SlideShare a Scribd company logo
© 2015 Imperva, Inc. All rights reserved.
Man in the Cloud Attacks
Sagie Dulce, Amichai Shulman
August 5th, 2015
© 2015 Imperva, Inc. All rights reserved.
A Little Bit About Us
• Amichai Shulman
• CTO and Co-Founder of Imperva
• >20 Years Information Security
Experience
• >25 Years Information Technology
Experience
• Sagie Dulce
• Research Team Leader in Imperva
• >10 Years Information Security
Experience
2
© 2015 Imperva, Inc. All rights reserved.
Agenda
• Motivation
– What’s wrong with current botnets
– Why cloud file synchronization services
– Why use passwords when you can pass the token
• MITC Attacks
– Concept & details
– Demo
• Resilience of MITC attacks
– How hard is it to detect and mitigate
• Conclusions & Mitigation
3
© 2015 Imperva, Inc. All rights reserved.
Motivation (I)
What’s wrong with current botnets?
1
© 2015 Imperva, Inc. All rights reserved.
Infection Chain Vs. Kill Chain
• Some things you allegedly need for
a botnet
– 0-day exploit
– Injection code
– Malware persistence
– Communication channel and protocol
– C&C and Drop server infrastructure with
your own code
• Some things security solutions claim
to do
– Detect malicious code
– Detect malicious code behavior
– Identify malicious persistent code
– Detect malicious communication
channels
– Detect unusual communication
channels
– Detect communication with bad servers
– Take down malicious servers
5
© 2015 Imperva, Inc. All rights reserved.
The Holy Grail of Attackers
• Don’t use complex exploits
• Don’t need to install malicious
software
• Don’t need to build C&C
infrastructure
• Don’t use shady network protocols
for exfiltration
• Rely on existing software
• Use standard communication
channels
• Rely on existing infrastructure for
C&C and data collection
6
© 2015 Imperva, Inc. All rights reserved.
Motivation (II)
Why Use Cloud File Synchronization Services
2
© 2015 Imperva, Inc. All rights reserved.
Because It’s Cool
8
© 2015 Imperva, Inc. All rights reserved.
Because They are There
• Gartner calls this EFSS
– Enterprise File Sharing and
Synchronization
• 42% of more than 300 surveyed IT
professionals had a corporate
account for online file sharing and
collaboration services this year,
compared to 28% in 2012,
according to McClure
• OneDrive, Google Drive, Box &
DropBox > 65% of business usage
9
Business Usage Survey
451 Research
Mobile Downloads (Millions)
Xyo
© 2015 Imperva, Inc. All rights reserved.
The Workings of EFSS
• Corporate Data accessed
within perimeter
• Downloaded to Mobile
• Accessed by 3rd party apps
10
© 2015 Imperva, Inc. All rights reserved.
EFSS Has All the Right Pieces
• Global robust server deployment
• C&C and data delivery protocols
– Encrypted with TLS
– Whitelisted by perimeter security
• Local software agent for delivering data in and out of the machine
– Whitelisted by any endpoint security software
• Free entry level offerings 
– Business and personal use
• Global mindshare and recognition
11
© 2015 Imperva, Inc. All rights reserved.
Motivation (III)
Why use passwords when you can “Pass The
Token”?
3
© 2015 Imperva, Inc. All rights reserved.
(OAuth) Tokens
• Token is generated through interactive authentication (user name / password)
• Token can be associated with limited set of privileges
– Application access ≠ Account control
• Token is provided to 3rd party application
– Persistently stored as part of the application’s configuration
• Authentication = Present Token
• Revoking the token prevents further access by 3rd party application
13
© 2015 Imperva, Inc. All rights reserved.
Passwords Vs. Tokens
• Passwords are easy to remember –
easy to crack
• Passwords can and need to
frequently change
• Passwords are good for (human)
interactive authentication
• Tokens are difficult to guess
