a hacker gets into the system,
he now has more base words to add to his roster. So if you use the
same password, or even base word, for two accounts and one of those
is compromised, no matter how long or random it is, that hash and
password are now known. The hacker can then log in to any account
that you are using the same password for. This also means that if
someone else uses your password, or some version of it as outlined
above, you are compromised.
So What Do I Do?
1) Make sure all of your passwords are truly random.
2) Make sure none of your passwords are used by you or anyone else.
How do you do that? Let’s assume for a moment that all 7 billion
people in the world have 100 online accounts and have used a different
password for each. That makes 700,000,000,000 truly unique passwords
in the world.
In order for there to be .0001% chance that you have the same password
as someone else, you’d need to choose from 7 quintillion passwords,
that’s 7,000,000,000,000,000,000. That may sound like a lot, and it is. If
you’re using a Standard English keyboard (94 characters) that’s a 16
character password, which would take 1 quadrillion years to brute force
crack, and can’t be circumvented by a shortcut.
Since you cannot control what companies do with your password, we
recommend having a 16 character truly random and unique password
so the hacker can’t leverage someone else’s password to figure out yours
and has to do the hard work (read 1 quadrillion years) to figure it out.
How is anyone supposed to remember 100 truly random and
unique, 16 character passwords?
Online password managers. Which is what everyone recommends but
never tell you why. Using these services you only have to remember one
password, and make it good! The only shortcut to getting your password
now is to get access to your computer itself — another series of articles
all together. The online password manager remembers the rest for you.
In fact, it might even be more convenient for you since you now only
have to remember one password. And it’s more secure.
(Here’s a link that reviews such password managers: http://www.
pcmag.com/article2/0,2817,2381432,00.asp)
They each have their own advantages and work for different platforms
so it’s difficult to recommend just one. Try a few for yourself and see
which you prefer.
3
5 Ways We Can Address the
Talent Shortage in Cyber Security
MARCH 3, 2015 º BEN JOHNSON
One of the biggest problems in cyber security is that there are not
enough qualified experts to manage the volume of attacks, alerts, audits,
incident response drills, infrastructure upgrades, and compliance reports.
And that’s not even getting into threat hunting or risk hunting. So, how
do we address this problem?
We’re making some progress on multiple fronts, but we can do better.
Technology, and the actual technological approaches of new solutions
are starting to save humans lots of time. We still need people, though,
and, more importantly, we need to create programs that encourage and
incentivize new players into today’s information battle.
The U.S. government is creating programs to incentivize entrance into
the information security field but, right now, these programs are largely
targeted at college students. Don’t get me wrong, we need youthful
energy to combat the “game face” that attackers put on, and we need
young talent we can mold and grow into the right type of cyber soldier
against today’s and tomorrow’s attacks. But more is needed.
There’s a multitude of technology professionals, analytical thinkers, and
engineers who would love to get in the game—but they don’t really
know how to do it.
I’ve talked to several people who have shifted into security after starting
their careers in another field, or who have worked long enough to have
rock star coworkers make similar transitions. These situations are still
pretty rare, though. We need people to dive right in if they show the
right aptitude and passion for cyber defense.
Here are some quick points to keep in mind if you’re considering moving
into security.
Look at your existing area of expertise. If you’re a programmer, maybe
you can work on creating more secure software development life cycles,
or you can try to find a security engineering position where you help
utilize vendor APIs to incorporate automation and orchestration. If you’re
a network admin, maybe you move into more of a network securitymonitoring role. The same goes with other existing technology jobs.
Cyber defense usually has a spot for you that requires your existing skills.
Not everyone is the quarterback. I meet with lots of teams every
week, and some need a quarterback, but pretty much everyone needs a
lineman or a defensive back—team players who fill important supporting
roles. Often, these roles are great because you get to interact with lots
of different specialists and play with a lot of tools. You’ll gain experience
quickly and figure out where you can make the greatest contribution.
You might even help evaluate products and set up various sensors and
monitoring capabilities, essentially doing the basic blocking and tackling
that should be done before anti-APT and threat-hunting efforts become
the team’s focus.
Think about roles differently. Some of the best teams I have met
are doing it with a slight twist. Almost all security hires are more like
programmers, because these days being able to leverage vendor APIs
and tie information together (again, orchestration) is huge. Being able
to write a few lines of code to filter out some of the events you’re
seeing, being able to generate more customized alerts that are more
easily digestible, and being able to pull in custom context and threat
intelligence are some of the reasons to have programmers on your
security team. Beyond this, teams are having success bringing in
financial analysts as security analysts, because these individuals are
skilled at critical thinking, looking at data and patterns, and leveraging
multiple technologies to help reach a conclusion.
