presentation

CyberSecurity
– res publica –
it concerns us all
www.cybersecurityaustria.at
© IKARUS Security Software GmbH
29.04.2015
Joe Pichlmayr, CEO Ikarus, Vorstand CybersecurityAustria, [email protected]
1
© IKARUS Security Software GmbH
29.04.2015
2
DIY - do it yourself ...
Good old time…
 Number of malware and attacks are low and rare
• Very low, lesser than 3-4 per month
 Typical attacks (once upon a time)
• Easy to recognize, mostly no payload
• Seldom properly working "in the wild”
 No financial interesst
• Most of the codes have been proof of concepts
• Cooler Code Competition
 Low dependence of our IT Systems
• Lesser critical than today
• Not all work has been done on it-based systems
© IKARUS Security Software GmbH
29.04.2015
4
massive rise in 2014 and Q1/ 2015
© IKARUS Security Software GmbH
29.04.2015
5
Quelle: Ikarus Vbase 2015-04-07
massive rise in 2014 and Q1/ 2015
~ 47,7 Millions in 2014
(47.740.671)
365 day´s in 2014
=
130.796
Unique MalwareSamples
per Day
1 day = 1.440 Min / 86.400 Sec
90 per minute
© IKARUS Security Software GmbH
29.04.2015
6
Massiv Increase of PUP´s (= Potentialy Unwanted Programms)
from 2% up to 55% of all new malware programms in 2015
PUP´s primarily used for Datamining/Dataleakage – targeted attack preparation and ransomware
© IKARUS Security Software GmbH
29.04.2015
7
privacy is gone
© IKARUS Security Software GmbH
29.04.2015
Dissconnect.com
8
MobileMalware on the rise - Android
New Mal .Apps
per Month
© IKARUS Security Software GmbH
29.04.2015
9
Trojan.AndroidOS.FakeToken
Der Trojaner sendet den Zugangscode ab diesem Zeitpunkt an eine
Telefonnummer bzw einen Server im Web – welche beliebig sein können
und in einem xml –file im TrojanerCoder mitgeführt werden
Link auf den Generator (Trojaner) wird über
SMS oder Phishing-Mails vorgeblich von der
Bank verschickt
http://icoolshop.ru/
cp/server.php
Transaction wird durch
gestohlene SMS bestätigt
IMEI /
IMSI
Download des
vermeintlichen
TokenGenerator
Angreifer kann
Konto einloggen und TAN
anfordern
Malware schickt
Bestätigungs- SMS
User Accesses
Site
Malware überweisst Geld
(PC ist proxy)
Malware phisht „Aktivierungs
Code“ den der User am
Endgerät eintippt
Online-Banking
Website
Transaction Bestätigungs
SMS
Wird die App installiert scheint sie wie
eine reguläre Bank-App auf
Mit Token wir auch Trojaner
installiert/aktiv
© IKARUS Security Software GmbH
29.04.2015
10
APT – advanced persistent threat
Ronald Biggs 2.0
CARBANAK
More than 100 Banks in 30 country´s,
More than 3000 infected machines
Average attacktime 2-4 Month, some since 2013
© IKARUS Security Software GmbH
•
Transfers via OnlineBanking and international E-Payment-Systems
•
Controll about accounting system – additionalcredits on accounts / delta wath
withdrawn
•
Cash-out via cash dinspenser at predefinde time
29.04.2015
11
Clear state-driven attack-vision
Global cryptologic Dominance
trough Responsive Presence and Network Advantage
© IKARUS Security Software GmbH
29.04.2015
http://nsa.gov1.info/surveillance/
http://www.nsa.gov/about/_files/nsacss_strategy.pdf
12
First Conclusio
We now know:
Malware- Figures are exploding
Number of Attacks grows porportinal
Note !
Also complexity of these attacks ist growing
proportional to every succesfull rejected attack
actio - reactio
© IKARUS Security Software GmbH
29.04.2015
13
Attacks against Security Industrie it self
 summary: Security-Companys have been infiltrated  Methode: Spearphishing via email from “colleaques
succesfully from unknown attackers Strategic
” with prepared Excel Sheets or PDF´s. Escalation of
Keyplayer like RSA, KPN, Diginotar, TurkTrust; bit9,
privileg rights to get Sysadmin Privileges – “opens”
Gemalto have lost – algorithms, cryptokeys,
Network to attacker from outside
zertificats and costumer data – the basis for further
successfull attacks against Industry
 Consequence: hundred thousands revoked Tokens Profil: Extrem complex attack to steal certificates or
million revoked certifikates - even those one used
modify “detection algorithms” as well as stealing
by company´s like Google, Microsoft, the CIA and
cryptokeys to break protected systems – even in
many others
high-secure evironments ( Lockheed Martin,
Northrop Grumman..)