(arbitrarily long and random)
• Do not need to change frequently
• Tokens can be revoked
• Tokens should be used for
application authentication
14
© 2015 Imperva, Inc. All rights reserved.15
Getting Tokens
© 2015 Imperva, Inc. All rights reserved.
Passwords Vs. Tokens (Round 2)
• Password authentication may
require 2FA
• Password authentication is sensitive
to new device, new location
protection
• Password only available when user
types it
• Password is valid through a limited
timeframe
• Token authentication is seamless
• Token authentication is (in practice)
insensitive to new device / new
location protection
• Token is always available as part of
the persistent configuration
• Tokens are forever (sometimes
literally)
• Difficult to attribute
16
© 2015 Imperva, Inc. All rights reserved.
Man In The Cloud (MITC) Attacks
The Sky is Falling
4
17
© 2015 Imperva, Inc. All rights reserved.
Concept
• Abuse cloud file synchronization services
– Data compromise
– Data exfiltration
– C&C and remote access
• Highlights of the attack plan
– Synchronize victim’s machine with attacker controlled account
– Obtain victim’s token through the synchronization mechanism
– Retrieve sensitive data from the victim’s account using the victim’s token
– Potentially send code for remote execution through the synchronization mechanism
18
© 2015 Imperva, Inc. All rights reserved.
Synchronize Victim’s Machine with Attacker Account
• As a first step, attacker creates an account rather than compromise the
victim’s account
– The attacker obtains the authentication token for that account
• Code executes on victim’s machine to “switch” synchronization account
– Stop synchronization application
– Replace the existing token with the attacker token
– Restart synchronization application
19
© 2015 Imperva, Inc. All rights reserved.
Finding and Replacing Tokens
• More details available in our HII report
20
Synchronization
Application
Token Type OAuth Refresh Token OAuth Refresh Token OAuth Refresh Token Proprietary
Location
Windows Credential
Manager
Windows Credential
Manager
Encrypted in Registry Encrypted SQLite file
© 2015 Imperva, Inc. All rights reserved.
Obtain Victim’s Token
• Put the original token in a file
• Put the file in the synchronization folder
• Wait for the file to appear on the other side of earth
21
© 2015 Imperva, Inc. All rights reserved.
Some Details – Google Drive
• OAuth Refresh Token
• Retrieve token
– Decrypt registry using Windows CryptUnprotectData
HKCUSoftwareGoogleDriveOAuthToken_***unique**
• Replace token (while app inactive)
– Delete “old” registry entry & replace with harvested entry
HKCUSoftwareGoogleDriveOAuthToken_**new**
– Encrypt harvested token using Windows CryptProtectData
– Replace each row inside the data table in sync_config.db with the attacker’s data, except
for the “local_sync_root_path” entry (which holds the path to the vicitm’s synced folder
22
© 2015 Imperva, Inc. All rights reserved.
Some Details – The “Malicious” Code
23
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Quick Double Switch
25
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Quick Double Switch
26
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Quick Double Switch
27
© 2015 Imperva, Inc. All rights reserved.
MITC Attack Scenarios – Remote Code Execution
28
© 2015 Imperva, Inc. All rights reserved.
Remote Code Execution - Details
• WMI event subscription
• Waiting on file creation
in sync folder
• Created file is executed
• “mofcomp config.mof”
29
© 2015 Imperva, Inc. All rights reserved.
Demo
30
© 2015 Imperva, Inc. All rights reserved.
Additional Attack Scenarios
• Waiting for good things to come
– Inject scripts and macros into synchronized documents
– Hope that victim opens such a document
– Increase probability by piggybacking on active documents
