SlideShare a Scribd company logo
The Rise of Threat Analysis and the Fall of Compliance in Mitigating Web Application Security Risks Marco Morana OWASP Cincinnati Chapter Lead [email_address] Tony Ucedavelez OWASP Atlanta Chapter Lead [email_address]   LA and OC Chapters Sept 2009 Meetings
Meeting Agenda “ Status quo” of security compliance in mitigating cybercrime risks Compliance data vs. data breach data Business impact of data breaches Critical view of how compliance drives security Threat modeling techniques for the analysis of cybercrime threats Attack tree analysis  Use and misuse cases Attack vectors analysis Data flow/architecture analysis Risk mitigation strategies against cybercrime attacks
Status Quo of Security Policy and Regulatory Compliance in Mitigating Risks
Biggest  Fraud in History 170 million card and ATM numbers used sql injection and packet sniffers Companies mentioned in the indictments (3) include: TJX Companies Heartland Payment Systems (HPY) Hannaford Bros
Let’s look at PCI-DSS COMPLIANCE and data breach reported (datalossdb.org): Heartland Payment Systems (HPY)  WAS PCI COMPLIANT  at the time of the breach (August 2007) and is currently PCI COMPLIANT Passed Inspection in April 2008 (Trustwave QSA ) After an audit, Heartland uncovered  Malware  (the data-sniffing kind) to capture CC or ATM numbers 94 ML CCN ( Reported January 7 2007) 4.2 ML CCN and ATM data(reported March 17 2008) TJX was fined for  NOT BEING PCI COMPLIANT  during the data breach (May 2006-December 2007)  VISA allowed them to continue processing Poor network security and use of weak encryption Hannaford Bros  WAS PCI COMPLIANT  while being hacked (November 2007) Compliant with protect CCH data in storage and in transit over public/open networks 130 ML CCN (reported January 20 2009)
So How Compliance Drives Security? Regulations  such as PCI, Gramm-Leach Bliley Act (GLBA), FFIEC, HIPAA, SB 1386, AB 1950  drive security via an adversarial approach, some examples: Fail audit  => additional fines, restrictions and controls Leak of PII  => public information disclosure in most US states (SB1386) Running afoul of PCI  => can’t do business using credit cards, can’t do business with Wal-Mart Generally is security by FUD Fear of backlash, private suits, etc
PCI DSS: Protection of CCH and Sensitive Credit Card Authentication Data  [PCI-DSS] 3.2  Do not store  sensitive authentication data subsequent to authorization (even if encrypted) [PCI-DSS] 3.3  Mask PAN  when displayed (the first six and last four digits are the maximum number of digits to be displayed).  [PCI-DSS] 3.4  Render PAN , at minimum, unreadable anywhere it is stored (including on portable digital media, backup media, in logs)
Security Compliance Web Application Risk Management
Underground economy for stolen credit card and bank account credentials
Monetize The Losses ? Ask TJX CFO The cyber attack on the retailer Marshalls and TJ Maxx (disclosed in January 2007):  after-tax cash charge of approximately $118 million , or $.25 per share. The company increased its estimate of pre-tax charges for the compromise to nearly $216 million .  According to some experts,  TJX may have to spend in the end a total of more than $500 million , including litigation fees and government fines.
Another Way to Look at Business Impact Of Data Breaches : Correlate Drop in Stock Price  With  Bad News (chart from datalossdb.org) 130 ML CCN (reported January 20 2009)
Cost Estimate Of  Web Application Data Breach Due to SQL Injection Attack Probability of attack  by type and attack vector incident (identity theft) data : 13 % of incidents involving breaches of web channel  (datalossdb.org) x  19 % of incidents that use SQL injection as attack vector  (WHID) =  2.5 %  as  the probability that a SQL injection vulnerability  will cause identity theft data loss  Estimate business impact of attack (SQL injection)  by multiply probability of attack x number of losses x cost of one data loss  $ 691  per each individual theft case (Javelin)  X 130 million individual ID theft cases x 2.5 % attack ID theft probability =   $ 2.2 Billions
A Critical View of Compliance and Security Is compliance = security ? Plenty of compliant firms have recently been hit with major security breaches Increased number of stolen credit card and bank account credentials available in the black market Is compliance cost and risk effective? Derail security effort from strategy C-Levels question the value  to what they perceive as 'extra' or 'misguided' efforts Cost vs. benefit  is cost of non-compliance fines vs. benefit (savings) of not implementing controls
Did PCI compliance auditors failed Hearthland?
Non Compliance From Risk Perspective Regulatory noncompliance is by it self a business risk : assessing the likelihood and potential costs of a particular threat against the cost of preventing or mitigating that threat
Threat modeling techniques for cybercrime threats
Application Threat Modeling And The Cybercrime Attack Surface Standards Compliance Gap Analysis Penetration Testing Attack Tree Analysis Cybercrime Intelligence DFD/Secure Architecture  Analysis Use and misuse cases Security By Design Risk Mitigation Strategies Attack Vector Analysis Source Code Analysis
Cybercrime Threat Intelligence and Analysis: Attacks Against Financial Services and Online retailers THREAT INTELLIGENCE: Attack “xp_cmdshell on MSQL server to upload sniffers to capture CC transactions and ATM PINs from DB, HSM THREAT MITIGATION ANALYSIS: Disable xp_cmdshell, Deny extended URL, escape “”,  Use store procedures,  Run SQL Server and IIS under non-privilege, Do not use “sa” hardcoded,  Lock account on mainframes against brute force Use minimum privileges on AD/SQL server, restrict access by IP, Use proxy server for internet access,  Implement firewall rules  Ensure HSM are not responsive of any commands with PIN in the clear
