The Art of Cyber War Strategies in a rapidly evolving theatre SecureWorld, October 2013 © Radware, Inc. 2013 The Art of War is an ancient Chinese military treatise attributed to Sun Tzu, a high-ranking military general, strategist and tactician. It is commonly known to be the definitive work on military strategy and tactics, and for the last two thousand years has remained the most important military dissertation in Asia. It has had an influence on Eastern and Western military thinking, business tactics, legal strategy and beyond. Leaders as diverse as Mao Zedong and General Douglas MacArthur have drawn inspiration from the work. Many of its conclusions remain valid today in the cyber warfare era. 2 Variation of Tactics 九變 The Army on the March 行軍 Illusion & Reality 虛實 The Use of Intelligence 用間 Laying Plans 始計 故善战者,立于不败之地 Sophistication The good fighters of old first put themselves beyond the possibility of defeat • Duration: 20 Days • More than 7 Attack vectors • Attack target: Vatican • Duration: 3 Days • 5 Attack Vectors • Attack target: HKEX • Duration: 7 Months • Multiple attack vectors • Attack target: US Banks • Duration: 3 Days • 4 Attack Vectors • Attack target: Visa, MasterCard 2010 4 2011 2012 2013 Attack Vectors: Increasing Complexity 5 Attack Length: Increasing Duration 6 不戰而屈人之兵,善之善者也 To subdue the enemy without fighting is the acme of skill Individual Servers Malicious software installed on hosts and servers (mostly located at Russian and east European universities), controlled by a single entity by direct communication. 7 Botnets Stealthy malicious software installed mostly on personal computers without the owner’s consent; controlled by a single entity trough indirect channels (IRC, HTTP) Examples: Trin00, TFN, Trinity Examples: Agobot, DirtJumper, Zemra 1998 - 2002 1998 - Present Voluntary Botnets Many users, at times as part of a Hacktivist group, willingly share their personal computers. Using predetermined and publicly available attack tools and methods, with an optional remote control channel. Examples: LOIC, HOIC 2010 - Present New Server-based Botnets Powerful, well orchestrated attacks, using a geographically spread server infrastructure. Few attacking servers generate the same impact as hundreds of clients. 2012 不戰而屈人之兵,善之善者也 Current prices on the Russian underground market: Hacking corporate mailbox: $500 Winlocker ransomware: $10-$20 Unintelligent exploit bundle: $25 Intelligent exploit bundle: $10-$3,000 Basic crypter (for inserting rogue code into benign file): $10-$30 SOCKS bot (to get around firewalls): $100 Hiring a DDoS attack: $30-$70 / day, $1,200 / month Botnet: $200 for 2,000 bots DDoS Botnet: $700 ZeuS source code: $200-$250 Windows rootkit (for installing malicious drivers): $292 Hacking Facebook or Twitter account: $130 Hacking Gmail account: $162 Email spam: $10 per one million emails Email scam (using customer database): $50-$500 per one million emails 8 不戰而屈人之兵,善之善者也 9 Variation of Tactics 九變 The Army on the March 行軍 Illusion & Reality 虛實 The Use of Intelligence 用間 Laying Plans 始計 知彼知己,百戰不殆 If you know the enemy and know yourself, you need not fear the result of a hundred battles Notable DDoS Attacks in the Last 12 Months 11 行軍: Columbia Battlefield: Cause: Columbia Government On-line Services Columbian Independence Battle: A large scale cyber attack held on July 20th - Columbian Independence Day - against 30 Colombian government websites. Result: Most web sites were either defaced or shut down completely for the entire day of the attack. 12 行軍: Columbia Attackers: Columbian Hackers • A known hacker collective group suspected as being responsible for several other cyber attacks in Colombia during 2012-13. The group was supported by sympathizers use Twitter to communicate. Motivation: Ideological • Anti-government stance claiming to stand for “freedom, justice and peace.” Mantra: “We are Colombian Hackers, to serve the people.” 13 行軍: Columbia Web application attacks: • Directory traversal – web application attack to get access to password files that can be later cracked offline. • Brute force attacks on pcAnywhere service – looking for weak password protected accounts enables attackers to gain remote access to victim servers. • SQL Injection attacks – web application attacks to gain remote server access. • Web application vulnerability scanning • Application attacks: we have mainly seen HTTP Flood attacks Network DDoS attacks: • SYN floods, UDP floods, ICMP floods • Anomalous traffic (invalid TCP flags, source port zero, invalid L3/L4 header) • TCP port scans 14 行軍: Operation Ababil Battlefield: Cause: U.S. Commercial Banks Elimination of the Film “Innocence of Muslims” Battle: Phase 4 of major multi-phase campaign – Operation Ababil – that commenced during the week of July 22nd. Primary targets included: Bank of America, Chase Bank, PNC, Union Bank, BB&T, US Bank, Fifth Third Bank, Citibank and others. Result: Major US financial institutions impacted by intensive and protracted Distributed Denial of Service attacks. 