Incentivize and grow. The government needs more incentive programs
to fill the national cyber shortage, but the effort should extend beyond
that. Private companies should offer incentive deals where a prospect
is loaned $10,000 to take and complete SANS classes. If they pass, they
are hired by the company. The employer knows that the employee has a
particular baseline, and they could count that money as the employee’s
training budget. Or, embrace similar ideas where a working adult who
might not have the money upfront can make the shift, too. We need to
think more like this so we can attract working professionals and other
non-college talent pools into the world of cyber defense.
Make it welcoming. Security circles are often filled with mild arrogance
because, well, those people are often very smart and are doing hard
jobs. But we need these circles to be welcoming. The security ninjas
need to treat the white belts with respect and nurture them so they
can eventually wear a cyber defense black belt. We need mentoring
programs, cheaper or free training, and marketing and PR efforts to let
the public know that cyber security is a great career path.
You don’t have to be in security now to get a security job, and you don’t
have to just recruit existing security professionals to fill your ranks. There’s
opportunity, we just need to create more incentives, generate exposure
to the broader technology and analytical thinker talent pools, and then
execute. Let’s make 2015 better than 2014 when it comes to expanding
the security talent pool.
2
With 110 Days Left Until WS2K3 Deadline,
Many Organizations Are Unprepared
MARCH 26, 2015 º CHRISTOPHER STRAND
There are 110 days left until July 14, 2015, the day Microsoft will end
support for Windows Server 2003 (WS2K3.)
Be honest with me for a second. Did you actually know that date? You’re
probably not alone if you didn’t. It appears that many IT professionals
do not. It also appears that many organizations—with a total of about 9
million servers—are still running WS2K3. That’s a very big problem.
Servers, including domain controllers and Web servers, are where most
organizations’ critical information resides. So, if organizations continue
to run Windows Server 2003 after July 14, without implementing
appropriate compensating controls, they are putting customer records,
trade secrets, and other highly valuable data at risk. Cyber criminals,
hacktivists and nation-states prey on unprotected servers, leaving
enterprises exposed to potentially catastrophic breaches that can lead to
lawsuits, regulatory fines and loss of customer trust.
What happens after July 14? According to Microsoft: “After July
14, Microsoft will no longer issue security updates for any version of
Windows Server 2003. If you are still running Windows Server 2003 in
your datacenter, you need to take steps now to plan and execute a
migration strategy to protect your infrastructure.”
This deadline must be taken seriously. However, based on the results of
a recent survey conducted by Bit9 + Carbon Black, many organizations
are not.
From the “Windows Server 2003 (WS2K3) End-of-Life Survey,” two key
results jumped out at me:
1 – Nearly one in three enterprises (30 percent) plan to continue
to run WS2K3 after the July 14 deadline, leaving an estimated 2.7
million servers unprotected
My first though when I saw that result come in was: “Wow, that’s a lot.”
But why is that important? Continued operation of unsecured
WS2K3 systems can leave organizations exposed to “zero-day forever
scenarios”—where new zero-day vulnerabilities are discovered and
exploited by attackers and no publicly available patch will ever be
provided. This is of particular concern with WS2K3, since it lacks many of
the more advanced memory protection features found in later Windows
operating systems, making the impact of exposed vulnerabilities
potentially more dangerous.
2 – More than half of enterprises (57 percent) do not know when
the end of life deadline is
In the survey, we gave a multiple choice (with 5 options) and asked
respondents to identify the month that WS2K3 end-of-life would
occur. Thirty percent of organizations surveyed said “I do not know.” An
additional combined 27 percent guessed incorrectly, choosing “May
2015,” “September 2015,” or “October 2015.”
There are 110 days left until the deadline. It takes about 200 days
to migrate operating systems for an enterprise. More the half of
organizations don’t even know what month support is ending. Do the
math. The result is not good.
How does this relate to Windows XP end-of-life?
With the critical role servers play at any enterprise, WS2K3 end of
life presents an even greater risk than last year’s Windows XP end of
life. Microsoft cut support for XP in April 2014. That decision affected
individual consumers and businesses alike. With WS2K3, consumers are
not likely to be impacted directly, but business running unsupported
operating systems will put customer records, classified company
information, and other sensitive data at risk.
What can be done?
With 110 days left until the end-of-life deadline, organizations yet to
upgrade must immediately aim to get their WS2K3 systems into a
compliant state to eliminate financial, and potential legal, penalties and
avoid the brand damage associated with failed audits, data breaches,
and noncompliance.”