Cybercrime Threat  Intelligence: Attacks Against Online Bank Customers  ZBOT THREAT INTELLIGENCE  (from Secureworks article): The attack vector is email spear phishing and the payload is an IFRAME browser exploit that deploys malware/spyware on the desktop The malware connects back to the hacker botnet C&C for commands and configuration files  targeting specific on-line banking sites The  targeted bank malware performs MiTM attacks against the bank customer to get banking credentials and log into the banking site and perform transactions such as wire transfers  A keylogger logs keystrokes and supplies them to the site by defeating fraud monitoring controls
Cybercrime Intelligence And Analysis Goals Understand cyber threats and how they may affect your business :  What cyber threats are relevant to your industry? Learn from cyber criminals motives and the most likely attack scenarios :  Become your enemy !  Build the right attack tree to walk through probable attack scenarios. Plan defenses for the attack vectors being used by your enemy : Based on the likely attack patterns for each branch of the attack tree, identify which application vulnerabilities can be exploited via which attacks
Attack-Threat Tree Analysis
Threat Tree For Credit Card Attacks
Threat Tree For ATM Attacks
Use and Abuse Cases
Use And Abuse  Cases For Multi Factor Authentication
Use and Abuse Cases For Logins
Attack Vector Analysis
Attack Vector Analysis Derive a list of attack vectors  that can be used  for the threat/attack analysis  of the application Start with code injection attacks library: SQL injection attacks  HTML  (IFRAME) injection attacks  Script injection (e.g. cross-site scripting) attacks  Command shell injection attacks  File injection attacks  Server pages injection attacks (e.g. ASP, PHP)  Cookie poisoning attacks  XML poisoning attacks
Common Code Injection Attack Vector From:  www.technicalinfo.net/papers/Phishing.html
IFRAME injection (In-Line Frame Injection) Browser vulnerabilities in handling iFrame tags Trusted sites with malicious banner ads Leverages blackhat  in order to drive traffic to vulnerable sites Growing attack vectors for malware propagation Blackhat SEO fueled Rogue Software Campaigns.  over 1 Million links all targeting the Ford Motor Company. Mislead search engines to falsely promote malicious pages to the top of the search results.  user visits one malicious sites,  prompted to download and install a malicious "codec",  Cybercrime HTML-IFRAME Injection Attack Vectors Intended Site Ad with Embedded iFrame Malicious Site
Architecture analysis via threat modeling
DFD/Architecture Threat Analysis Objectives Identify entry and the exit points and the access levels Enumerate the threats to the application elements and map to countermeasures Identify the vulnerabilities that can be exploited  by threat using the most likely attack vectors Select and locate countermeasures in the application architecture
Mapping DFD Components to STRIDE Threats to Find Countermeasures Access Level External Access Level Internal Access Level Restricted Spoofing Repudiation Tampering Repudiation Info Disclosure Denial OF service AuthN, Encryption Digital signatures, HMAC, TS, AuthN, Encryption Digital signatures, HMAC, TS,AuthZ Audit Encryption, AuthZ Filtering, AuthN
Mapping of Threats, Attacks, Vulnerabilities and Countermeasures <SCRIPT>alert(“Cookie”+ document.cookie)</SCRIPT> Injection flaws  CSRF, Insecure Direct Obj. Ref,  Insecure Remote File Inclusion NSAPI/ ISAPI Filter Custom errors OR ‘1’=’1—‘,  Prepared Statements/ Parameterized Queries, Store  Procedures ESAPI Filtering, Server RBAC Form Tokenization  XSS, SQL Injection,  Information Disclosure  Via errors Broken Authentication, Connection DB PWD in clear Hashed/ Salted  Pwds in Storage and Transit Trusted  Server To Server Authentication, SSO Trusted Authentication, Federation, Mutual Authentication Broken  Authentication/ Impersonation, Lack of Synch Session Logout No PK exposed as URL parameter Encrypt Confidential PII  in Storage/Transit Insecure Crypto Storage Insecure Crypto Storage &quot;../../../../etc/passwd%00&quot; Cmd=%3B+mkdir+hackerDirectory http://www.abc.com?RoleID Phishing, Privacy Violations, Financial Loss Identity Theft System Compromise, Data Alteration, Destruction
Secure By Default Application Measures Securing The Web server: 1) Hardening and Locking 2) Secure Configuration Mgmt. 3) Auditing and Logging Securing The DB Server: 1) Hardening, remove extended store procedures 2) Enforce Access Privileges 3) Protect PII and sensitive data in storage and transit (S/ODBC) 4) Auditing and logging Securing The App Server: 1) Server to server authentication 2) Message security 3) Secure Session Management, 4)  Auditing & Logging Securing The Browser 1) AV, AS, Browser updates 2) Hardening, sandboxing 3) Use EV SSL enabled browsers
Secure By Design Architecture Principles Implement Authentication With Adequate Strength Enforce Least Privilege Protect Sensitive Data In Storage, Transit And Display Enforce Minimal Trust Trace and Log User Actions And Security Events Fail Securely And Gracefully Apply Defense in Depth Apply Security By Default Design For Simplicity, KISS Principle Secure By Design, Development and Deployment Secure As The Weakest Link Avoid Security By Obscurity
Mitigation strategies against cybercrime attacks
Security Compliance Web Application Risk Management
Cybercrime Situational Awareness Questions Are your organization mitigations against threats mostly driven by security audit and compliance? Is compliance a factor for business risk ?  What is your appetite for risk? Is your glass half full ( 'What is BofA doing?' or 'What does Gartner say?‘)  or half empty  Build you (Devil's Advocate) Do you know HOW threats will affect your data assets?  For example: HOW transactions can be can be abused for fraud ? WHAT are possible ways in which you application can leak sensitive/credit card data ?
Application Layer Cybercrime Threats Mitigation Strategy Mitigate against known threats  that exploit common vulnerabilities (e.g. OWASP T10) at the application layer Stay ahead of cybercrime threats : adopt cyber-intelligence and cyber threat analysis to learn about new threats and attack vectors Apply Threat Modeling  to new and existing applications to identify countermeasures in the application architecture Drive security into applications following secure architecture design principles
Q & Q U E S T I O N S A N S W E R S