15 行軍: Operation Ababil Massive TCP and UDP flood attacks: • Targeting both Web servers and DNS servers. Radware Emergency Response Team tracked and mitigated attacks of up to 25Gbps against one of its customers. Source appears to be Brobot botnet. DNS amplification attacks: • Attacker sends queries to a DNS server with a spoofed address that identifies the target under attack. Large replies from the DNS servers, usually so big that they need to be split over several packets, flood the target. HTTP flood attacks: • Cause web server resource starvation due to overwhelming number of page downloads. Encrypted attacks: • SSL based HTTPS GET requests generate a major load on the HTTP server by consuming 15x more CPU in order to process the encrypted attack traffic. 16 行軍: Operation Ababil Attackers: Cyber Fighters of Izz ad-Din al-Qassam • Purported Iranian state sponsored acktavist collective said to be acting to defend Islam Motivation: Religious Fundamentalism • “Well, misters! The break's over and it's now time to pay off. After a chance given to banks to rest awhile, now the Cyber Fighters of Izz ad-Din al-Qassam will once again take hold of their destiny. As we have said earlier, the Operation Ababil is performed because of widespread and organized offends to Islamic spirituals and holy issues, especially the great prophet of Islam(PBUH) and if the offended film is eliminated from the Internet, the related attacks also will be stopped. While the films exist, no one should expect this operation be fully stopped. The new phase will be a bit different and you'll feel this in the coming days. Mrt. Izz ad-Din al-Qassam Cyber Fighters” 17 行軍: Operation Ababil Event Correlation: Iranian Linked Cyber Attacks Parastoo Parastoo Iranian Cyber Army al Qassam Cyber Fighters 22 Events Iranian Cyber Army 1 Event al Qassam Cyber Fighters Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun 2011 2010 2012 Source: Analysis Intelligence 18 Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul 2013 行軍: Operation Ababil Challenge & Response Escalations: • Automatic Challenge mechanisms are employed by the Radware Attack Mitigation System to discriminate between legitimate traffic and attack tools • Phase 4 attackers implemented advanced mechanisms that emulated normal web browser users in order to circumvent mitigation tools • Necessitated the implementation of increasingly sophisticated challenge mechanisms that could not be supported by attack tools 19 Script 302 Redirect Challenge JS Challenge Special Challenge Kamikaze Pass Not pass Not pass Kamina Pass Not pass Not pass Terminator Pass Pass Not pass 行軍: Spamhaus Battlefield: Cause: Spamhaus Corporate Ideological Differences Battle: A nine-day assault that resulted in the largest recorded volumetric Distributed Denial of Service attack that peaked at over 300Gbps. Result: Spamhaus actually went down but claimed to have withstood the attack but only with the assistance from companies such as CloudFlare and Google. Given the scale of the attack and the techniques used, concerns were expressed that the very fabric of the internet could be compromised. 20 行軍: Spamhaus Attackers: CyberBunker? • Provider of anonymous secure hosting services Motivation: Retaliation against Spamhaus • CyberBunker, a provider of secure and anonymous hosting services, was blacklisted by Spamhaus, a non-profit anti-spamming organization that advises ISPs. It was claimed that CyberBunker was a 'rogue' host and a haven for cybercrime and spam organizations. Spamhaus alleged that Cyberbunker, with the aid of "criminal gangs" from Eastern Europe and Russia, launched a DDoS attack against Spamhaus for “abusing its influence.” 21 行軍: Spamhaus Attack Method: • The attack started as an 10-80Gbps attack that was firstly contained successfully, it started as a volumetric attack on layer 3 and peaked to 75Gbps on March 20. • During March 24-25 the attack grew to 100Gbps, peaking at 309Gbps. • No Botnet in use. Attackers were using servers on networks that allow IP spoofing in conjunction with open DNS resolvers. • Miss-configured DNS resolvers – with no response rate limiting allow the amplification of the attack by the factor of 50! • Nearly 25% of the networks are configured to allow spoofing instead of employing BCP38… • There are over 28 Million open resolvers in operation… 22 行軍: New York Times Battlefield: Cause: New York Times Syrian Conflict Battle: NYTimes Domain Name Server attack. Result: New York Times website taken offline for almost 2 hours as domain was redirected to Syrian Electronic Army servers. 