Effective compensating controls for organizations without an upgrade
plan include: network isolation, application whitelisting, and continuous
server monitoring.
1
The March Madness of Cyber Security
MARCH 24, 2015 º BEN JOHNSON
It’s March Madness. My bracket is busted. Thanks to N.C. State’s upset of
Villanova, many of my friends’ brackets are busted as well.
While we’ve all come to know March Madness for the buzzer-beating
basketball games and Cinderella upsets and [insert another sports cliché
here], there’s a different kind of “madness” to think about: the madness
going on in cyber security.
Recently it was revealed that Premera was not only breached but had
ignored warnings in an audit conducted by the Office of Personnel
Management several weeks prior.
As a security strategist, that seemingly blatant disregard of the audit’s
findings is appalling. It’s…wait for it…madness.
Let me explain.
Compliance is not security. You’ve probably heard that 100 times before
but I’ll say it again. Compliance is not security. Compliance checkups,
otherwise known as audits, are there to set a minimum baseline. Audits
are not looking to make sure your organization has optimal security
posture.
If you go to the doctor for a physical, and the doctor says you’re not
dying, does that mean you are in your prime physical condition? Not
necessarily. Does it mean your immune system is optimized to prevent
or quickly respond to any viruses or bacteria that you may be exposed
to? Again, not necessarily.
Similarly, just because you pass an audit does not mean your
organization is secure or has any sort of cyber resiliency.
There’s a maddening, fundamental issue at work here. Despite the
advances we are making in pushing cyber defense to be a C-level issue,
there are still far too many people in power who don’t “get it.”
I recently visited three security guys who defend 50,000 computing
assets at a high-tech manufacturing company. They told me they were
just asked by their CIO, “So our perimeter is impenetrable now, right?”
What?!
When I heard that, I wanted to vomit, but I also wasn’t terribly surprised.
When we discussed getting more visibility in their environment, they
basically said it was better not knowing. Ah, good; the old “screw it”
defense. It’s concerning to see where cyber security is at some places.
Let’s return to basketball analogies. In information security, it often
feels like we’re blindly throwing up an alley-oop, hoping someone is on
the other end for the dunk (or, in our case, to find and stop malicious
activity).
The reality, most often, is there isn’t anyone on the other end of the pass
and we’re just chucking up false hope.
So in this “game,” what “plays” can you run?
ppRecognize that humans discover breaches—technology is just
there to support those humans and (we hope) make their jobs
faster and easier. Technology alone is not enough, just like a team’s
game plan is not enough on the basketball court. The players need
to execute for everything to work.
ppInvest time in improving your posture—even if you believe you
will get further behind in your alert queue, time spent determining
and fixing root cause versus just remediating an alert will pay
significant dividends and ultimately save you time. Legendary UCLA
coach John Wooden often would tell his players: “Be quick, but
don’t hurry.” That’s great advice for cyber security, as well.
ppFocus on feedback loops and orchestration—make sure you’re
measuring how you’re doing, that you’re testing yourself for a
response scenario, and that you’re looking for misconfiguration
and performing risk hunting. Imagine if the University of Kentucky
hadn’t spent any time practicing this season. Would they be 36-0
right now? Practice is key.
In information security, as with March Madness, there will be upsets,
there will be Cinderella stories, and there will be unsung heroes. Cyber
resiliency is a team effort. And not just your corporate team. Your region
and your “bracket” (i.e., the whole industry) as well. We all want to get
better year over year. The first thing we can do is make sure we’re not just
chucking up alley-oops, and if we are, check to see if someone is on the
other end to catch the pass and complete the play.
ABOUT BIT9 + CARBON BLACK
Bit9 + Carbon Black provides the most complete solution against advanced threats that target organizations’ endpoints and servers, making it easier to see—and immediately stop—
those threats. The company enables organizations to arm their endpoints by combining continuous, real-time visibility into what’s happening on every computer; real-time signatureless threat detection; incident response that combines a recorded history with live remediation; and prevention that is proactive and customizable. More than 1,000 organizations
worldwide—from Fortune 100 companies to small enterprises—use Bit9 + Carbon Black to increase security, reduce operational costs and improve compliance. Leading managed
security service providers (MSSP) and incident response (IR) companies have made Bit9 + Carbon Black a core component of their detection and response services.
© 2015 Bit9 and Carbon Black are trademarks of Bit9, Inc.
20150514
1100 Winter Street, Waltham, MA 02451 USA
P 617.393.7400 F 617.393.7499 www.bit9.com
Aligning with the Critical Security Controls to Achieve Quick Security Wins 24