SlideShare uma empresa Scribd logo
1 de 40
© 2015 Imperva, Inc. All rights reserved.
Man in the Cloud Attacks
Sagie Dulce, Amichai Shulman
August 5th, 2015
© 2015 Imperva, Inc. All rights reserved.
A Little Bit About Us
• Amichai Shulman
• CTO and Co-Founder of Imperva
• >20 Years Information Security
Experience
• >25 Years Information Technology
Experience
• Sagie Dulce
• Research Team Leader in Imperva
• >10 Years Information Security
Experience
2
© 2015 Imperva, Inc. All rights reserved.
Agenda
• Motivation
– What’s wrong with current botnets
– Why cloud file synchronization services
– Why use passwords when you can pass the token
• MITC Attacks
– Concept & details
– Demo
• Resilience of MITC attacks
– How hard is it to detect and mitigate
• Conclusions & Mitigation
3
© 2015 Imperva, Inc. All rights reserved.
Motivation (I)
What’s wrong with current botnets?
1
© 2015 Imperva, Inc. All rights reserved.
Infection Chain Vs. Kill Chain
• Some things you allegedly need for
a botnet
– 0-day exploit
– Injection code
– Malware persistence
– Communication channel and protocol
– C&C and Drop server infrastructure with
your own code
• Some things security solutions claim
to do
– Detect malicious code
– Detect malicious code behavior
– Identify malicious persistent code
– Detect malicious communication
channels
– Detect unusual communication
channels
– Detect communication with bad servers
– Take down malicious servers
5
© 2015 Imperva, Inc. All rights reserved.
The Holy Grail of Attackers
• Don’t use complex exploits
• Don’t need to install malicious
software
• Don’t need to build C&C
infrastructure
• Don’t use shady network protocols
for exfiltration
• Rely on existing software
• Use standard communication
channels
• Rely on existing infrastructure for
C&C and data collection
6
© 2015 Imperva, Inc. All rights reserved.
Motivation (II)
Why Use Cloud File Synchronization Services
2
© 2015 Imperva, Inc. All rights reserved.
Because It’s Cool
8
© 2015 Imperva, Inc. All rights reserved.
Because They are There
• Gartner calls this EFSS
– Enterprise File Sharing and
Synchronization
• 42% of more than 300 surveyed IT
professionals had a corporate
account for online file sharing and
collaboration services this year,
compared to 28% in 2012,
according to McClure
• OneDrive, Google Drive, Box &
DropBox > 65% of business usage
9
Business Usage Survey
451 Research
Mobile Downloads (Millions)
Xyo
© 2015 Imperva, Inc. All rights reserved.
The Workings of EFSS
• Corporate Data accessed
within perimeter
• Downloaded to Mobile
• Accessed by 3rd party apps
10
© 2015 Imperva, Inc. All rights reserved.
EFSS Has All the Right Pieces
• Global robust server deployment
• C&C and data delivery protocols
– Encrypted with TLS
– Whitelisted by perimeter security
• Local software agent for delivering data in and out of the machine
– Whitelisted by any endpoint security software
• Free entry level offerings 
– Business and personal use
• Global mindshare and recognition
11
© 2015 Imperva, Inc. All rights reserved.
Motivation (III)
Why use passwords when you can “Pass The
Token”?
3
© 2015 Imperva, Inc. All rights reserved.
(OAuth) Tokens
• Token is generated through interactive authentication (user name / password)
• Token can be associated with limited set of privileges
– Application access ≠ Account control
• Token is provided to 3rd party application
– Persistently stored as part of the application’s configuration
• Authentication = Present Token
• Revoking the token prevents further access by 3rd party application
13
© 2015 Imperva, Inc. All rights reserved.
Passwords Vs. Tokens
• Passwords are easy to remember –
easy to crack
• Passwords can and need to
frequently change
• Passwords are good for (human)
interactive authentication
• Tokens are difficult to guess
(arbitrarily long and random)
• Do not need to change frequently
• Tokens can be revoked
• Tokens should be used for
application authentication
14
© 2015 Imperva, Inc. All rights reserved.15
Getting Tokens
© 2015 Imperva, Inc. All rights reserved.
Passwords Vs. Tokens (Round 2)
• Password authentication may
require 2FA
• Password authentication is sensitive
to new device, new location
protection
• Password only available when user
types it
• Password is valid through a limited
timeframe
• Token authentication is seamless
• Token authentication is (in practice)
insensitive to new device / new
location protection
• Token is always available as part of
the persistent configuration
• Tokens are forever (sometimes
literally)
• Difficult to attribute
16
© 2015 Imperva, Inc. All rights reserved.
Man In The Cloud (MITC) Attacks
The Sky is Falling
4
17
© 2015 Imperva, Inc. All rights reserved.
Concept
• Abuse cloud file synchronization services
– Data compromise
– Data exfiltration
– C&C and remote access
• Highlights of the attack plan
– Synchronize victim’s machine with attacker controlled account
– Obtain victim’s token through the synchronization mechanism
– Retrieve sensitive data from the victim’s account using the victim’s token
– Potentially send code for remote execution through the synchronization mechanism
18
© 2015 Imperva, Inc. All rights reserved.
Synchronize Victim’s Machine with Attacker Account
• As a first step, attacker creates an account rather than compromise the
victim’s account
– The attacker obtains the authentication token for that account
• Code executes on victim’s machine to “switch” synchronization account
– Stop synchronization application
– Replace the existing token with the attacker token
– Restart synchronization application
19
© 2015 Imperva, Inc. All rights reserved.
Finding and Replacing Tokens
• More details available in our HII report
20
