Network and Data Security for Non-Engineers

Total Page:16

File Type:pdf, Size:1020Kb

Network and Data Security for Non-Engineers Network and Data Security for Non-Engineers Network and Data Security for Non-Engineers Frank M. Groom Kevin Groom Stephan S. Jones MATLAB® and Simulink® are trademarks of The MathWorks, Inc. and are used with permission. The MathWorks does not warrant the accuracy of the text or exercises in this book. This book’s use or discussion of MATLAB® and Simulink® software or related products does not constitute endorsement or sponsorship by The MathWorks of a particular peda- gogical approach or particular use of the MATLAB® and Simulink® software. CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2017 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper Version Date: 20160426 International Standard Book Number-13: 978-1-4987-6786-6 (Paperback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the valid- ity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or uti- lized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopy- ing, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http:// www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Names: Groom, Frank M., author. | Groom, Kevin M., author. | Jones, Stephan., author. Title: Network and data security for non-engineers / Frank M. Groom, Kevin Groom, and Stephan S. Jones. Description: Boca Raton : CRC Press, Taylor & Francis Group, an Informa Business, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016008261 | ISBN 9781498767866 Subjects: LCSH: Computer networks--Security measures. Classification: LCC TK5105.59 .G78 2017 | DDC 005.8--dc23 LC record available at https://lccn.loc.gov/2016008261 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents Preface .................................................................................................................................... xiii Authors .....................................................................................................................................xv 1 Introduction to Security Threats ..................................................................................1 2 The 2014–2015 Anthem Blue Cross and Blue Shield Break-In Case Study ..................3 Step 1: Reconnaissance ...................................................................................................... 4 Step 2: Picking the Right Target and Spear Phishing em ............................................... 4 Spear Phishing .............................................................................................................. 5 Waterholes ..................................................................................................................... 5 Step 3: Initial System Entry ............................................................................................... 5 Next Steps to Establish an Undetectable Anonymous Persistent Presence .......................... 6 Password Decryption Process and Equipment ................................................................... 6 Testbed .............................................................................................................................. 6 Final Steps ......................................................................................................................... 6 Tools Used by Hackers to Acquire Valid Entry Credentials and Tools Used by Security Personnel to Detect Activity and Malware and Protect the Stored Data .............. 8 Tool 1: Initial Spear-Phishing Entry Leading to the ScanBox Keystroke Logger ........... 8 Tool 2: Setting Up an Anonymous Path Using Tor ..................................................... 12 Tool 3: CrowdStrike Identied Hacker Clusters, China Chopper Web-Shell Controller .....................................................................................................................16 CrowdStrike’s Identied Hacking Clusters ..............................................................16 China Chopper Web Shell Controller ......................................................................17 Types of Common Monitoring Software Employed ................................................18 Looking for Derusbi Parsing Software .....................................................................18 RSA’s ECAT Scanning Software..............................................................................19 Yara’s Operation ......................................................................................................19 3 Anonymous Persistent Threats ...................................................................................21 Rivest–Shamir–Adleman (RSA) Identied Shell Crew .....................................................21 Kaspersky Lab Has Identied a Recent Attack Group at Identies Its Tools as Careto: e Mask ............................................................................................................ 23 Dark Web ........................................................................................................................ 24 4 Creating Secure Code .................................................................................................25 First Principle of Code Protection: Code Isolation and Connement ...............................25 Code Isolation Techniques ............................................................................................... 26 Implementation of the Four Code-Connement Methods .............................................. 28 v vi ◾ Contents Reference Monitors ..................................................................................................... 28 OS Chroots ................................................................................................................. 28 OS Jail Routines .......................................................................................................... 28 FreeBSD Jail ................................................................................................................ 29 Linux’s Ptrace Monitor and Systrace Routines............................................................. 29 Employing Applications Such as Ostia or NACI ......................................................... 30 Isolation of Virtual Machines .......................................................................................... 30 Computer Virtualization ..............................................................................................31 reats to Computer Virtualization ..................................................................................31 Subverting VM Isolation ............................................................................................. 32 VM-Based Malware .................................................................................................... 32 Software Fault Isolation .............................................................................................. 32 5 Providing a Secure Architecture .................................................................................35 Providing a Secure Architecture ........................................................................................35 Isolation and Least Privilege .........................................................................................35 Access Control Concepts ............................................................................................. 36 Operating Systems ...................................................................................................... 37 Browser Isolation and Least Privilege .......................................................................... 38 Hacking Attacks .............................................................................................................. 38 Spear Phishing and Behavioral Attacks ............................................................................ 39 Spoong, Digital Misrepresentation, and Mobile Security ..............................................
