SlideShare une entreprise Scribd logo
1  sur  21
Code Signing Debacle 2.0:
 A Hacked Adobe Server
 and Its Impact on Us All



                    © 2012 Monterey Technology Group Inc.
Brought to you by




              www.lumension.com



Speaker
      Russ Ernst – Group Product Manager
Preview of Key Points

 Current situation
 What can/need you do?
 Going forward




© 2012 Monterey Technology Group Inc.
Current Situation

 Code signing server inside Adobe was hacked
 An unknown quantity of files were signed to
  look like they were issued by Adobe
  We know of 3 files for sure but who knows how
   many more?
 Tomorrow Adobe will revoke the certificate in
  question




© 2012 Monterey Technology Group Inc.
Current Situation

 What is the risk?
  The risk is NOT any vulnerability inside Adobe
   products already installed
  The risk IS that your computers might trust
   malicious software




© 2012 Monterey Technology Group Inc.
Current Situation

 Then, why do I need to install new versions?
  You may run into errors when you try to
            • Run affected applications
                    “Not doing so may result in an error about the application
                     being from an unknown publisher on launch, although the
                     application should still launch.”
                    "Publisher unknown, are you sure you want to run this
                     software".
                    Software Restrictions, AppLocker or other whitelisting
                     applications using certificate rules
            • Installing affected applications
                    UAC


© 2012 Monterey Technology Group Inc.
Current Situation

  OK, which applications then?
  About 30
  Already installed versions of Acrobat and Reader not
   affected
            • But new installs of Reader will be
                    “The reason is that the standalone version of Reader has an
                     installation helper file which is be impacted by the certificate
                     revocation. Already installed Reader versions are not impacted.”
  Important links
  http://helpx.adobe.com/x-productkb/global/certificate-
    updates.html#main-pars_header_5
  http://helpx.adobe.com/x-productkb/global/guidance-
    administrators-certificate-revocation.html


© 2012 Monterey Technology Group Inc.
Current Situation

 At what point do Adobe measures protect us
  from malicious software signed by this
  certificate?
  Some protection when certificate is revoked
  But PKI revocations is fraught with problems
  Answer is really unknown




© 2012 Monterey Technology Group Inc.
Current Situation

 How do I protect my systems from software
  signed by this breach?
  Installing the updated Adobe apps provides no
   protection
  Adobe says not to install the revoked certificate
            • Won’t address the risk and causes other problems
     Remaining options
            • Tactical
            • Strategic



© 2012 Monterey Technology Group Inc.
Tactical
  Up-to-date AV
  Software Restrictions, AppLocker or whitelisting rule that explicitly
    denies 3 known bad files
    PwDump7.exe:
            •    MD5 hash: 130F7543D2360C40F8703D3898AFAC22
                 File size: 81.6 KB (83,648 bytes)
                 Signature timestamp: Thursday, July 26, 2012 8:44:40 PM PDT (GMT -7:00)
                 MD5 hash of file with signature removed: D1337B9E8BAC0EE285492B89F895CADB
      libeay32.dll
            •    MD5 hash: 095AB1CCC827BE2F38620256A620F7A4
                 File size: 999 KB (1,023,168 bytes)
                 Signature timestamp: Thursday, July 26, 2012 8:44:13 PM PDT (GMT -7:00)
                 MD5 hash of file with signature removed: A7EFD09E5B963AF88CE2FC5B8EB7127C
      myGeeksmail.dll
            •    MD5 hash: 46DB73375F05F09AC78EC3D940F3E61A
                 File size: 80.6 KB (82,624 bytes)
                 Signature timestamp: Wednesday, July 25, 2012 8:48:59 PM (GMT -7:00)
                 MD5 hash of file with signature removed: 8EA2420013090077EA875B97D7D1FF07




© 2012 Monterey Technology Group Inc.
Strategic

 There is a way to get systemic protection
  against breaches of vendor software update
  infrastructures
 Need to recognize some important trends and
  facts




© 2012 Monterey Technology Group Inc.
Strategic

  The facts
  This is at least the 4 time that
    either
            • Software code signing and/or
              automatic update
              infrastructure has been
              compromised
            • Stuxnet, Duqu, Flame, Adobe
     Microsoft deserves kudos
      compared to companies like
      Adobe
     Code signing is broken                 Hack
     Automatic updates is fool               me!
      hardy