Synchronization
Application
Token Type OAuth Refresh Token OAuth Refresh Token OAuth Refresh Token Proprietary
Location
Windows Credential
Manager
Windows Credential
Manager
Encrypted in Registry Encrypted SQLite file
© 2015 Imperva, Inc. All rights reserved.
Obtain Victim’s Token
• Put the original token in a file
• Put the file in the synchronization folder
• Wait for the file to appear on the other side of earth
21
© 2015 Imperva, Inc. All rights reserved.
Some Details – Google Drive
• OAuth Refresh Token
• Retrieve token
– Decrypt registry using Windows CryptUnprotectData
HKCUSoftwareGoogleDriveOAuthToken_***unique**
• Replace token (while app inactive)
– Delete “old” registry entry & replace with harvested entry
HKCUSoftwareGoogleDriveOAuthToken_**new**
– Encrypt harvested token using Windows CryptProtectData
– Replace each row inside the data table in sync_config.db with the attacker’s data, except
for the “local_sync_root_path” entry (which holds the path to the vicitm’s synced folder
22
© 2015 Imperva, Inc. All rights reserved.
Some Details – The “Malicious” Code
23
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Quick Double Switch
25
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Quick Double Switch
26
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Quick Double Switch
27
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Remote Code Execution
28
© 2015 Imperva, Inc. All rights reserved.
Remote Code Execution - Details
• WMI event subscription
• Waiting on file creation
in sync folder
• Created file is executed
• “mofcomp config.mof”
29
© 2015 Imperva, Inc. All rights reserved.
Demo
30
© 2015 Imperva, Inc. All rights reserved.
Additional Attack Scenarios
• Waiting for good things to come
– Inject scripts and macros into synchronized documents
– Hope that victim opens such a document
– Increase probability by piggybacking on active documents
• Cloud RansomWare
– Encrypt victim’s data and demand ransom
31
© 2015 Imperva, Inc. All rights reserved.
Native Detection and Mitigation
How bad is it?
5
32
© 2015 Imperva, Inc. All rights reserved.
Detecting a Compromise
33
Synchronization
Application
Proactive (alerts) None None None
None (if attacker spoofs
the device ID)
Reactive (forensics)
Review history of
connected locations and
devices
Review history of
connected locations and
devices
None
Constantly monitor last
connected location
© 2015 Imperva, Inc. All rights reserved.
Recovery From a Compromise
34
Synchronization
Application
Turn on 2FA
Not applicable to
tokens
Not applicable to
tokens
Not applicable to
tokens
Not applicable to
“host_id”
Revoke Stolen Token
Disconnecting
devices doesn’t
revoke token
Disconnect Devices Disconnect devices Disconnect Devices
Change Password
Revokes tokens.
Opened “sessions”
remain open
Specifically Request
to revoke all tokens
Revokes all tokens
Not applicable to
host_id
© 2015 Imperva, Inc. All rights reserved.
Takedown
• IT infrastructure of the Botnet cannot be taken down
– It’s a vital service most of us use
• Attacker’s account is NEVER compromised
– Even if token is exposed during initial infection it is extremely difficult to associate with an
account (with the exception of DropBox )
• It is therefore extremely difficult to take down the specific account used for the
initial compromise
– Moreover, it has no actual effect on existing infections or future ones
35
© 2015 Imperva, Inc. All rights reserved.
Conclusions & Mitigations
6
© 2015 Imperva, Inc. All rights reserved.
Summary
• Cloud file synchronization services can be easily turned into an infrastructure
for endpoint compromise, providing a channel for C&C, data exfiltration, and
remote access
• Compromise can be achieved through the use of tokens rather than
passwords
• Due to the use of tokens, compromise is almost undetectable and sometimes
irreversible (for an account)
• Attacks based on the above architecture have been witnessed in the wild (for
example, in “The Inception Framework ” – analysis by Blue Coat)
37
© 2015 Imperva, Inc. All rights reserved.
Mitigation
• Endpoint and perimeter security measures are incapable of detecting and
mitigating this threat as no malicious code persists on the endpoint, and no
abnormal outbound traffic channels are observed on the wire
• Vendors could do better
– Improve proactive detection (location alerts for tokens)
– 2FA for new devices (even with token access only)
– Allow revocation of any existing application token
• Vendor will always struggle though with the right balance of security and
mobility
38
© 2015 Imperva, Inc. All rights reserved.
Mitigation – Improve Control of EFSS
• Cloud Access Security Broker (CASB) Solutions
– Anomaly detection and device control at the enterprise level rather than the individual
service level
– Apply enterprise wide policies to new devices
– Block & alert on rapid changes in location
– Alert on abnormal usage (file loaded from one device and deleted quickly on another for
example)
39
© 2015 Imperva, Inc. All rights reserved.
Mitigation – It’s All About the Data, Stupid!
• Attackers are after enterprise data and not after individual endpoints
• A successful attack (e.g. 145M user accounts, 70M credit card numbers, 300K
medical records, 4M employee evaluation forms) must express itself in
abusive data access
• Deploy monitoring, detection and control solutions around data repositories
– SQL databases, NoSQL repositories, File servers, SharePoint deployments
– See everything, detect abnormal and abusive access patterns, react by denying further
access to potentially compromised machines and accounts
40
• Download HII report
– https://www.imperva.com/DefenseCenter/HackerIntelligenceReports