More Related Content

PPT
Penyambungan Internet Intranet
Agus Armunato
 
PPTX
3D Lighting Techniques in Animation
Animation Courses, Ahmedabad
 
PDF
Secure Design: Threat Modeling
Narudom Roongsiriwong, CISSP
 
PPT
Application Threat Modeling
Marco Morana
 
PPTX
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Ulf Mattsson
 
PDF
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
Ulf Mattsson
 
PPTX
ISACA New York Metro April 30 2012
Ulf Mattsson
 
PPTX
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf Mattsson
 
Penyambungan Internet Intranet
Agus Armunato
 
3D Lighting Techniques in Animation
Animation Courses, Ahmedabad
 
Secure Design: Threat Modeling
Narudom Roongsiriwong, CISSP
 
Application Threat Modeling
Marco Morana
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Ulf Mattsson
 
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
Ulf Mattsson
 
ISACA New York Metro April 30 2012
Ulf Mattsson
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf Mattsson
 

Similar to Security Compliance Web Application Risk Management (20)

PPTX
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Tripwire
 
PPTX
2011-10 The Path to Compliance
Raleigh ISSA
 
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
PPTX
The Evolution of Cybercrime
Stephen Cobb
 
PPTX
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Damir Delija
 
PDF
Oracle tech db-02-hacking-neum-15.04.2010
Oracle BH
 
PDF
Security Awareness Training
Daniel P Wallace
 
PPTX
2013 PMA Business Security Insights
gotopaz
 
PDF
Solving the enterprise security challenge - Derek holt
Roopa Nadkarni
 
PPT
Information security
Sathyanarayana Panduranga
 
PDF
Information Security
Madushan Sandaruwan
 
PPTX
Cyber Attacks and Defences - JNTUH,Cyber Attacks and Defences
NiharikaGuptas
 
PDF
Thy myth of hacking Oracle
Ermando
 
PPTX
Altitude SF 2017: Security at the edge
Fastly
 
PPT
Security Manager - Slides - Module 6 Powerpoint Presentation
trevor501353
 
PPTX
Moving to the Cloud: A Security and Hosting Introduction
Blackbaud
 
PDF
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
 
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins
 
PPTX
Web Application Security Session for Web Developers
Krishna Srikanth Manda
 
PPTX
Owasp e crime-london-2012-final
Marco Morana
 
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Tripwire
 
2011-10 The Path to Compliance
Raleigh ISSA
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
The Evolution of Cybercrime
Stephen Cobb
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Damir Delija
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle BH
 
Security Awareness Training
Daniel P Wallace
 
2013 PMA Business Security Insights
gotopaz
 
Solving the enterprise security challenge - Derek holt
Roopa Nadkarni
 
Information security
Sathyanarayana Panduranga
 
Information Security
Madushan Sandaruwan
 
Cyber Attacks and Defences - JNTUH,Cyber Attacks and Defences
NiharikaGuptas
 
Thy myth of hacking Oracle
Ermando
 
Altitude SF 2017: Security at the edge
Fastly
 
Security Manager - Slides - Module 6 Powerpoint Presentation
trevor501353
 
Moving to the Cloud: A Security and Hosting Introduction
Blackbaud
 
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins
 
Web Application Security Session for Web Developers
Krishna Srikanth Manda
 
Owasp e crime-london-2012-final
Marco Morana
 
Ad

More from Marco Morana (20)

PDF
Is talent shortage ws marco morana
Marco Morana
 
PPTX
Isaca conference threat_modeling_marco_morana_short.pdf
Marco Morana
 
PPTX
Owasp atlanta-ciso-guidevs1
Marco Morana
 
PDF
Security And Privacy Cagliari 2012
Marco Morana
 
PPT
Presentation sso design_security
Marco Morana
 
PPTX
Owasp security summit_2012_milanovs_final
Marco Morana
 
PPTX
Security Summit Rome 2011
Marco Morana
 
PPTX
Risk Analysis Of Banking Malware Attacks
Marco Morana
 
PDF
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Marco Morana
 
PPT
Security Exploit of Business Logic Flaws, Business Logic Attacks
Marco Morana
 