Recommended publications
  • Ransom Where?
    Ransom where? Holding data hostage with ransomware May 2019 Author With the evolution of digitization and increased interconnectivity, the cyberthreat landscape has transformed from merely a security and privacy concern to a danger much more insidious by nature — ransomware. Ransomware is a type of malware that is designed to encrypt, Imani Barnes Analyst 646.572.3930 destroy or shut down networks in exchange [email protected] for a paid ransom. Through the deployment of ransomware, cybercriminals are no longer just seeking to steal credit card information and other sensitive personally identifiable information (PII). Instead, they have upped their games to manipulate organizations into paying large sums of money in exchange for the safe release of their data and control of their systems. While there are some business sectors in which the presence of this cyberexposure is overt, cybercriminals are broadening their scopes of potential victims to include targets of opportunity1 across a multitude of industries. This paper will provide insight into how ransomware evolved as a cyberextortion instrument, identify notorious strains and explain how companies can protect themselves. 1 WIRED. “Meet LockerGoga, the Ransomware Crippling Industrial Firms” March 25, 2019; https://www.wired.com/story/lockergoga-ransomware-crippling-industrial-firms/. 2 Ransom where? | May 2019 A brief history of ransomware The first signs of ransomware appeared in 1989 in the healthcare industry. An attacker used infected floppy disks to encrypt computer files, claiming that the user was in “breach of a licensing agreement,”2 and demanded $189 for a decryption key. While the attempt to extort was unsuccessful, this attack became commonly known as PC Cyborg and set the archetype in motion for future attacks.
    [Show full text]
  • Crypto Ransomware Analysis and Detection Using
    CRYPTO RANSOMWARE ANALYSIS AND DETECTION USING PROCESS MONITOR by ASHWINI BALKRUSHNA KARDILE Presented to the Faculty of the Graduate School of The University of Texas at Arlington in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE IN COMPUTER SCIENCE THE UNIVERSITY OF TEXAS AT ARLINGTON December 2017 Copyright © by Ashwini Balkrushna Kardile 2017 All Rights Reserved ii Acknowledgements I would like to thank Dr. Ming for his timely guidance and motivation. His insights for this research were valuable. I would also like to thank my committee members Dr. David Levine and Dr. David Kung for taking out time from their schedule and attending my dissertation. I am grateful to John Podolanko; it would not have been possible without his help and support. Thank you, John, for helping me and foster my confidence. I would like to thank my colleagues for supporting me directly or indirectly. Last but not the least; I would like to thank my parents, my family and my friends for encouraging me and supporting me throughout my research. November 16, 2017 iii Abstract CRYPTO RANSOMWARE ANALYSIS AND DETECTION USING PROCESS MONITOR Ashwini Balkrushna Kardile, MS The University of Texas at Arlington, 2017 Supervising Professor: Jiang Ming Ransomware is a faster growing threat that encrypts user’s files and locks the computer and holds the key required to decrypt the files for ransom. Over the past few years, the impact of ransomware has increased exponentially. There have been several reported high profile ransomware attacks, such as CryptoLocker, CryptoWall, WannaCry, Petya and Bad Rabbit which have collectively cost individuals and companies well over a billion dollars according to FBI.
    [Show full text]
  • Analysis of the Teslacrypt Family and How to Protect Against Future
    Sophia Wang COMP 116 Final Project Analysis of the TeslaCrypt Family and How to Protect Against Future Ransomware/Cyber Attacks Abstract Ransomware accounts for a large majority of the malicious attacks in the cyber security world, with a company hit with a ransomware attack once every 40 seconds. There was a 300% increase in ransomware attacks from 2015 to 2016 — and it’s only going up from there. One family of Trojan-style ransomware technology that introduced itself in early 2015 is TeslaCrypt. TeslaCrypt affected Windows users from the US, Germany, Spain, Italy, France, and the United Kingdom, targeting mostly gamers. This form of ransomware would encrypt the victim’s files using a highly complicated encryption key and demand $250 to $1,000 for ransom. The creators of TeslaCrypt eventually released the master decryption key in May of 2016, so in the end the victims were able to recover their files and systems. This paper will explore the process by which the TeslaCrypt ransomware infected a system, the steps that were taken to ameliorate this issue, and what steps should be taken to avoid an incident like this in the future. Introduction Ransomware is a special form of malware that can infect a system through either encrypting and denying users access to their files, or restricting access and locking users out of their systems. Once the ransomware has the target’s files and/or system on lock, it demands a ransom be paid, usually through some form of cryptocurrency. In February of 2015, a new family of file-encrypting Trojan-style ransomware technology was introduced — TeslaCrypt.
