SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
CERT-RO
Romanian Approach in Cyber Security
Catalin PATRASCU
catalin.patrascu@cert-ro.eu
http://www.cert-ro.eu
About CERT–RO
 COM (2010) 2020: Europe 2020 Strategy & COM (2010) 245: A
Digital Agenda for Europe
– Action area #3, Trust and Security: Member States should establish by 2012
a well-functioning network of CERTs at national level covering all of Europe
 H.G. 494 / 2011
– Prevent, analyze, identify and react to cyber security incidents related to
public IT&C infrastructure (not military, public safety, national security)
– National contact point for similar structures
– Elaborate and distribute public cyber security policies
– Analyze technical and procedural problems within cyber infrastructures.
CERT-RO Partenrs
CERT-RO Services
Proactive Reactive Support
• Alerts on new threats and
vulnerabilities that may affect
national cyberspace.
• Notices regarding the
possibility of major cyber
security incidents occurrence.
• Study guides and
documentation on recent
developments in the field of IT
& C. security.
• Security assessment for
partners (audits, network and
application pentests etc.).
• Alerts and warnings on
the occurrence of major
attacks preceding
activities.
• Alerts and warnings
related to cyber security
incidents occurrence.
• Management of a
database with national
cyber security incidents.
• Security incidents
investigation and results
dissemination.
• Awareness activities for
the government and
partners.
• Risk assessments
• Support the partners in
development of their own
CERT teams.
• Consulting services for
securing critical
infrastructures.
• Development of the
national policy and
security strategy with
partners.
Ticketing System
CERT-RO uses Request Tracker for Incident Response (RTIR), a customised
user interface which sits on top of Request Tracker (RT), a popular ticketing
system.
Everyday use of RTIR is through a web interface and does not require any
additional software to be installed on the user’s machine.
RT and RTIR are open-source projects supported by Best Practical Solutions LLC
and can be obtained from the company website:
http://bestpractical.com/rt/ - current stable release is RT 4.0.17
http://bestpractical.com/rtir/ - current stable release is RTIR 3.0.0
RTIR Interface - homepage
Incident Handling Workflow
RTIR’s incident handling system relies primarily on e-mail.
E-mail messages reporting incidents, called Incident Reports, are sent to an
email address configured by CERT/CSIRT (alerts@cert-ro.eu).
Messages that constitute on-going correspondence in the handling of a ticket
include a number in the form [CERT-RO #34159] and are automatically
appended to the corresponding RTIR ticket.
All new messages that do not include a number in the form [CERT-RO #34159]
are stored as new Incident Reports and appear in the New unlinked Incident
Reports section of the RTIR homepage.
Incident Handling Workflow
Dealing with Structured Data Feeds
CERT-RO receives daily reports (files with structured data) that together
contain 50,000 to 100,000 records related to cyber security events.
For that amount of data is needed an automated processing system.
Currently we use an in house developed solution to automatically:
• collect all data feeds;
• store them in a relational database (MySQL);
• perform data enrichment;
• distribute alerts to the affected parties
Right now we are working on adopting STIX (Structured Threat Information
eXpression) - http://stix.mitre.org/, supported by MITRE, which is a
collaborative community-driven effort to define and develop a standardized
language to represent structured cyber threat information.
Report on cyber security alerts received by
CERT-RO in the first 6 months of 2013
Report on cyber security alerts received by
CERT-RO in the first 6 months of 2013
Number of alerts
Number of unique IP’s
Advanced Persistent Threaths – APT’s
In the first two months of 2013 where discovered two cyber espionage
campaigns that targeted public institutions from Romania.
 Red October (ROCRA)
• Infection vector: email message with malicious document attached
• Exploited vulnerabilities: CVE-2009-3129 (Excel), CVE-2010-3333 (Word), CVE-2012-0158 (Word)
 MiniDUKE
• Infection vector : email message with malicious document attached
• Exploited vulnerabilities : exploit 0-day CVE-2013-0640/641 (Adobe Reader)
Conclusions
Based on the analysis of data held by CERT-RO, it appears that computer
science threats to the national cyberspace have diversified and evolutionary
trends was observed, both in terms of quantity and in terms of technical
complexity.
THANK YOU!