PPT
Software Security Initiatives
Marco Morana
 
PPT
Business cases for software security
Marco Morana
 
PPT
Web Application Security Testing
Marco Morana
 
PPT
Owasp Forum Web Services Security
Marco Morana
 
PPT
Owasp Top 10 And Security Flaw Root Causes
Marco Morana
 
PPT
Software Security Frameworks
Marco Morana
 
PPT
OWASP Top 10 And Insecure Software Root Causes
Marco Morana
 
PPT
Software Open Source, Proprierio, Interoperabilita'
Marco Morana
 
PPT
Progetti Open Source Per La Sicurezza Delle Web Applications
Marco Morana
 
PPT
Introduction To OWASP
Marco Morana
 
Is talent shortage ws marco morana
Marco Morana
 
Isaca conference threat_modeling_marco_morana_short.pdf
Marco Morana
 
Owasp atlanta-ciso-guidevs1
Marco Morana
 
Security And Privacy Cagliari 2012
Marco Morana
 
Presentation sso design_security
Marco Morana
 
Owasp security summit_2012_milanovs_final
Marco Morana
 
Security Summit Rome 2011
Marco Morana
 
Risk Analysis Of Banking Malware Attacks
Marco Morana
 
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Marco Morana
 
Security Exploit of Business Logic Flaws, Business Logic Attacks
Marco Morana
 
Software Security Initiatives
Marco Morana
 
Business cases for software security
Marco Morana
 
Web Application Security Testing
Marco Morana
 
Owasp Forum Web Services Security
Marco Morana
 
Owasp Top 10 And Security Flaw Root Causes
Marco Morana
 
Software Security Frameworks
Marco Morana
 
OWASP Top 10 And Insecure Software Root Causes
Marco Morana
 
Software Open Source, Proprierio, Interoperabilita'
Marco Morana
 
Progetti Open Source Per La Sicurezza Delle Web Applications
Marco Morana
 
Introduction To OWASP
Marco Morana
 
Ad

Recently uploaded (20)

PDF
Doc9.....................................
SofiaCollazos
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
Doc9.....................................
SofiaCollazos
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Software Development Methodologies in 2025
KodekX
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
The Future of AI & Machine Learning.pptx
pritsen4700
 