    [Show full text]
  • Newmind-Ransomware-Ebook.Pdf
    Contents What Is Ransomware? ............................................................................................................................. 3 Who Is It Affecting? ................................................................................................................................. 4 Common Forms Of Ransomware .......................................................................................................... 5 Protect Yourself With These Tips: ........................................................................................................ 9 How To Handle An Infection: ................................................................................................................ 11 Your Next Step ........................................................................................................................................ 12 There’s a malware threat online, maybe lurking in your inbox or spam folder, called Ransomware. It’s been around for a while, but recent months have seen it gaining traction, under different names you may have heard, such as Cryptolocker, Cryptowall, and TeslaCrypt. What is Ransomware? One of the ways that Ransomware makes its way to end users is through a well-crafted email with an attachment. The attachment is malicious and when you click to download it, the ransomware encrypts (locks) certain types of files (.docx, .pdf, .jpg, etc) stored on local and mounted network drives, such as a server shared drive at the office. It then displays a message which offers to decrypt
    [Show full text]
  • Best Practices to Protect Against Ransomware, Phishing & Email Fraud
    WHITE PAPER Best Practices for Protecting Against Phishing, Ransomware and Email Fraud An Osterman Research White Paper Published April 2018 SPON Osterman Research, Inc. P.O. Box 1058 • Black Diamond • Washington • 98010-1058 • USA +1 206 683 5683 • [email protected] www.ostermanresearch.com • @mosterman Executive Summary • Various types of security threats are increasing in number and severity at a rapid pace, most notably cryptojacking malware that is focused on mining coins for the roughly 1,400 cryptocurrencies currently in use. • Organizations have been victimized by a wide range of threats and exploits, most notably phishing attacks that have penetrated corporate defenses, targeted email attacks launched from compromised accounts, and sensitive or confidential information accidentally leaked through email. • Threats are becoming more sophisticated as well-financed cybercriminal gangs develop improved variants of malware and social engineering attacks. The result is that the perceived effectiveness of current security solutions is not improving – or is actually getting worse – for many organizations. • Decision makers are most concerned about endpoints getting infected with malware through email or web browsing, user credentials being stolen through email-based phishing, and senior executives’ credentials being stolen through email-based spearphishing. • Four of the five leading concerns expressed by decision makers focus on email as the primary threat vector for cybercriminal activity, and nearly one-half of attacks are focused on account takeovers. Many organizations • Most decision makers have little confidence that their security infrastructure can adequately address infections on mobile devices, are not CEO Fraud/BEC, and preventing users personal devices from introducing malware into the corporate network.
    [Show full text]
  • Society's Genome.Indb
    Society’s Genome Genetic Diversity’s Role in Digital Preservation By Nathan Thompson with Bob Cone and John Kranz Copyright © 2016 by Spectra Logic Corporation All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including storage and retrieval systems—except in the case of brief quotations embodied in critical articles or reviews—without permission in writing from Spectra Logic Corporation. All product names, logos, and brands mentioned in this book are the property of their respective owners. Neither the authors nor publisher claim any right of ownership to such names, logos, and brands. Cover design by Kristen Coats Back cover image: Detail of “Ptolemy World Map,” from Ptolemy’s the Geography, redrawn by Francesco di Antonio del Chierco (15th century). Housed in the British Library, London. Image retrieved from https:// commons.wikimedia.org/wiki/File:PtolemyWorldMap.jpg. Published by Spectra Logic Corporation 6285 Lookout Road Boulder, Colorado 80301-3580 Tel.: 1.800.833.1132 Fax: 1.303.939.8844 www.spectralogic.com ISBN: 978-0-9975644-0-2 Second Printing Printed and bound in the United States of America 10 9 8 7 6 5 4 3 2 1 This book is printed on acid-free paper. “We are survival machines—robot vehicles blindly programmed to preserve the selfish molecules known as genes. This is a truth that still fills me with astonishment.” —Richard Dawkins, The Selfish Gene Chapter 6 Wolves at the Door Just a few years after the 9/11 attacks, the digital world began showing signs of sudden, profound change.