Mais conteúdo relacionado

Mais de S.E. CTS CERT-GOV-MD

Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeterS.E. CTS CERT-GOV-MD
 
Criminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legiiCriminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legiiS.E. CTS CERT-GOV-MD
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of viewS.E. CTS CERT-GOV-MD
 
Prezentare compartiment securitatea (2)
Prezentare compartiment securitatea (2)Prezentare compartiment securitatea (2)
Prezentare compartiment securitatea (2)S.E. CTS CERT-GOV-MD
 
CLOUD COMPUTING Security Risks or Opportunities
CLOUD COMPUTING Security Risks or  OpportunitiesCLOUD COMPUTING Security Risks or  Opportunities
CLOUD COMPUTING Security Risks or OpportunitiesS.E. CTS CERT-GOV-MD
 
Operarea md cert în reţea naţională de
Operarea md cert în reţea naţională deOperarea md cert în reţea naţională de
Operarea md cert în reţea naţională deS.E. CTS CERT-GOV-MD
 
Moldova cyber security 02.10.2013 rr
Moldova cyber security 02.10.2013 rrMoldova cyber security 02.10.2013 rr
Moldova cyber security 02.10.2013 rrS.E. CTS CERT-GOV-MD
 
GESTIONAREA RISCURILOR DE SECURITATE A INFORMAȚIEI
GESTIONAREA RISCURILOR DE  SECURITATE A INFORMAȚIEIGESTIONAREA RISCURILOR DE  SECURITATE A INFORMAȚIEI
GESTIONAREA RISCURILOR DE SECURITATE A INFORMAȚIEIS.E. CTS CERT-GOV-MD
 
Киберпреступность отступает?
Киберпреступность отступает?Киберпреступность отступает?
Киберпреступность отступает?S.E. CTS CERT-GOV-MD
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesS.E. CTS CERT-GOV-MD
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Aare reintam estonia_ciip_activites
Aare reintam estonia_ciip_activitesAare reintam estonia_ciip_activites
Aare reintam estonia_ciip_activitesS.E. CTS CERT-GOV-MD
 

Mais de S.E. CTS CERT-GOV-MD (17)

Symantec (3)
Symantec (3)Symantec (3)
Symantec (3)
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
Criminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legiiCriminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legii
 
SIS PREZENTARE CTS
SIS PREZENTARE CTSSIS PREZENTARE CTS
SIS PREZENTARE CTS
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Prezentare compartiment securitatea (2)
Prezentare compartiment securitatea (2)Prezentare compartiment securitatea (2)
Prezentare compartiment securitatea (2)
 
CLOUD COMPUTING Security Risks or Opportunities
CLOUD COMPUTING Security Risks or  OpportunitiesCLOUD COMPUTING Security Risks or  Opportunities
CLOUD COMPUTING Security Risks or Opportunities
 
Operarea md cert în reţea naţională de
Operarea md cert în reţea naţională deOperarea md cert în reţea naţională de
Operarea md cert în reţea naţională de
 
Moldova cyber security 02.10.2013 rr
Moldova cyber security 02.10.2013 rrMoldova cyber security 02.10.2013 rr
Moldova cyber security 02.10.2013 rr
 
GESTIONAREA RISCURILOR DE SECURITATE A INFORMAȚIEI
GESTIONAREA RISCURILOR DE  SECURITATE A INFORMAȚIEIGESTIONAREA RISCURILOR DE  SECURITATE A INFORMAȚIEI
GESTIONAREA RISCURILOR DE SECURITATE A INFORMAȚIEI
 
Киберпреступность отступает?
Киберпреступность отступает?Киберпреступность отступает?
Киберпреступность отступает?
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Cisco Secure X
Cisco Secure XCisco Secure X
Cisco Secure X
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Aare reintam estonia_ciip_activites
Aare reintam estonia_ciip_activitesAare reintam estonia_ciip_activites
Aare reintam estonia_ciip_activites
 