• Cloud RansomWare
– Encrypt victim’s data and demand ransom
31
© 2015 Imperva, Inc. All rights reserved.
Native Detection and Mitigation
How bad is it?
5
32
© 2015 Imperva, Inc. All rights reserved.
Detecting a Compromise
33
Synchronization
Application
Proactive (alerts) None None None
None (if attacker spoofs
the device ID)
Reactive (forensics)
Review history of
connected locations and
devices
Review history of
connected locations and
devices
None
Constantly monitor last
connected location
© 2015 Imperva, Inc. All rights reserved.
Recovery From a Compromise
34
Synchronization
Application
Turn on 2FA
Not applicable to
tokens
Not applicable to
tokens
Not applicable to
tokens
Not applicable to
“host_id”
Revoke Stolen Token
Disconnecting
devices doesn’t
revoke token
Disconnect Devices Disconnect devices Disconnect Devices
Change Password
Revokes tokens.
Opened “sessions”
remain open
Specifically Request
to revoke all tokens
Revokes all tokens
Not applicable to
host_id
© 2015 Imperva, Inc. All rights reserved.
Takedown
• IT infrastructure of the Botnet cannot be taken down
– It’s a vital service most of us use
• Attacker’s account is NEVER compromised
– Even if token is exposed during initial infection it is extremely difficult to associate with an
account (with the exception of DropBox )
• It is therefore extremely difficult to take down the specific account used for the
initial compromise
– Moreover, it has no actual effect on existing infections or future ones
35
© 2015 Imperva, Inc. All rights reserved.
Conclusions & Mitigations
6
© 2015 Imperva, Inc. All rights reserved.
Summary
• Cloud file synchronization services can be easily turned into an infrastructure
for endpoint compromise, providing a channel for C&C, data exfiltration, and
remote access
• Compromise can be achieved through the use of tokens rather than
passwords
• Due to the use of tokens, compromise is almost undetectable and sometimes
irreversible (for an account)
• Attacks based on the above architecture have been witnessed in the wild (for
example, in “The Inception Framework ” – analysis by Blue Coat)
37
© 2015 Imperva, Inc. All rights reserved.
Mitigation
• Endpoint and perimeter security measures are incapable of detecting and
mitigating this threat as no malicious code persists on the endpoint, and no
abnormal outbound traffic channels are observed on the wire
• Vendors could do better
– Improve proactive detection (location alerts for tokens)
– 2FA for new devices (even with token access only)
– Allow revocation of any existing application token
• Vendor will always struggle though with the right balance of security and
mobility
38
© 2015 Imperva, Inc. All rights reserved.
Mitigation – Improve Control of EFSS
• Cloud Access Security Broker (CASB) Solutions
– Anomaly detection and device control at the enterprise level rather than the individual
service level
– Apply enterprise wide policies to new devices
– Block & alert on rapid changes in location
– Alert on abnormal usage (file loaded from one device and deleted quickly on another for
example)
39
© 2015 Imperva, Inc. All rights reserved.
Mitigation – It’s All About the Data, Stupid!
• Attackers are after enterprise data and not after individual endpoints
• A successful attack (e.g. 145M user accounts, 70M credit card numbers, 300K
medical records, 4M employee evaluation forms) must express itself in
abusive data access
• Deploy monitoring, detection and control solutions around data repositories
– SQL databases, NoSQL repositories, File servers, SharePoint deployments
– See everything, detect abnormal and abusive access patterns, react by denying further
access to potentially compromised machines and accounts
40
• Download HII report
– https://www.imperva.com/DefenseCenter/HackerIntelligenceReports