Security Compliance Web Application Risk Management

  • 1. The Rise of Threat Analysis and the Fall of Compliance in Mitigating Web Application Security Risks Marco Morana OWASP Cincinnati Chapter Lead [email_address] Tony Ucedavelez OWASP Atlanta Chapter Lead [email_address] LA and OC Chapters Sept 2009 Meetings
  • 2. Meeting Agenda “ Status quo” of security compliance in mitigating cybercrime risks Compliance data vs. data breach data Business impact of data breaches Critical view of how compliance drives security Threat modeling techniques for the analysis of cybercrime threats Attack tree analysis Use and misuse cases Attack vectors analysis Data flow/architecture analysis Risk mitigation strategies against cybercrime attacks
  • 3. Status Quo of Security Policy and Regulatory Compliance in Mitigating Risks
  • 4. Biggest Fraud in History 170 million card and ATM numbers used sql injection and packet sniffers Companies mentioned in the indictments (3) include: TJX Companies Heartland Payment Systems (HPY) Hannaford Bros
  • 5. Let’s look at PCI-DSS COMPLIANCE and data breach reported (datalossdb.org): Heartland Payment Systems (HPY) WAS PCI COMPLIANT at the time of the breach (August 2007) and is currently PCI COMPLIANT Passed Inspection in April 2008 (Trustwave QSA ) After an audit, Heartland uncovered Malware (the data-sniffing kind) to capture CC or ATM numbers 94 ML CCN ( Reported January 7 2007) 4.2 ML CCN and ATM data(reported March 17 2008) TJX was fined for NOT BEING PCI COMPLIANT during the data breach (May 2006-December 2007) VISA allowed them to continue processing Poor network security and use of weak encryption Hannaford Bros WAS PCI COMPLIANT while being hacked (November 2007) Compliant with protect CCH data in storage and in transit over public/open networks 130 ML CCN (reported January 20 2009)
  • 6. So How Compliance Drives Security? Regulations such as PCI, Gramm-Leach Bliley Act (GLBA), FFIEC, HIPAA, SB 1386, AB 1950 drive security via an adversarial approach, some examples: Fail audit => additional fines, restrictions and controls Leak of PII => public information disclosure in most US states (SB1386) Running afoul of PCI => can’t do business using credit cards, can’t do business with Wal-Mart Generally is security by FUD Fear of backlash, private suits, etc
  • 7. PCI DSS: Protection of CCH and Sensitive Credit Card Authentication Data [PCI-DSS] 3.2 Do not store sensitive authentication data subsequent to authorization (even if encrypted) [PCI-DSS] 3.3 Mask PAN when displayed (the first six and last four digits are the maximum number of digits to be displayed). [PCI-DSS] 3.4 Render PAN , at minimum, unreadable anywhere it is stored (including on portable digital media, backup media, in logs)
  • 9. Underground economy for stolen credit card and bank account credentials
  • 10. Monetize The Losses ? Ask TJX CFO The cyber attack on the retailer Marshalls and TJ Maxx (disclosed in January 2007): after-tax cash charge of approximately $118 million , or $.25 per share. The company increased its estimate of pre-tax charges for the compromise to nearly $216 million . According to some experts, TJX may have to spend in the end a total of more than $500 million , including litigation fees and government fines.
  • 11. Another Way to Look at Business Impact Of Data Breaches : Correlate Drop in Stock Price With Bad News (chart from datalossdb.org) 130 ML CCN (reported January 20 2009)
  • 12. Cost Estimate Of Web Application Data Breach Due to SQL Injection Attack Probability of attack by type and attack vector incident (identity theft) data : 13 % of incidents involving breaches of web channel (datalossdb.org) x 19 % of incidents that use SQL injection as attack vector (WHID) = 2.5 % as the probability that a SQL injection vulnerability will cause identity theft data loss Estimate business impact of attack (SQL injection) by multiply probability of attack x number of losses x cost of one data loss $ 691 per each individual theft case (Javelin) X 130 million individual ID theft cases x 2.5 % attack ID theft probability = $ 2.2 Billions
  • 13. A Critical View of Compliance and Security Is compliance = security ? Plenty of compliant firms have recently been hit with major security breaches Increased number of stolen credit card and bank account credentials available in the black market Is compliance cost and risk effective? Derail security effort from strategy C-Levels question the value to what they perceive as 'extra' or 'misguided' efforts Cost vs. benefit is cost of non-compliance fines vs. benefit (savings) of not implementing controls
  • 14. Did PCI compliance auditors failed Hearthland?
  • 15. Non Compliance From Risk Perspective Regulatory noncompliance is by it self a business risk : assessing the likelihood and potential costs of a particular threat against the cost of preventing or mitigating that threat
  • 16. Threat modeling techniques for cybercrime threats
  • 17. Application Threat Modeling And The Cybercrime Attack Surface Standards Compliance Gap Analysis Penetration Testing Attack Tree Analysis Cybercrime Intelligence DFD/Secure Architecture Analysis Use and misuse cases Security By Design Risk Mitigation Strategies Attack Vector Analysis Source Code Analysis
  • 18. Cybercrime Threat Intelligence and Analysis: Attacks Against Financial Services and Online retailers THREAT INTELLIGENCE: Attack “xp_cmdshell on MSQL server to upload sniffers to capture CC transactions and ATM PINs from DB, HSM THREAT MITIGATION ANALYSIS: Disable xp_cmdshell, Deny extended URL, escape “”, Use store procedures, Run SQL Server and IIS under non-privilege, Do not use “sa” hardcoded, Lock account on mainframes against brute force Use minimum privileges on AD/SQL server, restrict access by IP, Use proxy server for internet access, Implement firewall rules Ensure HSM are not responsive of any commands with PIN in the clear