23 行軍: New York Times Attackers: Syrian Electronic Army • Hackers aligned with Syrian President Bashar Assad. Mainly targets political opposition groups and western websites, including news organizations and human rights groups. Attacks: Spear Phishing & Directed DNS Attacks • Phishing attacks on Melbourne IT, the New York Times DNS registrar. • SEA hacked the NYT account and redirected the domain to its servers. 24 Variation of Tactics 九變 The Army on the March 行軍 Illusion & Reality 虛實 The Use of Intelligence 用間 Laying Plans 始計 不可胜在己 Internet 26 Internet Pipe Firewall IPS/IDS Load Balancer (ADC) Server 8% 5% 22% 30% 11% 4% 8% 8% 25% 24% 26% 27% Being unconquerable lies with yourself SQL Server 不可胜在己 Vulnerability Exploitation DoS Defense Component 27 Network Flood Infrastructure Exhaustion Target Exhaustion Network Devices No No Some Some Over-Provisioning No Yes, bandwidth Yes, infrastructure Yes, server & app. Firewall & Network Equipment No No Some Some NIPS or WAF Security Appliances Yes No No, part of problem No Anti-DoS Box (Stand-Alone) No No Yes Yes ISP-Side Tools No Yes Rarely Rarely Anti-Dos Appliances (ISP Connected) No Yes Yes Yes Anti-DoS Specialty Provider No Yes Yes Yes Content Delivery Network No Yes Yes Limited 不可胜在己 70% Proportion of businesses relying on CDNs for DDoS Protection 28 不可胜在己 Botnet Enterprise GET www.enterprise.com/?[Random] Bypassing CDN Protection 29 CDN 不可胜在己 Low & Slow attacks SSL encrypted attacks Botnet Enterprise Volumetric attacks Cloud protection limitations 30 Cloud Scrubbing 兵者 詭道也 All warfare is based on deception Threats: Source: Presenters: Goal: Authors: Universal DDoS Mitigation Bypass BlackHat USA 2013 Nexusguard Ltd, NT-ISAC Bloodspear Labs Defeat all known mechanisms for automatic mitigation of DDoS attacks Tony T.N. Miu, Albert K.T. Hui, W.L. Lee, Daniel X.P. Luo, Alan K.L. Chung, Judy W.S. Wong or CAPTCHA-based authentications being the most effective by far. However, in our research weaknesses were found in a majority of these sort of techniques. We rolled all our exploits into a proof-of-concept attack tool, giving it near-perfect DDoS mitigation bypass capability against almost every existing commercial DDoS mitigation solutions. The ramifications are huge. For the vast majority of web sites, these mitigation solutions stand as the last line of defense. Breaching this defense can expose these web sites' backend to devastating damages. We have extensively surveyed DDoS mitigation technologies available on the market today, uncovering the countermeasure techniques they employ, how they work, and 31 兵者 詭道也 Tool: Kill ‘em All 1.0 • Harnesses techniques such as Authentication Bypass, HTTP redirect, HTTP cookie and JavaScript • True TCP behavior, believable and random HTTP headers, JavaScript engine, random payload, tunable post authentication traffic model • Defeats current anti-DDoS solutions that detect malformed traffic, traffic profiling, rate limiting, source verification, Javascript and CAPTCHA-based authentication mechanisms • Creators allege that the tool is technically indistinguishable from legitimate human traffic Tested: 32 Arbor PeakFlow TMS, Akamai, Cloudflare, NSFocus Anti-DDoS System, Juniper, Variation of Tactics 九變 The Army on the March 行軍 Illusion & Reality 虛實 The Use of Intelligence 用間 Laying Plans 始計 兵之情主速 Attack Degree Axis Speed is the essence of war Attack Area Suspicious Area Normal Area 35 兵之情主速 THE SECURITY GAP Attacker has time to bypass automatic mitigation Target does not possess required defensive skills 36 兵之情主速 37 兵之情主速 38 Variation of Tactics 九變 The Army on the March 行軍 Illusion & Reality 虛實 The Use of Intelligence 用間 Laying Plans 始計 故兵貴勝,不貴久 What is essential in war is victory, not prolonged operations • • • • • • Envelope Attacks – Device Overload Directed Attacks - Exploits Intrusions – Mis-Configurations Localized Volume Attacks Low & Slow Attacks SSL Floods Detection: Encrypted / Non-Volumetric Attacks 40 故兵貴勝,不貴久 • • • • • • • Detection: Application Attacks 41 Web Attacks Application Misuse Connection Floods Brute Force Directory Traversals Injections Scraping & API Misuse 故兵貴勝,不貴久 • Network DDoS • SYN Floods • HTTP Floods Attack Detection: Volumetric Attacks 42 故兵貴勝,不貴久 Botnet Hosted Data Center Attack Mitigation Network: Low & Slow, SSL Encrypted 43 Enterprise Cloud Scrubbing 故兵貴勝,不貴久 Botnet Hosted Data Center Attack Mitigation Network: Application Exploits 44 Attack signatures Enterprise Cloud Scrubbing 故兵貴勝,不貴久 Botnet Hosted Data Center Attack Mitigation Network: Volumetric Attacks 45 Enterprise Cloud Scrubbing 故兵貴勝,不貴久 Botnet Hosted Data Center Attack Mitigation Network: Volumetric Attacks 46 Enterprise Attack signatures Cloud Scrubbing 故兵貴勝,不貴久 Botnet Hosted Data Center Attack Mitigation Network: Volumetric Attacks 47 Enterprise Cloud Scrubbing 你准备好了吗? Are You Ready? 48 谢谢 Thank You Carl Herberger, VP Security Solutions, Radware [email protected] © Radware, Inc. 2013
© Copyright 2024