More Related Content

What's hot

IBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security SolutionIBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security Solution
hearme limited company
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
Yuval Sinay, CISSP, C|CISO
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
BGA Cyber Security
 
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
North Texas Chapter of the ISSA
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
Neha Raju k
 
Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)
Antonio Fontes
 
Threat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill ChainThreat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill Chain
Suwitcha Musijaral CISSP,CISA,GWAPT,SNORTCP
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Jowin John Chemban
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
Brian Honan
 
1. penetration testing
1.  penetration testing1.  penetration testing
1. penetration testingJose Peña
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
hearme limited company
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
Amy Daly
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
Sergey Gordeychik
 
Mikrotik RouterOS Security Audit Checklist by Akbar Azwir
Mikrotik RouterOS Security Audit Checklist by Akbar AzwirMikrotik RouterOS Security Audit Checklist by Akbar Azwir
Mikrotik RouterOS Security Audit Checklist by Akbar Azwir
Akbar Azwir, MM, PMP, PMI-SP, PSM I, CISSP
 
Supply Chain Attacks
Supply Chain AttacksSupply Chain Attacks
Supply Chain Attacks
Lionel Faleiro
 
CSIRT-Kit: Your Security Response toolkit
CSIRT-Kit: Your Security Response toolkitCSIRT-Kit: Your Security Response toolkit
CSIRT-Kit: Your Security Response toolkit
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
Forcepoint LLC
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
Network Intelligence India
 

What's hot (20)

IBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security SolutionIBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security Solution
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)
 
Threat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill ChainThreat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill Chain
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
1. penetration testing
1.  penetration testing1.  penetration testing
1. penetration testing
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
 
Mikrotik RouterOS Security Audit Checklist by Akbar Azwir
Mikrotik RouterOS Security Audit Checklist by Akbar AzwirMikrotik RouterOS Security Audit Checklist by Akbar Azwir
Mikrotik RouterOS Security Audit Checklist by Akbar Azwir
 
Supply Chain Attacks
Supply Chain AttacksSupply Chain Attacks
Supply Chain Attacks
 
CSIRT-Kit: Your Security Response toolkit
CSIRT-Kit: Your Security Response toolkitCSIRT-Kit: Your Security Response toolkit
CSIRT-Kit: Your Security Response toolkit
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 

Viewers also liked

The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsThe State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
Imperva
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
Irissolution
 
Saving The Internet of Things: Presentation to Facebook
Saving The Internet of Things: Presentation to FacebookSaving The Internet of Things: Presentation to Facebook
Saving The Internet of Things: Presentation to Facebook
Paul Brody
 
Intimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of ThingsIntimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of Things
Paul Brody
 
2015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
2015년 2분기 주요 정보보안 소식 차민석 공개판_201508102015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
2015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
Minseok(Jacky) Cha
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
Imperva
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted Attacks
Imperva
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
Imperva
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
Imperva
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
Imperva
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Imperva
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat Intelligence
Imperva
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4
Imperva
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
Imperva
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.
Imperva
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
Imperva
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks
Imperva
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
Imperva
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
Imperva
 

Viewers also liked (20)

The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsThe State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
 
Saving The Internet of Things: Presentation to Facebook
Saving The Internet of Things: Presentation to FacebookSaving The Internet of Things: Presentation to Facebook
Saving The Internet of Things: Presentation to Facebook
 
Intimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of ThingsIntimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of Things
 
2015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
2015년 2분기 주요 정보보안 소식 차민석 공개판_201508102015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
2015년 2분기 주요 정보보안 소식 차민석 공개판_20150810
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted Attacks
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat Intelligence
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 

Similar to Man in the Cloud Attacks

Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
WithTheBest
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADE
Rocket Software
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
lior mazor
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Luca Bongiorni
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
Muhib Ahmad Sherwani
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
RISC-V International
 
Going Beyond the Device Heart Beat
Going Beyond the Device Heart BeatGoing Beyond the Device Heart Beat
Going Beyond the Device Heart Beat
Balwinder Kaur
 
C days2015
C days2015C days2015
C days2015
Nuno Loureiro
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Teemu Tiainen
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Precisely
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
Lancope, Inc.
 
Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT Security
Oliver Pfaff
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
Amy McMullin
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
Precisely
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
lior mazor
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
Eric Vétillard
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
Steven Russo
 

Similar to Man in the Cloud Attacks (20)

Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADE
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
Going Beyond the Device Heart Beat
Going Beyond the Device Heart BeatGoing Beyond the Device Heart Beat
Going Beyond the Device Heart Beat
 
C days2015
C days2015C days2015
C days2015
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT Security
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 

More from Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
Imperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
Imperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
Imperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
Imperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
Imperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
Imperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
Imperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
Imperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
Imperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
Imperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
Imperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
Imperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
Imperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
Imperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
Imperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
Imperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
Imperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Imperva
 

More from Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Man in the Cloud Attacks

  • 1. © 2015 Imperva, Inc. All rights reserved. Man in the Cloud Attacks Sagie Dulce, Amichai Shulman August 5th, 2015
  • 2. © 2015 Imperva, Inc. All rights reserved. A Little Bit About Us • Amichai Shulman • CTO and Co-Founder of Imperva • >20 Years Information Security Experience • >25 Years Information Technology Experience • Sagie Dulce • Research Team Leader in Imperva • >10 Years Information Security Experience 2
  • 3. © 2015 Imperva, Inc. All rights reserved. Agenda • Motivation – What’s wrong with current botnets – Why cloud file synchronization services – Why use passwords when you can pass the token • MITC Attacks – Concept & details – Demo • Resilience of MITC attacks – How hard is it to detect and mitigate • Conclusions & Mitigation 3
  • 4. © 2015 Imperva, Inc. All rights reserved. Motivation (I) What’s wrong with current botnets? 1
  • 5. © 2015 Imperva, Inc. All rights reserved. Infection Chain Vs. Kill Chain • Some things you allegedly need for a botnet – 0-day exploit – Injection code – Malware persistence – Communication channel and protocol – C&C and Drop server infrastructure with your own code • Some things security solutions claim to do – Detect malicious code – Detect malicious code behavior – Identify malicious persistent code – Detect malicious communication channels – Detect unusual communication channels – Detect communication with bad servers – Take down malicious servers 5
  • 6. © 2015 Imperva, Inc. All rights reserved. The Holy Grail of Attackers • Don’t use complex exploits • Don’t need to install malicious software • Don’t need to build C&C infrastructure • Don’t use shady network protocols for exfiltration • Rely on existing software • Use standard communication channels • Rely on existing infrastructure for C&C and data collection 6
  • 7. © 2015 Imperva, Inc. All rights reserved. Motivation (II) Why Use Cloud File Synchronization Services 2
  • 8. © 2015 Imperva, Inc. All rights reserved. Because It’s Cool 8
  • 9. © 2015 Imperva, Inc. All rights reserved. Because They are There • Gartner calls this EFSS – Enterprise File Sharing and Synchronization • 42% of more than 300 surveyed IT professionals had a corporate account for online file sharing and collaboration services this year, compared to 28% in 2012, according to McClure • OneDrive, Google Drive, Box & DropBox > 65% of business usage 9 Business Usage Survey 451 Research Mobile Downloads (Millions) Xyo
  • 10. © 2015 Imperva, Inc. All rights reserved. The Workings of EFSS • Corporate Data accessed within perimeter • Downloaded to Mobile • Accessed by 3rd party apps 10