  • 19. Cybercrime Threat Intelligence: Attacks Against Online Bank Customers ZBOT THREAT INTELLIGENCE (from Secureworks article): The attack vector is email spear phishing and the payload is an IFRAME browser exploit that deploys malware/spyware on the desktop The malware connects back to the hacker botnet C&C for commands and configuration files targeting specific on-line banking sites The targeted bank malware performs MiTM attacks against the bank customer to get banking credentials and log into the banking site and perform transactions such as wire transfers A keylogger logs keystrokes and supplies them to the site by defeating fraud monitoring controls
  • 20. Cybercrime Intelligence And Analysis Goals Understand cyber threats and how they may affect your business : What cyber threats are relevant to your industry? Learn from cyber criminals motives and the most likely attack scenarios : Become your enemy ! Build the right attack tree to walk through probable attack scenarios. Plan defenses for the attack vectors being used by your enemy : Based on the likely attack patterns for each branch of the attack tree, identify which application vulnerabilities can be exploited via which attacks
  • 22. Threat Tree For Credit Card Attacks
  • 23. Threat Tree For ATM Attacks
  • 24. Use and Abuse Cases
  • 25. Use And Abuse Cases For Multi Factor Authentication
  • 26. Use and Abuse Cases For Logins
  • 28. Attack Vector Analysis Derive a list of attack vectors that can be used for the threat/attack analysis of the application Start with code injection attacks library: SQL injection attacks HTML (IFRAME) injection attacks Script injection (e.g. cross-site scripting) attacks Command shell injection attacks File injection attacks Server pages injection attacks (e.g. ASP, PHP) Cookie poisoning attacks XML poisoning attacks
  • 29. Common Code Injection Attack Vector From: www.technicalinfo.net/papers/Phishing.html
  • 30. IFRAME injection (In-Line Frame Injection) Browser vulnerabilities in handling iFrame tags Trusted sites with malicious banner ads Leverages blackhat in order to drive traffic to vulnerable sites Growing attack vectors for malware propagation Blackhat SEO fueled Rogue Software Campaigns. over 1 Million links all targeting the Ford Motor Company. Mislead search engines to falsely promote malicious pages to the top of the search results. user visits one malicious sites, prompted to download and install a malicious &quot;codec&quot;, Cybercrime HTML-IFRAME Injection Attack Vectors Intended Site Ad with Embedded iFrame Malicious Site
  • 31. Architecture analysis via threat modeling
  • 32. DFD/Architecture Threat Analysis Objectives Identify entry and the exit points and the access levels Enumerate the threats to the application elements and map to countermeasures Identify the vulnerabilities that can be exploited by threat using the most likely attack vectors Select and locate countermeasures in the application architecture
  • 33. Mapping DFD Components to STRIDE Threats to Find Countermeasures Access Level External Access Level Internal Access Level Restricted Spoofing Repudiation Tampering Repudiation Info Disclosure Denial OF service AuthN, Encryption Digital signatures, HMAC, TS, AuthN, Encryption Digital signatures, HMAC, TS,AuthZ Audit Encryption, AuthZ Filtering, AuthN
  • 34. Mapping of Threats, Attacks, Vulnerabilities and Countermeasures <SCRIPT>alert(“Cookie”+ document.cookie)</SCRIPT> Injection flaws CSRF, Insecure Direct Obj. Ref, Insecure Remote File Inclusion NSAPI/ ISAPI Filter Custom errors OR ‘1’=’1—‘, Prepared Statements/ Parameterized Queries, Store Procedures ESAPI Filtering, Server RBAC Form Tokenization XSS, SQL Injection, Information Disclosure Via errors Broken Authentication, Connection DB PWD in clear Hashed/ Salted Pwds in Storage and Transit Trusted Server To Server Authentication, SSO Trusted Authentication, Federation, Mutual Authentication Broken Authentication/ Impersonation, Lack of Synch Session Logout No PK exposed as URL parameter Encrypt Confidential PII in Storage/Transit Insecure Crypto Storage Insecure Crypto Storage &quot;../../../../etc/passwd%00&quot; Cmd=%3B+mkdir+hackerDirectory http://www.abc.com?RoleID Phishing, Privacy Violations, Financial Loss Identity Theft System Compromise, Data Alteration, Destruction
  • 35. Secure By Default Application Measures Securing The Web server: 1) Hardening and Locking 2) Secure Configuration Mgmt. 3) Auditing and Logging Securing The DB Server: 1) Hardening, remove extended store procedures 2) Enforce Access Privileges 3) Protect PII and sensitive data in storage and transit (S/ODBC) 4) Auditing and logging Securing The App Server: 1) Server to server authentication 2) Message security 3) Secure Session Management, 4) Auditing & Logging Securing The Browser 1) AV, AS, Browser updates 2) Hardening, sandboxing 3) Use EV SSL enabled browsers
  • 36. Secure By Design Architecture Principles Implement Authentication With Adequate Strength Enforce Least Privilege Protect Sensitive Data In Storage, Transit And Display Enforce Minimal Trust Trace and Log User Actions And Security Events Fail Securely And Gracefully Apply Defense in Depth Apply Security By Default Design For Simplicity, KISS Principle Secure By Design, Development and Deployment Secure As The Weakest Link Avoid Security By Obscurity
  • 37. Mitigation strategies against cybercrime attacks
  • 39. Cybercrime Situational Awareness Questions Are your organization mitigations against threats mostly driven by security audit and compliance? Is compliance a factor for business risk ? What is your appetite for risk? Is your glass half full ( 'What is BofA doing?' or 'What does Gartner say?‘) or half empty Build you (Devil's Advocate) Do you know HOW threats will affect your data assets? For example: HOW transactions can be can be abused for fraud ? WHAT are possible ways in which you application can leak sensitive/credit card data ?
  • 40. Application Layer Cybercrime Threats Mitigation Strategy Mitigate against known threats that exploit common vulnerabilities (e.g. OWASP T10) at the application layer Stay ahead of cybercrime threats : adopt cyber-intelligence and cyber threat analysis to learn about new threats and attack vectors Apply Threat Modeling to new and existing applications to identify countermeasures in the application architecture Drive security into applications following secure architecture design principles
  • 41. Q & Q U E S T I O N S A N S W E R S