Mais conteúdo relacionado

Mais procurados

Giáo trình bảo mật thông tin
Giáo trình bảo mật thông tinGiáo trình bảo mật thông tin
Giáo trình bảo mật thông tinjackjohn45
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Lập sơ đồ thiết kế mạng
Lập sơ đồ thiết kế mạngLập sơ đồ thiết kế mạng
Lập sơ đồ thiết kế mạngnamtran471
 
An Toàn và bảo mật HTTT-Cơ bản về mã hoá (cryptography)
An Toàn và bảo mật HTTT-Cơ bản về mã hoá (cryptography)An Toàn và bảo mật HTTT-Cơ bản về mã hoá (cryptography)
An Toàn và bảo mật HTTT-Cơ bản về mã hoá (cryptography)dlmonline24h
 
Bai giang atbmtt
Bai giang atbmtt Bai giang atbmtt
Bai giang atbmtt Hà Vũ
 
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)Hachmdhmdzad
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Ransomware
Ransomware Ransomware
Ransomware Armor
 
Mô hình điện toán đám mây
Mô hình điện toán đám mâyMô hình điện toán đám mây
Mô hình điện toán đám mâyPhamTuanKhiem
 
Zero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdfZero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdfopenfind
 
3rd party information security assessment guideline
3rd party information security assessment guideline3rd party information security assessment guideline
3rd party information security assessment guidelinePriyanka Aash
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats mohamad Hamizi
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
MỘT SỐ NGUY CƠ ĐỐI VỚI AN TOÀN, BẢO MẬT THÔNG TIN TRÊN MẠNG CNTT CƠ QUAN ĐẢNG...
MỘT SỐ NGUY CƠ ĐỐI VỚI AN TOÀN, BẢO MẬT THÔNG TIN TRÊN MẠNG CNTT CƠ QUAN ĐẢNG...MỘT SỐ NGUY CƠ ĐỐI VỚI AN TOÀN, BẢO MẬT THÔNG TIN TRÊN MẠNG CNTT CƠ QUAN ĐẢNG...
MỘT SỐ NGUY CƠ ĐỐI VỚI AN TOÀN, BẢO MẬT THÔNG TIN TRÊN MẠNG CNTT CƠ QUAN ĐẢNG...Vu Hung Nguyen
 