© 2012 Monterey Technology Group Inc.
Strategic

 The solution
  Complain to vendors
  Keep your AV healthy
  Take control of software distribution and updates
  Prevent unvetted software from running no matter
   who has signed it




© 2012 Monterey Technology Group Inc.
Strategic

 Take control of software distribution and
  updates
  You cannot trust automatic updates
            • Not too mention all their other problems
     Software patching commandments
     There is not substitute for application white-listing




© 2012 Monterey Technology Group Inc.
Strategic

  Software patching commandments
  1. Thou shalt not depend on vendor automatic
     updaters
  2. Thou shalt not allow patch/installation based on
     code-signing certificates
  3. Thou shalt control which patches go down and
     when
  4. Thou shalt be able to deploy patches within hours
  5. Thou shalt be able to deploy patches in phases
  6. Thou shalt not be blind to patch deployment status
  7. Thou shalt patch software from multiple vendors
  8. Thou shalt patch applications on all your operating
     systems

© 2012 Monterey Technology Group Inc.
Strategic

  There is not substitute for application white listing
  Stuff is going to get past AV
  You can no longer depend on code signatures
  You must prevent new, unknown software from
    executing
            • Users are too dumb to not run malware
            • Malware evolving too fast
            • APTs too sophisticated
            • Can’t trust software vendors
            • Don’t fall for the “unlikely you are the one being targeted”
              line
            • Problems aren’t going away anytime soon
                    Only going to get worse



© 2012 Monterey Technology Group Inc.
Bottom Line

  Install the new updates from Adobe
  Setup rules for the bad known
  Watch my blog or social media feeds
  Keep an eye on
   http://forums.adobe.com/community/certificate?vi
   ew=discussions
  Check your AV
  Hang on tomorrow
  Going forward
  Take control of patching
  Implement software restrictions, AppLocker or
    intelligent white listing


© 2012 Monterey Technology Group Inc.
Brought to you by




              www.lumension.com



Speaker
      Russ Ernst – Group Product Manager
Defense-in-Depth Strategy
                                              Successful risk mitigation starts
                       AV                     with a solid vulnerability manage-
                  Control the Bad             ment foundation, augmented by
                 Device Control
                                              additional layered defenses which
                 Control the Flow             go beyond the traditional blacklist
                                              approach.
           HD and Media Encryption
                 Control the Data



              Application Control
                 Control the Gray



     Patch and Configuration Management
        Control the Vulnerability Landscape



19
Defense-in-Depth with Intelligent Whitelisting
                Known   Unknown   Unwanted,      Application       Configuration
                Malware Malware   Unlicensed,    Vulnerabilities   Vulnerabilities
                                  Unsupported
                                  applications



  AntiVirus       X        X


 Application
                           X           X
  Control

  Patch &
                                       X               X
Remediation

  Security
Configuration                                                            X
Management
More Information
• Free Security Scanner Tools                    • Get a Quote (and more)
 » Application Scanner – discover all the apps    http://www.lumension.com/
   being used in your network                     intelligent-whitelisting/buy-now.aspx#7
 » Vulnerability Scanner – discover all OS and
   application vulnerabilities on your network
 » Device Scanner – discover all the devices
   being used in your network
   http://www.lumension.com/Resources/
   Security-Tools.aspx


• Lumension® Intelligent Whitelisting™
 » Online Demo Video:
   http://www.lumension.com/Resources/
   Demo-Center/Endpoint-Security.aspx
 » Free Trial (virtual or download):
   http://www.lumension.com/
   intelligent-whitelisting/free-trial.aspx




21

Contenu connexe

Plus de Lumension

2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusLumension
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportLumension
 

Plus de Lumension (20)

2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
 

Dernier

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Dernier (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All

