You really don’t need to be a sports 'junky' to be aware
of the term “defense wins championships”.
Being a Philadelphia Eagles fan I’m still waiting on that ever elusive Super
Bowl championship …fingers crossed. On the IT security side, CISOs
and all high level IT management personnel are faced with the million dollar
question …how much money can I throw at IT Security to ensure I’m safe?
In this day and age, we have smartphones that have more
computing power than all of NASA back in 1969 when it landed astronauts on the
moon. Thanks to competition, technology has advanced at a rapid pace and just
as we, the good guys, have access to these massive processing capabilities, the
bad guys are also on the same canoe as us if not in a speed boat. Most problems
can be easily resolved by throwing money at it. We have bandwidth and storage issues! Well, let’s buy bigger servers,
faster routers, and build a secondary data center. When it comes to IT
security however, does having the meanest and ‘bad-est’ Firewall or IPS for
example equal guaranteed security?
Like my dreams of the Eagles winning a championship
this coming season; one can only hope.
Just recently news of a breach at the Office of
Personnel Management (OPM) was revealed to the public. While Target was still
trying to pick itself up from the huge ‘blow’ it got from hackers, JPMorgan
Chase was also hit. 2015 rolls in and then Anthem announces they too were hit. JP
Morgan Chase spent over $250 million on cyber security last year, but still
suffered from a significant data breach. According to Darkreading.com’s survey
results on security spending in organizations, most respondents agreed that
they did have adequate tools and personnel to minimize (72%), quickly detect
(69%), prevent (65%), and determine the root cause of (55%) data breaches.
Being attacked in the cyber age is not a matter of if but when.
Attacks are
going to happen regardless, so the question becomes, are we prepared enough to
at the very least find out that we were breached? How many breaches have fallen
between the cracks without organizations ever finding out?
Why
are we not keeping up?
It is human nature to try to make life easy that’s why
we created fire and tools. As we evolve in technology, there’s more and more
automation and less and less human interaction. This is a double edged sword,
however. Yes, we eliminate the weakest link, humans, but then the computer is
only as smart as the coded program. If there are unwanted code lines added to
this program will we notice? Unless there are safeguards included in the
program during the coding phase, probably not and the computer will simply
follow its master’s instructions. It’s like installing cameras and then leaving
the door unlocked. In IT terms, adding a firewall or IDS but leaving all
unnecessary ports open to the outside world.
There’s a joke about a guy who had
his WiFi SSID (Network Name) named ‘Hack_Me’. The next day the WiFi name was
‘Challenge_Accepted’.
Threats are always lurking and we need to be vigilant
of our surroundings and not leave everything to technology. The good ol’ human
instinct still has a place in this technology savvy world.
Why
are we always a step or two behind the attackers?
For one, bad guys have the time, patience and are even
State sponsored. Malware is always being released. You can purchase an Exploit
kit from the dark webs. There are too many open source tools and instructions
on the Internet for script kiddies and hacktivists to use. Not to sound like
the prophet of doom but if we don’t adapt we will surely die!
A typical Advanced
Persistent Threat (APT) involves roughly seven stages:
- Recon
- Lure
- Redirect
- Exploit
- Drop Payload
- Call Home
- Data Ex-filtration
Our focus will be on the Reconnaissance stage as this is usually overlooked although it’s a
crucial stage for the attacker.
Reconnaissance is sometimes one of the easiest
elements in this process because the victim provides all of the information you
need without even knowing it. Imagine a scenario where you are watching your
child at baseball practice. You take out your Android cell phone to snap a
quick picture and upload it to Facebook. Unless you’ve locked down your privacy
settings, this simple post provides a wealth of information about you, your
technology and your location.
While it may seem harmless, this provides more than
enough information to an attacker to craft a spear phishing email directed at
you. The photo metadata discloses information about the make and model of your
phone, enough information to craft an exploit against your specific platform.
The geographic coordinates of the picture or the location tag on your post
indicate where the practice takes place, allowing someone to identify what
league or tournament your child participates in and on what day. This covers
the approach: a change to the baseball practice schedule with a malicious
calendar attachment, spoofed from the official email address of the practice
facility.
Scary stuff …right!?
So how do I prevent this?
Change is the only constant
Implementing information security user education programs to ensure employees are aware of targeted threat methods such as social engineering through spear phishing and watering hole attacks. As users and endpoints become the biggest vulnerability to large organizations, this is one of the most critical steps in preventing attacks.
In addition, expanding security defenses to include technologies that can expedite detection of attacks and therefore close the attack surface.
Leveraging an MSSP or in-house SIEM to monitor the network 24x7x365. These solutions allow for granular customization and correlation of each proposed technology to allow for accurate and rapid response to threats.
While each of these is a step in the right direction, none are as effective without ample testing. It is recommended to conduct security reviews and tests at least once per quarter. This will ensure not only the effectiveness of the defenses, but also the incident response preparedness.
Conclusion
While
defense is always a good thing, offense comes into play when it comes to the
recon stage. By offense, I don’t mean attacking the bad guy but knowing what Tactics,
Techniques, and Procedures (TTP) might affect us and the only way of knowing
this is by actually ‘attacking’ ourselves. Using an Approved Scanning Vendor
(ASV) or leveraging Consulting Services will help you know
what the outside world can gather from probing your network and simulating
attacks.
References:
http://www.solutionary.com/resource-center/white-papers/the-advanced-persistent-threat/
http://www.darkreading.com/attacks-breaches/security-budgets-going-up-thanks-to-mega-breaches/d/d-id/1318714?
No comments:
Post a Comment