Thiết kế mạng lan cho tòa nhà 3 tầng - luận văn, đồ án, đề tài tốt nghiệp (Đặ...
Thiết kế mạng lan cho tòa nhà 3 tầng - luận văn, đồ án, đề tài tốt nghiệp (Đặ...Thiết kế mạng lan cho tòa nhà 3 tầng - luận văn, đồ án, đề tài tốt nghiệp (Đặ...
Thiết kế mạng lan cho tòa nhà 3 tầng - luận văn, đồ án, đề tài tốt nghiệp (Đặ...ThíckThọ Thì ThêThảm
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 

Mais procurados (20)

Giáo trình bảo mật thông tin
Giáo trình bảo mật thông tinGiáo trình bảo mật thông tin
Giáo trình bảo mật thông tin
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Lập sơ đồ thiết kế mạng
Lập sơ đồ thiết kế mạngLập sơ đồ thiết kế mạng
Lập sơ đồ thiết kế mạng
 
An Toàn và bảo mật HTTT-Cơ bản về mã hoá (cryptography)
An Toàn và bảo mật HTTT-Cơ bản về mã hoá (cryptography)An Toàn và bảo mật HTTT-Cơ bản về mã hoá (cryptography)
An Toàn và bảo mật HTTT-Cơ bản về mã hoá (cryptography)
 
Bai giang atbmtt
Bai giang atbmtt Bai giang atbmtt
Bai giang atbmtt
 
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)
 
Đề tài: Thiết kế hệ thống mạng cho một công ty, HOT, 9đ
Đề tài: Thiết kế hệ thống mạng cho một công ty, HOT, 9đĐề tài: Thiết kế hệ thống mạng cho một công ty, HOT, 9đ
Đề tài: Thiết kế hệ thống mạng cho một công ty, HOT, 9đ
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Kỹ thuật giấu tin văn bản trong hình ảnh dựa trên hàm modulus
Kỹ thuật giấu tin văn bản trong hình ảnh dựa trên hàm modulusKỹ thuật giấu tin văn bản trong hình ảnh dựa trên hàm modulus
Kỹ thuật giấu tin văn bản trong hình ảnh dựa trên hàm modulus
 
Ransomware
Ransomware Ransomware
Ransomware
 
Mô hình điện toán đám mây
Mô hình điện toán đám mâyMô hình điện toán đám mây
Mô hình điện toán đám mây
 
Zero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdfZero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdf
 
3rd party information security assessment guideline
3rd party information security assessment guideline3rd party information security assessment guideline
3rd party information security assessment guideline
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
MỘT SỐ NGUY CƠ ĐỐI VỚI AN TOÀN, BẢO MẬT THÔNG TIN TRÊN MẠNG CNTT CƠ QUAN ĐẢNG...
MỘT SỐ NGUY CƠ ĐỐI VỚI AN TOÀN, BẢO MẬT THÔNG TIN TRÊN MẠNG CNTT CƠ QUAN ĐẢNG...MỘT SỐ NGUY CƠ ĐỐI VỚI AN TOÀN, BẢO MẬT THÔNG TIN TRÊN MẠNG CNTT CƠ QUAN ĐẢNG...
MỘT SỐ NGUY CƠ ĐỐI VỚI AN TOÀN, BẢO MẬT THÔNG TIN TRÊN MẠNG CNTT CƠ QUAN ĐẢNG...
 
Thiết kế mạng lan cho tòa nhà 3 tầng - luận văn, đồ án, đề tài tốt nghiệp (Đặ...
Thiết kế mạng lan cho tòa nhà 3 tầng - luận văn, đồ án, đề tài tốt nghiệp (Đặ...Thiết kế mạng lan cho tòa nhà 3 tầng - luận văn, đồ án, đề tài tốt nghiệp (Đặ...
Thiết kế mạng lan cho tòa nhà 3 tầng - luận văn, đồ án, đề tài tốt nghiệp (Đặ...
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 

Destaque

The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsThe State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsImperva
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...Irissolution
 
Saving The Internet of Things: Presentation to Facebook
Saving The Internet of Things: Presentation to FacebookSaving The Internet of Things: Presentation to Facebook
Saving The Internet of Things: Presentation to FacebookPaul Brody
 
Intimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of ThingsIntimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of ThingsPaul Brody
 