 Imagine that you can print your own passports – how much you want, no mather wich
nationality, name, gender, function…
© IKARUS Security Software GmbH
29.04.2015
Erosion of the Foundations
of Security 14
14
Massive Exploits
in million systems used worldwide
Bash-Sicherheitslücke Shellshock
Heartbleed-bug
Der Heartbleed-Bug ist ein schwerwiegender Programmfehler
der Open-Source-Bibliothek OpenSSL, durch den über
verschlüsselte TLS-Verbindungen private Daten von Clients und
Servern ausgelesen werden
können.
© IKARUS Security Software GmbH
In der vom NIST verwendeten Bewertung des
Schadenpotentials erhält Shellshock eine Bewertung von 10
von 10 - dem Maximum!
29.04.2015
15
Firewall ?
© IKARUS Security Software GmbH
29.04.2015
16
Even such organisations could not defend themself
© IKARUS Security Software GmbH
29.04.2015
17
Does not sound optimal
New and succesfull attacks show us how strong the need - to change our cybersecurity strategies - is:
 More and more “High-Level” Systems, Organisations and Companys with very strong need for security
are attacked succesfully
 State of the Art Security-Solutions and Riskmanagement could NOT prevent succesfull attacks
 Increasing professionalization of attackers capabilitys leads to the loss of petabytes of data and
information
 The majority of succcesfull attacked company´s will never recognice – or very late - that their organisation
has been hitten by an attack
© IKARUS Security Software GmbH
29.04.2015
18
2. Conclusio
Attention!
We deliver our – undoubtedly only limeted succesfull strategies – to real critical environments
And now it´s becoming really exciting
© IKARUS Security Software GmbH
29.04.2015
19
© IKARUS Security Software GmbH
29.04.2015
20
3. Conclusio
Note!
Attacker are still arrived in this “internet of things”
© IKARUS Security Software GmbH
Some29.04.2015
examples
21
© IKARUS Security Software GmbH
29.04.2015
22
SmartGrid
„digitalisation“ of our engergy production and networks
© IKARUS Security Software GmbH
29.04.2015
23
Worm Simulator SmartMeter Networks
 Mike Davis has developed a Smart Meter Worm Simulator
• within 24 hours he potentially infects 15,000 from 22,000 households
•
•
•
•
The Control about the Meters was completly in the Hand of Davis.
Remote Break of Meters – total control about engery delivery
Remote access to the Concentrator (serversystem for meter)
Could prevent access from energy operator
© IKARUS Security Software GmbH
29.04.2015
24
Surprising reaction
First reaction of the manufacturer:
“completely impossible, something like a worm could not harm our meters and not
spread within our network!” (sic!)
After Davis has demonstrated his proof of concept in their lab
The next question was:
“how did you get access to our meters?”
Davis answered “ I bought them on eBay”
© IKARUS Security Software GmbH
29.04.2015
http://www.golem.de/news/intelligente-stromzaehler-gehackte-smart-meter-machen-lichter-aus-1410-109923.html
25
Future Trend: driverless car
Most of the established car manufacturer like Nissan, Volvo, Daimler have announced driverless-cars for 2020 !
That is in 5 years !!
-
Googles „driverless car“ a Lexus RX450h does not need a driver
But carrys a lot of technic inside !
© IKARUS Security Software GmbH
29.04.2015
26
Dircet Access to Car´s CAN-Bus
Chip-Tuning of a different kind
Charlie Miller and Chris Valasek did the job !, They find out what kind of attacks might be possible:
fully controll about
Breaking functionality
Turn signal
Car-Display
Steering Wheel
They have connected their laptop with the Car´s CAN-Bus System – but they have described also proof´s for remote access
http://blog.ioactive.com/2013/08/car-hacking-content.htmlm Netz.
© IKARUS Security Software GmbH
29.04.2015
27
CyberSecurity
– res publica –
it concerns us all
www.cybersecurityaustria.at
Many thanks
© IKARUS Security Software GmbH
29.04.2015
Joe Pichlmayr, CEO Ikarus, Vorstand CybersecurityAustria, [email protected]
28