Editor's Notes

  • #3: We take a critical view of security driven by compliance in view of the increased threat of identify theft and credit card fraud We will talk about modeling threats and how can be used to learn how to mitigate cybercrime threats such as attack trees, use and misuse cases, attack vector analysis and data flow and data flow/architectural analysis Finally we will provide some mitigation strategies against cybercrime attacks
  • #5: Heartland Payment Systems (HPY) data breach: 130 Credit Card Accounts Exploited SQL Injection vulnerabilities to install malware (Hannaford 9/07, Company A &amp; B on 1/08) Used “wardriving” and installed sniffers Acted ad member of a Cybercrime gang Profited from the sale of ACC#, PINs to fake credit cards and commit ATM fraud Engaged in money laundering
  • #6: On PCI compliance: http://www.thetechherald.com/article.php/200905/2849/Does-the-Heartland-breach-prove-PCI-useless Visa and MasterCard raised some red flags and alerted Heartland to suspicious transactions. After an audit, Heartland uncovered Malware (the data-sniffing kind) that allowed thieves to capture credit or debit-card numbers, expiration dates, and in some cases the cardholder’s name. Heartland was, at the time of the breach, and currently is, PCI compliant. It passed an inspection in April of 2008; this fact only serves to stress the point that PCI compliance does not equal security. The company that certified them, Trustwave, is established as a QSA (Qualified Security Assessors). If you wanted to lay blame on Trustwave for the breach, you would be hard-pressed to prove it. A QSA can only ensure that a company meets or exceeds the requirements of PCI compliance. No QSA can ensure or promise that a company it assesses for is completely secure and defended against attack. Card systems had 40 ML Breach prior PCI being mandatory Customer portal exploited via SQL injection
  • #7: Compliance drive security from stick perspective with audit fines and restrictions. The cost also of intangible reputation since information disclosures In the case of TJX maxx for example a credit card processor was fined 800,000 USD because of lack of security controls by VISA nevertheless some times it is cheaper to pay the fine rather then implement the controls
  • #8: PCI DSS brings precision, but with FUD: Greater detail surrounding technical/ non-tech security requirements Cardholder data such as PAN need to be masked in display and need to be protected in storage and transit with encryption, the same for card holder data and expiration data on the card Track 2 data that include CVV2, PINs cannot be stored even if encrypted
  • #10: The reality is that there is a market for bank account and credit card information in the black economy
  • #11: http://findarticles.com/p/articles/mi_m0EIN/is_2007_August_14/ai_n27342542/
  • #13: A similar math can be factored using Van Geer data of 4.5% of data loss probability (FTC 2003 data) x 655 $/person cost Can we correlate this losses somehow, the cost for loss with the fact that among all breaches 13 % are from wbe and 19% use SQL injection attack vectors you can come out with 0.025 that is 2.5 % as the probability that an identify theft will occurr through the web channel because of a SQL injection attack. The cost is the cost per incident x record loss for internal (pokemon is 200 $) or you can just factor the cost per re-issance of the card This multipled for the cost per incident/records you can came out with 241 ML for 14 million records for 130 ML is 2.5 BILLION According to the case in NJ SQL injection is considered cause of Hannaford http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/2008-2009%20US%20Cost%20of%20Data%20Breach%20Report%20Final.pdf http://www.securecomputing.net.au/Tools/Print.aspx?CIID=103302 Assume that according that 2003 FTC data the potential loss per identity theft incident is $ 655 per incident. Assume you are serving via your web site a population of 4 million customers, the potential loss of losing your customer data such as credit card accounts for example would be of $ 2,6 Billion and with probability of identity theft occurrence of 4.6 % (also FTC data) the projected loss for your company could be $ 120 ML for which 14% or $ 16 ML would be the cost of data losses via the web channel alone.
  • #14: It is important not to confuse compliance with security and confusing compliance risk (that is fines, liability risks) with real risks that include all the above. Security is people process and technology and compliance just addresses on component. So the question is do we place the effort and the right focus?
  • #15: http://www.csoonline.com/article/499527/Heartland_CEO_on_Data_Breach_QSAs_Let_Us_Down
  • #16: From the risk perspective compliance is a business risk and secondary to accessing the risk factors of likelihood and impact of a threat against the cost of preventing and mitigating a threat. If you think about 1) the cost of compliance is in essence like the cost of implementing a countermeasure vs the cost of the loss. Compliance risks are minimum requirements and in the risk equation cost less then the cost of a potential security breach,
  • #18: The areas are the threat surface that is at which extent you can mitigate known threats by identifying vulnerabilities and remediating them The areas represents the threat space, you are as secure as the threat you know. For example tools and standards compliance can capture at maximum 40 % of all potential vulnerabilities, the light blue area represents all risks known and unknown and the green area represents the threat modeling activities that can be used to tackle 75-80% of all potential issues
  • #19: In same cases the cyber attack vectors are reported step by step Use &amp;quot;xp_cmdshell“ to download hacker tools to the compromised MSSQL server. Obtain valid Windows credentials by using fgdump Install network &amp;quot;sniffers&amp;quot; to identify card data and systems involved in processing credit card transactions. Install backdoors that &amp;quot;beacon&amp;quot; periodically to their command and control servers Target databases, Hardware Security Modules (HSMs), and processing applications in an effort to obtain credit card data or brute-force ATM PINs. Use WinRAR to compress the information they pilfer from the compromised networks.
  • #20: Botnet attack bank customers using malware that perform MITM. The attack vector is email phishing (lure to accept an offer for free software) and delivered via hidden frames Once it knows the banksite and gets user credentials from the user, it will do the attack without the user knowing using automated script that can perform wire transfers and supply all the extra data as required such as SSN, S/W OTP. It will simulate all user keystrokes and simulate being an attack from valid browser Botnet-controlled Trojan robbing online bank customers Security firm says malware targeting commercial customers believed to have come from Russia By Ellen Messmer , Network World , 12/13/2007 Share/Email Tweet This 1 Comment Print A new variant on the &amp;quot;Prg Banking Trojan&amp;quot; malware discovered in June is stealing funds from commercial accounts in the United States, United Kingdom, Spain and Italy with a botnet called Zbot, says Atlanta-based SecureWorks . &amp;quot;It&apos;s been very successful since we&apos;ve first seen this at the end of November,&amp;quot; says Don Jackson, senior security researcher at SecureWorks, which believes the Prg Trojan variant is designed by the Russian hackers group known as Russian UpLevel working with some German affiliates.  