2015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
2015년 2분기 주요 정보보안 소식 차민석 공개판_201508102015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
2015년 2분기 주요 정보보안 소식 차민석 공개판_20150810Minseok(Jacky) Cha
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusImperva
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksImperva
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised InsiderImperva
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment SpamImperva
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesImperva
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceImperva
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Imperva
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Imperva
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.Imperva
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014Imperva
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security RisksImperva
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksImperva
 

Destaque (20)

The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsThe State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
 
Saving The Internet of Things: Presentation to Facebook
Saving The Internet of Things: Presentation to FacebookSaving The Internet of Things: Presentation to Facebook
Saving The Internet of Things: Presentation to Facebook
 
Intimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of ThingsIntimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of Things
 
2015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
2015년 2분기 주요 정보보안 소식 차민석 공개판_201508102015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
2015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted Attacks
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat Intelligence
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 

Semelhante a Man in the Cloud Attacks

Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversWithTheBest
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADERocket Software
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Luca Bongiorni
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VRISC-V International
 
Going Beyond the Device Heart Beat
Going Beyond the Device Heart BeatGoing Beyond the Device Heart Beat
Going Beyond the Device Heart BeatBalwinder Kaur
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Teemu Tiainen
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeLancope, Inc.
 
Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT SecurityOliver Pfaff
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion DetectionAPNIC
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 PresentationAmy McMullin
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 blior mazor
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 

Semelhante a Man in the Cloud Attacks (20)

Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADE
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
Going Beyond the Device Heart Beat
Going Beyond the Device Heart BeatGoing Beyond the Device Heart Beat
Going Beyond the Device Heart Beat
 
C days2015
C days2015C days2015
C days2015
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT Security
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 

Mais de Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 

Mais de Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Último

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Último (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Man in the Cloud Attacks