  • 11. © 2015 Imperva, Inc. All rights reserved. EFSS Has All the Right Pieces • Global robust server deployment • C&C and data delivery protocols – Encrypted with TLS – Whitelisted by perimeter security • Local software agent for delivering data in and out of the machine – Whitelisted by any endpoint security software • Free entry level offerings  – Business and personal use • Global mindshare and recognition 11
  • 12. © 2015 Imperva, Inc. All rights reserved. Motivation (III) Why use passwords when you can “Pass The Token”? 3
  • 13. © 2015 Imperva, Inc. All rights reserved. (OAuth) Tokens • Token is generated through interactive authentication (user name / password) • Token can be associated with limited set of privileges – Application access ≠ Account control • Token is provided to 3rd party application – Persistently stored as part of the application’s configuration • Authentication = Present Token • Revoking the token prevents further access by 3rd party application 13
  • 14. © 2015 Imperva, Inc. All rights reserved. Passwords Vs. Tokens • Passwords are easy to remember – easy to crack • Passwords can and need to frequently change • Passwords are good for (human) interactive authentication • Tokens are difficult to guess (arbitrarily long and random) • Do not need to change frequently • Tokens can be revoked • Tokens should be used for application authentication 14
  • 15. © 2015 Imperva, Inc. All rights reserved.15 Getting Tokens
  • 16. © 2015 Imperva, Inc. All rights reserved. Passwords Vs. Tokens (Round 2) • Password authentication may require 2FA • Password authentication is sensitive to new device, new location protection • Password only available when user types it • Password is valid through a limited timeframe • Token authentication is seamless • Token authentication is (in practice) insensitive to new device / new location protection • Token is always available as part of the persistent configuration • Tokens are forever (sometimes literally) • Difficult to attribute 16
  • 17. © 2015 Imperva, Inc. All rights reserved. Man In The Cloud (MITC) Attacks The Sky is Falling 4 17
  • 18. © 2015 Imperva, Inc. All rights reserved. Concept • Abuse cloud file synchronization services – Data compromise – Data exfiltration – C&C and remote access • Highlights of the attack plan – Synchronize victim’s machine with attacker controlled account – Obtain victim’s token through the synchronization mechanism – Retrieve sensitive data from the victim’s account using the victim’s token – Potentially send code for remote execution through the synchronization mechanism 18
  • 19. © 2015 Imperva, Inc. All rights reserved. Synchronize Victim’s Machine with Attacker Account • As a first step, attacker creates an account rather than compromise the victim’s account – The attacker obtains the authentication token for that account • Code executes on victim’s machine to “switch” synchronization account – Stop synchronization application – Replace the existing token with the attacker token – Restart synchronization application 19
  • 20. © 2015 Imperva, Inc. All rights reserved. Finding and Replacing Tokens • More details available in our HII report 20 Synchronization Application Token Type OAuth Refresh Token OAuth Refresh Token OAuth Refresh Token Proprietary Location Windows Credential Manager Windows Credential Manager Encrypted in Registry Encrypted SQLite file
  • 21. © 2015 Imperva, Inc. All rights reserved. Obtain Victim’s Token • Put the original token in a file • Put the file in the synchronization folder • Wait for the file to appear on the other side of earth 21
  • 22. © 2015 Imperva, Inc. All rights reserved. Some Details – Google Drive • OAuth Refresh Token • Retrieve token – Decrypt registry using Windows CryptUnprotectData HKCUSoftwareGoogleDriveOAuthToken_***unique** • Replace token (while app inactive) – Delete “old” registry entry & replace with harvested entry HKCUSoftwareGoogleDriveOAuthToken_**new** – Encrypt harvested token using Windows CryptProtectData – Replace each row inside the data table in sync_config.db with the attacker’s data, except for the “local_sync_root_path” entry (which holds the path to the vicitm’s synced folder 22
  • 23. © 2015 Imperva, Inc. All rights reserved. Some Details – The “Malicious” Code 23
  • 24. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Quick Double Switch 25
  • 25. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Quick Double Switch 26
  • 26. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Quick Double Switch 27
  • 27. © 2015 Imperva, Inc. All rights reserved. MITC Attack Scenarios – Remote Code Execution 28
  • 28. © 2015 Imperva, Inc. All rights reserved. Remote Code Execution - Details • WMI event subscription • Waiting on file creation in sync folder • Created file is executed • “mofcomp config.mof” 29
  • 29. © 2015 Imperva, Inc. All rights reserved. Demo 30