Symantec
SymantecSymantec
Symantec
 

Último

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 

Último (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

CERT-RO Romanian Approach in Cyber Security

  • 1. CERT-RO Romanian Approach in Cyber Security Catalin PATRASCU catalin.patrascu@cert-ro.eu http://www.cert-ro.eu
  • 2. About CERT–RO  COM (2010) 2020: Europe 2020 Strategy & COM (2010) 245: A Digital Agenda for Europe – Action area #3, Trust and Security: Member States should establish by 2012 a well-functioning network of CERTs at national level covering all of Europe  H.G. 494 / 2011 – Prevent, analyze, identify and react to cyber security incidents related to public IT&C infrastructure (not military, public safety, national security) – National contact point for similar structures – Elaborate and distribute public cyber security policies – Analyze technical and procedural problems within cyber infrastructures.
  • 4. CERT-RO Services Proactive Reactive Support • Alerts on new threats and vulnerabilities that may affect national cyberspace. • Notices regarding the possibility of major cyber security incidents occurrence. • Study guides and documentation on recent developments in the field of IT & C. security. • Security assessment for partners (audits, network and application pentests etc.). • Alerts and warnings on the occurrence of major attacks preceding activities. • Alerts and warnings related to cyber security incidents occurrence. • Management of a database with national cyber security incidents. • Security incidents investigation and results dissemination. • Awareness activities for the government and partners. • Risk assessments • Support the partners in development of their own CERT teams. • Consulting services for securing critical infrastructures. • Development of the national policy and security strategy with partners.
  • 5. Ticketing System CERT-RO uses Request Tracker for Incident Response (RTIR), a customised user interface which sits on top of Request Tracker (RT), a popular ticketing system. Everyday use of RTIR is through a web interface and does not require any additional software to be installed on the user’s machine. RT and RTIR are open-source projects supported by Best Practical Solutions LLC and can be obtained from the company website: http://bestpractical.com/rt/ - current stable release is RT 4.0.17 http://bestpractical.com/rtir/ - current stable release is RTIR 3.0.0
  • 6. RTIR Interface - homepage
  • 7. Incident Handling Workflow RTIR’s incident handling system relies primarily on e-mail. E-mail messages reporting incidents, called Incident Reports, are sent to an email address configured by CERT/CSIRT (alerts@cert-ro.eu). Messages that constitute on-going correspondence in the handling of a ticket include a number in the form [CERT-RO #34159] and are automatically appended to the corresponding RTIR ticket. All new messages that do not include a number in the form [CERT-RO #34159] are stored as new Incident Reports and appear in the New unlinked Incident Reports section of the RTIR homepage.
  • 9. Dealing with Structured Data Feeds CERT-RO receives daily reports (files with structured data) that together contain 50,000 to 100,000 records related to cyber security events. For that amount of data is needed an automated processing system. Currently we use an in house developed solution to automatically: • collect all data feeds; • store them in a relational database (MySQL); • perform data enrichment; • distribute alerts to the affected parties Right now we are working on adopting STIX (Structured Threat Information eXpression) - http://stix.mitre.org/, supported by MITRE, which is a collaborative community-driven effort to define and develop a standardized language to represent structured cyber threat information.
  • 10. Report on cyber security alerts received by CERT-RO in the first 6 months of 2013
  • 11. Report on cyber security alerts received by CERT-RO in the first 6 months of 2013 Number of alerts Number of unique IP’s
  • 12. Advanced Persistent Threaths – APT’s In the first two months of 2013 where discovered two cyber espionage campaigns that targeted public institutions from Romania.  Red October (ROCRA) • Infection vector: email message with malicious document attached • Exploited vulnerabilities: CVE-2009-3129 (Excel), CVE-2010-3333 (Word), CVE-2012-0158 (Word)  MiniDUKE • Infection vector : email message with malicious document attached • Exploited vulnerabilities : exploit 0-day CVE-2013-0640/641 (Adobe Reader)
  • 13. Conclusions Based on the analysis of data held by CERT-RO, it appears that computer science threats to the national cyberspace have diversified and evolutionary trends was observed, both in terms of quantity and in terms of technical complexity.