Manage Security and Compliance in an Adverse Economy in 2009 and Beyond: View now &amp;quot;The Trojan has the ability to use a man-in-the-middle attack, a kind of shoulder-surfing when someone logs into a bank account. It can inject a request for a Social Security number or other information, and it&apos;s very dynamic . It’s targeted for each specific bank.&amp;quot; SecureWorks says about a dozen banks -- which it wouldn&apos;t identify because it says the U.S. Secret Service is investigating the incidents -- have had their commercial customers affected by the Trojan-based money fraud operation. According to SecureWorks, the bank Trojan malware can be distributed using iFrame exploits on Web sites or through very targeted attacks against bank customers via phishing . Oftentimes, the phishing e-mail attempts to lure the victim into clicking on a site to offer software disguised as a real certificate, security code or soft token, the company says, adding that it has uncovered caches of stolen data in its research. If the attacker succeeds in getting the Trojan malware onto the victim&apos;s computer, he can piggyback on a session of online banking without even having to use the victim&apos;s name and password. The infected computer communicates back to the Trojan&apos;s command-and-controller exactly which bank the victim has an account with. It then automatically feeds code that tells the Trojan how to mimic actual online transactions with a particular bank to do wire transfers or bill payments SecureWorks says the Trojan performs keystrokes that imitate the victim&apos;s keystrokes to avoid any online fraud-monitoring. Although the Secret Service is investigating the Trojan&apos;s impact on banks and their customers, Jackson says Russian law authorities are lax in reining in online criminal groups widely believed to be operating from Russia, including Russian UpLevel and the Russian Business Network .
  • #21: What cyber threats are relevant to your industry? Peel the threat onion (industry, geographic, local market, overall business, branch) Are you looking at outdated cyber threats?
  • #23: Most of cybercrime attacks target both the browser and the web application. You are as secure as the weakest link and the weakest link is always the human element, so phishing and social engineering is the easier way to get CC data directly from a user. Other attacks use drive by download to install malware to perform MITM, clickjacking or man in the browser attacks exploit browser vulnerabilities and in the exeuctable content (browser plugins, adobe and macromedia flash, activex controls) From the web application pespective the attacks can exploit SQL injection vulnerabilities to upload sniffers, get the data by altering the query, attack the weak encryption and attack session such as using session fixaction, hijacking the session in transit or being cached logged
  • #24: You can attack an ATM to commit fraud in many ways, one is by exploiting weakenesses in the ATM network like the DOS slammer. To forge a card you need CIN, PIN, CVV track 1 and 2 data you get them by using a skimming device, or buy cardholder and sensitivre CC data online, getting this data by banking sites that use ATM and CC to validate the customers in certain transactions, spear phising, exploit ATM vulnerabilitiees
  • #26: This can be used to evaluate the strenght of security controls against known attacks. This is very high level representations. Diagrams of this kind can be used to evaluate coutnermeasues
  • #27: Definition : Defining use and abuse cases is the foundation of the security requirement phase in which security requirements are developed. Abuse cases are instrumental to elicit requirements for security controls to mitigate potential risks. The scope of such activity is to gather functional requirements from business analysts, security governance team members, project managers and risk analysts to document the expected functionality for the application and the security controls based upon the defined use cases (positive requirements) as well as the abuse cases (negative requirements)..
  • #30: In the example herein a malicious page is injected in the original page. Attack of this nature can exploit unvalidated URLs to executed within the legitimate frame and delivered to the victim via phishing, or can reflect script that when execute evil code such as a keylogger or spyware to steal cookies and other information stored on the browser.
  • #33: Identify entry and the exit points and the access levels (anonymous, user authenticated, administrator, super-user) required to access the different critical components (data, services) being identified in the DFDs Enumerate the threats to the application elements by using the DFD as basis for the threat analysis by using the STRIDE (Spoofing, Tampering, Repudiation, Info Disclosure, Denial of Service, Elevation of Privilege) per element technique Identify the most likely attack vectors and how can impact the application from the entry points of the application and the end to end data flow visualized in the DFD and how these can exploit weaknesses (vulnerabilities) across authorization, authentication, secure communication channels as well as misuse the application functionality to cause undesirable results Identify mitigations (countermeasures) to the previously identified attack vectors and to locate them within function level (DFD level 2) diagram. Use the ASF (Application Security Frame) threat-vulnerability-countermeasure mapping (authentication, authorization, session management, data protection, data validation, error and exception handling, auditing and logging, configuration management) to indentify locate countermeasures for the DFD processes and the various DFD elements.
  • #34: Threat modeling for multi-channel fraud threat scenarios
  • #35: Learn to identify the most likely attacks by taking into consideration the potential opportunities for an attacker/malicious user to exploit: The application accessibility (internet, intranet, extranet) The value of the data (business sensitive, confidential PII) The gaps and weaknesses in the authentication being used (none, single authentication, multifactor, secondary) The level of authorization required to interact with the application (authenticated and non-authenticated users, administrators) and the data The potential client and server vulnerabilities because of their type function : Browser-Client Executables, Web server-Web Forms, Web Services, Application server-Dynamic Web Pages DB Access, Middleware-Messaging Backend Service Access, Databases The potential vulnerabilities due to the inherent risk of the software technology/framework and programming language being used: AJAX, JavaScript, J2EE, .NET 3.5, C/C++, Adobe Flash/RIA The exposure to the data in transit because of the inherent risks of communication protocols used: HTTP/S,XML, SOAP, Message Queues, Chat/IRC, email SMTP/POP
  • #36: A lot of vulnerabilities are due to unsecure configuration
  • #37: Ideally the next step is to drive security by design according to basic principles the challenge is make these principles Actionable and not a checklist. This is where compliance should be focusing on the spirit of the law rather then the letter of the low. The OWASP guidelines just do that translate this principles in actionable items for architects and developers and testers
  • #41: Cyber crime threats and application countermeasures via threat modeling The presentation will also demonstrate how threat modeling is capable of delivering critical business functions as well as in mitigating current and future cyber attacks, such as distributed denial of service, botnet driven-malware, spear phishing techniques, and more attacks that ultimately lead to identity and credit card fraud.