  • 1. © 2015 Imperva, Inc. All rights reserved. Man in the Cloud Attacks Sagie Dulce, Amichai Shulman August 5th, 2015
  • 2. © 2015 Imperva, Inc. All rights reserved. A Little Bit About Us • Amichai Shulman • CTO and Co-Founder of Imperva • >20 Years Information Security Experience • >25 Years Information Technology Experience • Sagie Dulce • Research Team Leader in Imperva • >10 Years Information Security Experience 2
  • 3. © 2015 Imperva, Inc. All rights reserved. Agenda • Motivation – What’s wrong with current botnets – Why cloud file synchronization services – Why use passwords when you can pass the token • MITC Attacks – Concept & details – Demo • Resilience of MITC attacks – How hard is it to detect and mitigate • Conclusions & Mitigation 3
  • 4. © 2015 Imperva, Inc. All rights reserved. Motivation (I) What’s wrong with current botnets? 1
  • 5. © 2015 Imperva, Inc. All rights reserved. Infection Chain Vs. Kill Chain • Some things you allegedly need for a botnet – 0-day exploit – Injection code – Malware persistence – Communication channel and protocol – C&C and Drop server infrastructure with your own code • Some things security solutions claim to do – Detect malicious code – Detect malicious code behavior – Identify malicious persistent code – Detect malicious communication channels – Detect unusual communication channels – Detect communication with bad servers – Take down malicious servers 5
  • 6. © 2015 Imperva, Inc. All rights reserved. The Holy Grail of Attackers • Don’t use complex exploits • Don’t need to install malicious software • Don’t need to build C&C infrastructure • Don’t use shady network protocols for exfiltration • Rely on existing software • Use standard communication channels • Rely on existing infrastructure for C&C and data collection 6
  • 7. © 2015 Imperva, Inc. All rights reserved. Motivation (II) Why Use Cloud File Synchronization Services 2
  • 8. © 2015 Imperva, Inc. All rights reserved. Because It’s Cool 8
  • 9. © 2015 Imperva, Inc. All rights reserved. Because They are There • Gartner calls this EFSS – Enterprise File Sharing and Synchronization • 42% of more than 300 surveyed IT professionals had a corporate account for online file sharing and collaboration services this year, compared to 28% in 2012, according to McClure • OneDrive, Google Drive, Box & DropBox > 65% of business usage 9 Business Usage Survey 451 Research Mobile Downloads (Millions) Xyo
  • 10. © 2015 Imperva, Inc. All rights reserved. The Workings of EFSS • Corporate Data accessed within perimeter • Downloaded to Mobile • Accessed by 3rd party apps 10
  • 11. © 2015 Imperva, Inc. All rights reserved. EFSS Has All the Right Pieces • Global robust server deployment • C&C and data delivery protocols – Encrypted with TLS – Whitelisted by perimeter security • Local software agent for delivering data in and out of the machine – Whitelisted by any endpoint security software • Free entry level offerings  – Business and personal use • Global mindshare and recognition 11
  • 12. © 2015 Imperva, Inc. All rights reserved. Motivation (III) Why use passwords when you can “Pass The Token”? 3
  • 13. © 2015 Imperva, Inc. All rights reserved. (OAuth) Tokens • Token is generated through interactive authentication (user name / password) • Token can be associated with limited set of privileges – Application access ≠ Account control • Token is provided to 3rd party application – Persistently stored as part of the application’s configuration • Authentication = Present Token • Revoking the token prevents further access by 3rd party application 13
  • 14. © 2015 Imperva, Inc. All rights reserved. Passwords Vs. Tokens • Passwords are easy to remember – easy to crack • Passwords can and need to frequently change • Passwords are good for (human) interactive authentication • Tokens are difficult to guess (arbitrarily long and random) • Do not need to change frequently • Tokens can be revoked • Tokens should be used for application authentication 14
  • 15. © 2015 Imperva, Inc. All rights reserved.15 Getting Tokens
  • 16. © 2015 Imperva, Inc. All rights reserved. Passwords Vs. Tokens (Round 2) • Password authentication may require 2FA • Password authentication is sensitive to new device, new location protection • Password only available when user types it • Password is valid through a limited timeframe • Token authentication is seamless • Token authentication is (in practice) insensitive to new device / new location protection • Token is always available as part of the persistent configuration • Tokens are forever (sometimes literally) • Difficult to attribute 16
  • 17. © 2015 Imperva, Inc. All rights reserved. Man In The Cloud (MITC) Attacks The Sky is Falling 4 17
  • 18. © 2015 Imperva, Inc. All rights reserved. Concept • Abuse cloud file synchronization services – Data compromise – Data exfiltration – C&C and remote access • Highlights of the attack plan – Synchronize victim’s machine with attacker controlled account – Obtain victim’s token through the synchronization mechanism – Retrieve sensitive data from the victim’s account using the victim’s token – Potentially send code for remote execution through the synchronization mechanism 18
  • 19. © 2015 Imperva, Inc. All rights reserved. Synchronize Victim’s Machine with Attacker Account • As a first step, attacker creates an account rather than compromise the victim’s account – The attacker obtains the authentication token for that account • Code executes on victim’s machine to “switch” synchronization account – Stop synchronization application – Replace the existing token with the attacker token – Restart synchronization application 19
  • 20. © 2015 Imperva, Inc. All rights reserved. Finding and Replacing Tokens • More details available in our HII report 20 Synchronization Application Token Type OAuth Refresh Token OAuth Refresh Token OAuth Refresh Token Proprietary Location Windows Credential Manager Windows Credential Manager Encrypted in Registry Encrypted SQLite file
  • 21. © 2015 Imperva, Inc. All rights reserved. Obtain Victim’s Token • Put the original token in a file • Put the file in the synchronization folder • Wait for the file to appear on the other side of earth 21