  • 30. © 2015 Imperva, Inc. All rights reserved. Additional Attack Scenarios • Waiting for good things to come – Inject scripts and macros into synchronized documents – Hope that victim opens such a document – Increase probability by piggybacking on active documents • Cloud RansomWare – Encrypt victim’s data and demand ransom 31
  • 31. © 2015 Imperva, Inc. All rights reserved. Native Detection and Mitigation How bad is it? 5 32
  • 32. © 2015 Imperva, Inc. All rights reserved. Detecting a Compromise 33 Synchronization Application Proactive (alerts) None None None None (if attacker spoofs the device ID) Reactive (forensics) Review history of connected locations and devices Review history of connected locations and devices None Constantly monitor last connected location
  • 33. © 2015 Imperva, Inc. All rights reserved. Recovery From a Compromise 34 Synchronization Application Turn on 2FA Not applicable to tokens Not applicable to tokens Not applicable to tokens Not applicable to “host_id” Revoke Stolen Token Disconnecting devices doesn’t revoke token Disconnect Devices Disconnect devices Disconnect Devices Change Password Revokes tokens. Opened “sessions” remain open Specifically Request to revoke all tokens Revokes all tokens Not applicable to host_id
  • 34. © 2015 Imperva, Inc. All rights reserved. Takedown • IT infrastructure of the Botnet cannot be taken down – It’s a vital service most of us use • Attacker’s account is NEVER compromised – Even if token is exposed during initial infection it is extremely difficult to associate with an account (with the exception of DropBox ) • It is therefore extremely difficult to take down the specific account used for the initial compromise – Moreover, it has no actual effect on existing infections or future ones 35
  • 35. © 2015 Imperva, Inc. All rights reserved. Conclusions & Mitigations 6
  • 36. © 2015 Imperva, Inc. All rights reserved. Summary • Cloud file synchronization services can be easily turned into an infrastructure for endpoint compromise, providing a channel for C&C, data exfiltration, and remote access • Compromise can be achieved through the use of tokens rather than passwords • Due to the use of tokens, compromise is almost undetectable and sometimes irreversible (for an account) • Attacks based on the above architecture have been witnessed in the wild (for example, in “The Inception Framework ” – analysis by Blue Coat) 37
  • 37. © 2015 Imperva, Inc. All rights reserved. Mitigation • Endpoint and perimeter security measures are incapable of detecting and mitigating this threat as no malicious code persists on the endpoint, and no abnormal outbound traffic channels are observed on the wire • Vendors could do better – Improve proactive detection (location alerts for tokens) – 2FA for new devices (even with token access only) – Allow revocation of any existing application token • Vendor will always struggle though with the right balance of security and mobility 38
  • 38. © 2015 Imperva, Inc. All rights reserved. Mitigation – Improve Control of EFSS • Cloud Access Security Broker (CASB) Solutions – Anomaly detection and device control at the enterprise level rather than the individual service level – Apply enterprise wide policies to new devices – Block & alert on rapid changes in location – Alert on abnormal usage (file loaded from one device and deleted quickly on another for example) 39
  • 39. © 2015 Imperva, Inc. All rights reserved. Mitigation – It’s All About the Data, Stupid! • Attackers are after enterprise data and not after individual endpoints • A successful attack (e.g. 145M user accounts, 70M credit card numbers, 300K medical records, 4M employee evaluation forms) must express itself in abusive data access • Deploy monitoring, detection and control solutions around data repositories – SQL databases, NoSQL repositories, File servers, SharePoint deployments – See everything, detect abnormal and abusive access patterns, react by denying further access to potentially compromised machines and accounts 40
  • 40. • Download HII report – https://www.imperva.com/DefenseCenter/HackerIntelligenceReports

Editor's Notes

  1. Let’s build this slide on the content of this URL: http://searchcloudstorage.techtarget.com/news/2240237177/Enterprise-file-sync-and-share-expands-in-2014 Found more stats here techcrunch.com/2014/11/27/the-most-popular-enterprise-storage-product-might-surprise-you/Pai
  2. We have slides describing 3 parts of the attack plan. The 3rd one – retrieving data is trivial as it is provided by the platform.
  3. Attacker can anonymously create a free account with any of the major EFSS vendors.
  4. Encryption uses current user context and therefore decryption does not require a key, but rather code running in the user’s context.
  5. It’s not clear how to disinfect an account in OneDrive