    [Show full text]
  • Factor Authentication
    THIS COMPUTER HAS BEEN…. WHAT DO I DO NOW? Paul Seldes, FPEM, CEM, FMI ntb group, LLC Director of Operations I DON’T HAVE TO BE HERE RANSOMWARE DEFINED Ransomware is a type of malicious software used by cybercriminals that is designed to extort money from their victims, either by • Encrypting data on the disk or OR • By blocking access to the system CAN IT HAPPEN TO ME? 56% increase in ransomware attacks 2018-2019 (DHS- CISA) $84,000 typical cost of recovery $6 TRILLION cybercrime global costs by 2021 HOW IT WORKS RANSOMWARE IS A GROWTH INDUSTRY Cost of ransomware to the US in 2019 was $7.5 billion Ransomware attacks are also known as BGH 2020: $10 billion ? 2021: $15 billion? 2022: $20 billion? CRYPTOLOCKER – FIRST GLOBAL RANSOMWARE CAMPAIGN 500,000 victims Between $3 and $27 million in payments June 2014 CRYPTOLOCKER – FIRST GLOBAL RANSOMWARE CAMPAIGN There is a $3 million reward for information leading to his arrest (FBI) June 2014 AND SO IT GOES Over 100 variants between 2014 and 2019. WANNACRY – MAY 2017 WORLDWIDE ATTACK In order to spread like a worm, utilized an exploit called ETERNALBLUE, one of the leaked NSA hacking tools released by the Shadow Brokers hacking group in April 2017 The patch for the vulnerability was available for 59 days prior to the attack Hit critical infrastructure in some countries such as Germany and Russia. In the U.K., the health care sector received a hard hit: hospitals had to turn away patients, reroute ambulances, paralyze emergency services, and reschedule surgeries and appointments WANNACRY – MAY 2017 WORLDWIDE ATTACK In order to spread like a worm, utilized an exploit called ETERNALBLUE, one of the leaked NSA hacking tools released by the Shadow Brokers hacking group in April 2017 The patch for the vulnerability was available for 59 days prior to the attack Hit critical infrastructure in some countries such as Germany and Russia.
    [Show full text]
  • October 28, 2013 CRYPTOLOCKER RANSOMWARE ENCRYPTS USER’S FILES
    October 28, 2013 CRYPTOLOCKER RANSOMWARE ENCRYPTS USER’S FILES The FBI is aware of a file-encrypting Ransomware known as CryptoLocker. Businesses are receiving emails with alleged customer complaints containing attachments that when opened, appear as a window that is in fact a malware downloader. This downloader installs the actual CryptoLocker malware. The verbiage in the window states that important files have been encrypted using a unique public key generated for the computer. To decrypt the files you must obtain the private key. A copy of the private key is located on a remote server that will destroy the key after the specified time shown in the window. The attackers demand payment of a ransom ranging from $100 to $300 to decrypt the files. *Unfortunately, once the encryption of the files is complete, decryption is not feasible. To obtain the file specific Advanced Encryption Standard (AES) key to decrypt a file, you need the private RSA key (an algorithm for public key cryptography) corresponding to the RSA public key generated for the victim’s system by the command and control server. However, this key never leaves the command and control server, putting it out of reach of everyone except the attacker. The recommended solution is to scrub your hard drive and restore encrypted files from a backup. As with any virus or malware, the way to avoid it is with safe browsing and email habits. Specifically, in this case, be wary of email from senders you don’t know, and never open or download an attachment unless you’re sure you know what it is and that it’s safe.