  • 22. © 2015 Imperva, Inc. All rights reserved. Some Details – Google Drive • OAuth Refresh Token • Retrieve token – Decrypt registry using Windows CryptUnprotectData HKCUSoftwareGoogleDriveOAuthToken_***unique** • Replace token (while app inactive) – Delete “old” registry entry & replace with harvested entry HKCUSoftwareGoogleDriveOAuthToken_**new** – Encrypt harvested token using Windows CryptProtectData – Replace each row inside the data table in sync_config.db with the attacker’s data, except for the “local_sync_root_path” entry (which holds the path to the vicitm’s synced folder 22
  • 23. © 2015 Imperva, Inc. All rights reserved. Some Details – The “Malicious” Code 23
  • 24. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Quick Double Switch 25
  • 25. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Quick Double Switch 26
  • 26. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Quick Double Switch 27
  • 27. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Remote Code Execution 28
  • 28. © 2015 Imperva, Inc. All rights reserved. Remote Code Execution - Details • WMI event subscription • Waiting on file creation in sync folder • Created file is executed • “mofcomp config.mof” 29
  • 29. © 2015 Imperva, Inc. All rights reserved. Demo 30
  • 30. © 2015 Imperva, Inc. All rights reserved. Additional Attack Scenarios • Waiting for good things to come – Inject scripts and macros into synchronized documents – Hope that victim opens such a document – Increase probability by piggybacking on active documents • Cloud RansomWare – Encrypt victim’s data and demand ransom 31
  • 31. © 2015 Imperva, Inc. All rights reserved. Native Detection and Mitigation How bad is it? 5 32
  • 32. © 2015 Imperva, Inc. All rights reserved. Detecting a Compromise 33 Synchronization Application Proactive (alerts) None None None None (if attacker spoofs the device ID) Reactive (forensics) Review history of connected locations and devices Review history of connected locations and devices None Constantly monitor last connected location
  • 33. © 2015 Imperva, Inc. All rights reserved. Recovery From a Compromise 34 Synchronization Application Turn on 2FA Not applicable to tokens Not applicable to tokens Not applicable to tokens Not applicable to “host_id” Revoke Stolen Token Disconnecting devices doesn’t revoke token Disconnect Devices Disconnect devices Disconnect Devices Change Password Revokes tokens. Opened “sessions” remain open Specifically Request to revoke all tokens Revokes all tokens Not applicable to host_id
  • 34. © 2015 Imperva, Inc. All rights reserved. Takedown • IT infrastructure of the Botnet cannot be taken down – It’s a vital service most of us use • Attacker’s account is NEVER compromised – Even if token is exposed during initial infection it is extremely difficult to associate with an account (with the exception of DropBox ) • It is therefore extremely difficult to take down the specific account used for the initial compromise – Moreover, it has no actual effect on existing infections or future ones 35
  • 35. © 2015 Imperva, Inc. All rights reserved. Conclusions & Mitigations 6
  • 36. © 2015 Imperva, Inc. All rights reserved. Summary • Cloud file synchronization services can be easily turned into an infrastructure for endpoint compromise, providing a channel for C&C, data exfiltration, and remote access • Compromise can be achieved through the use of tokens rather than passwords • Due to the use of tokens, compromise is almost undetectable and sometimes irreversible (for an account) • Attacks based on the above architecture have been witnessed in the wild (for example, in “The Inception Framework ” – analysis by Blue Coat) 37
  • 37. © 2015 Imperva, Inc. All rights reserved. Mitigation • Endpoint and perimeter security measures are incapable of detecting and mitigating this threat as no malicious code persists on the endpoint, and no abnormal outbound traffic channels are observed on the wire • Vendors could do better – Improve proactive detection (location alerts for tokens) – 2FA for new devices (even with token access only) – Allow revocation of any existing application token • Vendor will always struggle though with the right balance of security and mobility 38
  • 38. © 2015 Imperva, Inc. All rights reserved. Mitigation – Improve Control of EFSS • Cloud Access Security Broker (CASB) Solutions – Anomaly detection and device control at the enterprise level rather than the individual service level – Apply enterprise wide policies to new devices – Block & alert on rapid changes in location – Alert on abnormal usage (file loaded from one device and deleted quickly on another for example) 39
  • 39. © 2015 Imperva, Inc. All rights reserved. Mitigation – It’s All About the Data, Stupid! • Attackers are after enterprise data and not after individual endpoints • A successful attack (e.g. 145M user accounts, 70M credit card numbers, 300K medical records, 4M employee evaluation forms) must express itself in abusive data access • Deploy monitoring, detection and control solutions around data repositories – SQL databases, NoSQL repositories, File servers, SharePoint deployments – See everything, detect abnormal and abusive access patterns, react by denying further access to potentially compromised machines and accounts 40
  • 40. • Download HII report – https://www.imperva.com/DefenseCenter/HackerIntelligenceReports

Notas do Editor

  1. Let’s build this slide on the content of this URL: http://searchcloudstorage.techtarget.com/news/2240237177/Enterprise-file-sync-and-share-expands-in-2014 Found more stats here techcrunch.com/2014/11/27/the-most-popular-enterprise-storage-product-might-surprise-you/Pai
  2. We have slides describing 3 parts of the attack plan. The 3rd one – retrieving data is trivial as it is provided by the platform.
  3. Attacker can anonymously create a free account with any of the major EFSS vendors.
  4. Encryption uses current user context and therefore decryption does not require a key, but rather code running in the user’s context.
  5. It’s not clear how to disinfect an account in OneDrive