    [Show full text]
  • Crowdstrike Global Threat Intel Report
    TWO THOUSAND FOURTEEN CROWDSTRIKE GLOBAL THREAT INTEL REPORT www.crowdstrike.com TWO THOUSAND FOURTEEN CROWDSTRIKE GLOBAL THREAT INTEL REPORT INTRODUCTION .........................................................................4 Table of KEY FINDINGS ............................................................................7 STATE OF THE UNION .............................................................9 Contents: NOTABLE ACTIVITY ............................................................... 13 Criminal ................................................................................ 13 State ...................................................................................... 19 Hacktivist/Nationalist ............................................................. 25 2014 Zero-Day Activity ........................................................... 34 Event-Driven Operations ......................................................... 39 KNOW THE ADVERSARY ....................................................49 Effect of Public Reporting on Adversary Activity ........................ 49 HURRICANE PANDA .................................................................50 GOTHIC PANDA ..........................................................................55 Overview of Russian Threat Actors ........................................... 57 2015 PREDICTIONS.................................................................61 CONCLUSION ........................................................................... 73 2 Introduction Intelligence
    [Show full text]
  • History of Ransomware
    THREAT INTEL REPORT History of Ransomware What is ransomware? Ransomware is a type of malicious software, or malware, that denies a victim access to a computer system or data until a ransom is paid.1 The first case of ransomware occurred in 1989 and has since evolved into one of the most profitable cybercrimes. This evolution is charted in Figure 1 at the end of the report, for easy visual reference of the timeline discussed below. 1989: The AIDS Trojan The first ransomware virus was created by Harvard-trained evolutionary biologist Joseph L. Popp in 1989.2 Popp conducted the attack by distributing 20,000 floppy discs to AIDS researchers from 90 countries that attended the World Health Organizations (WHO) International AIDS Conference in Stockholm.3 Popp claimed that the discs contained a program that analyzed an individual’s risk of acquiring AIDS through a risk questionnaire.4 However, the disc contained a malware program that hid file directories, locked file names, and demanded victims send $189 to a P.O. box in Panama if the victims wanted their data back.5 Referred to as the “AIDS Trojan” and the “PS Cyborg,” the malware utilized simple symmetric cryptography and tools were soon available to decrypt the file names.6 The healthcare industry remains a popular target of ransomware attacks over thirty years after the AIDS Trojan. 2005: GPCoder and Archiveus The next evolution of ransomware emerged after computing was transformed by the internet in the early 2000s. One of the first examples of ransomware distributed online was the GPCoder 1 “Ransomware,” Cybersecurity and Infrastructure Security Agency, 2020, https://www.us- cert.gov/Ransomware.
    [Show full text]
  • Combating Ransomware
    Protecting against Ransomware How to provide another layer of defense Crypto-based ransomware keeps on reinventing itself in order to get through security defenses. New variants are tested against security vendors in order to avoid detection. While some become less active at times such as Cryptolocker or CTB-Locker, others gain ground like Teslacrypt or CryptoWall. Vigilance is needed to prevail as new variants are seen to reemerge with similar behaviors. This document aims at providing another layer of defense against a highly professionalized, for-profit malware industry that is constantly innovating and trying to either circumvent known security measures or exploit unsecure or outdated systems. By identifying similar patterns of behavior within different variants we have come up with some proactive rules for endpoint products: VirusScan Enterprise (VSE), Endpoint Security (ENS) and Host Intrusion Prevention (HIP). These rules aim at effectively preventing the installation and / or the payload of historical, current, and evolving new variants of all these threats. Please note the rules suggested in this document for a particular variant do not provide protection for prior/other variants unless otherwise stated and are meant to be implemented in a cumulative manner. The encryption technique used in the payload makes the recovery of the encrypted files impossible as once executed the private key required is only available to the author. The use of HIP rules as detailed in the hands-on videos and section below have been proven to be very effective at stopping all current and new variants of these threats. We recommend these to be reviewed, tested, and implemented.
    [Show full text]
  • Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of Wannacry for Network and Information Security
    ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 1 (Issue 1) (2017) Pages 35-40 Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security Aaron Zimba1,2 Luckson Simukonda2, Mumbi Chishimba2 Department of Computer Science and Technology Department of Computer Science and Information University of Science and Technology Beijing1 Technology Beijing, China Mulungushi University2 [email protected] Kabwe, Zambia {thezo1992, chishimba.mumbi}@gmail.com Abstract— Encryption has protected the Internet for some time attacks is that of extortion, making the victim’s data now and it has come to raise user trust on the otherwise inaccessible via encryption until a ransom demand is met. The unsecure Internet. However, recent years have seen the use of tragedy of ransomware is that it employs the most robust and robust encryption as stepping stone for cyber-criminal resilient forms of encryption making it computationally activities. Ransomware has not escaped the headlines even as it infeasible [4] to decrypt a victim’s data without consented has attacked almost every sector of the society using a myriad of efforts of distributed computing. WannaCry, one of the infection vectors. Mission critical data has been held to ransom devastating ransomware attacks which plagued over 150 and victims have had to part away with millions of dollars. The countries and traversed all continents [5] in May of 2017, advent of the anonymous Bitcoin network has made matters spared no industry niche owing to the indiscriminate nature of worse where it’s been virtually infeasible to trace the the attack. It attacked universities, transport sector, health perpetrators.
    [Show full text]