  • 1. Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All © 2012 Monterey Technology Group Inc.
  • 2. Brought to you by www.lumension.com Speaker  Russ Ernst – Group Product Manager
  • 3. Preview of Key Points Current situation What can/need you do? Going forward © 2012 Monterey Technology Group Inc.
  • 4. Current Situation Code signing server inside Adobe was hacked An unknown quantity of files were signed to look like they were issued by Adobe We know of 3 files for sure but who knows how many more? Tomorrow Adobe will revoke the certificate in question © 2012 Monterey Technology Group Inc.
  • 5. Current Situation What is the risk? The risk is NOT any vulnerability inside Adobe products already installed The risk IS that your computers might trust malicious software © 2012 Monterey Technology Group Inc.
  • 6. Current Situation Then, why do I need to install new versions? You may run into errors when you try to • Run affected applications  “Not doing so may result in an error about the application being from an unknown publisher on launch, although the application should still launch.”  "Publisher unknown, are you sure you want to run this software".  Software Restrictions, AppLocker or other whitelisting applications using certificate rules • Installing affected applications  UAC © 2012 Monterey Technology Group Inc.
  • 7. Current Situation  OK, which applications then? About 30 Already installed versions of Acrobat and Reader not affected • But new installs of Reader will be  “The reason is that the standalone version of Reader has an installation helper file which is be impacted by the certificate revocation. Already installed Reader versions are not impacted.”  Important links http://helpx.adobe.com/x-productkb/global/certificate- updates.html#main-pars_header_5 http://helpx.adobe.com/x-productkb/global/guidance- administrators-certificate-revocation.html © 2012 Monterey Technology Group Inc.
  • 8. Current Situation At what point do Adobe measures protect us from malicious software signed by this certificate? Some protection when certificate is revoked But PKI revocations is fraught with problems Answer is really unknown © 2012 Monterey Technology Group Inc.
  • 9. Current Situation How do I protect my systems from software signed by this breach? Installing the updated Adobe apps provides no protection Adobe says not to install the revoked certificate • Won’t address the risk and causes other problems Remaining options • Tactical • Strategic © 2012 Monterey Technology Group Inc.
  • 10. Tactical  Up-to-date AV  Software Restrictions, AppLocker or whitelisting rule that explicitly denies 3 known bad files  PwDump7.exe: • MD5 hash: 130F7543D2360C40F8703D3898AFAC22 File size: 81.6 KB (83,648 bytes) Signature timestamp: Thursday, July 26, 2012 8:44:40 PM PDT (GMT -7:00) MD5 hash of file with signature removed: D1337B9E8BAC0EE285492B89F895CADB  libeay32.dll • MD5 hash: 095AB1CCC827BE2F38620256A620F7A4 File size: 999 KB (1,023,168 bytes) Signature timestamp: Thursday, July 26, 2012 8:44:13 PM PDT (GMT -7:00) MD5 hash of file with signature removed: A7EFD09E5B963AF88CE2FC5B8EB7127C  myGeeksmail.dll • MD5 hash: 46DB73375F05F09AC78EC3D940F3E61A File size: 80.6 KB (82,624 bytes) Signature timestamp: Wednesday, July 25, 2012 8:48:59 PM (GMT -7:00) MD5 hash of file with signature removed: 8EA2420013090077EA875B97D7D1FF07 © 2012 Monterey Technology Group Inc.
  • 11. Strategic There is a way to get systemic protection against breaches of vendor software update infrastructures Need to recognize some important trends and facts © 2012 Monterey Technology Group Inc.
  • 12. Strategic  The facts This is at least the 4 time that either • Software code signing and/or automatic update infrastructure has been compromised • Stuxnet, Duqu, Flame, Adobe Microsoft deserves kudos compared to companies like Adobe Code signing is broken Hack Automatic updates is fool me! hardy © 2012 Monterey Technology Group Inc.
  • 13. Strategic The solution Complain to vendors Keep your AV healthy Take control of software distribution and updates Prevent unvetted software from running no matter who has signed it © 2012 Monterey Technology Group Inc.
  • 14. Strategic Take control of software distribution and updates You cannot trust automatic updates • Not too mention all their other problems Software patching commandments There is not substitute for application white-listing © 2012 Monterey Technology Group Inc.
  • 15. Strategic  Software patching commandments 1. Thou shalt not depend on vendor automatic updaters 2. Thou shalt not allow patch/installation based on code-signing certificates 3. Thou shalt control which patches go down and when 4. Thou shalt be able to deploy patches within hours 5. Thou shalt be able to deploy patches in phases 6. Thou shalt not be blind to patch deployment status 7. Thou shalt patch software from multiple vendors 8. Thou shalt patch applications on all your operating systems © 2012 Monterey Technology Group Inc.
  • 16. Strategic  There is not substitute for application white listing Stuff is going to get past AV You can no longer depend on code signatures You must prevent new, unknown software from executing • Users are too dumb to not run malware • Malware evolving too fast • APTs too sophisticated • Can’t trust software vendors • Don’t fall for the “unlikely you are the one being targeted” line • Problems aren’t going away anytime soon  Only going to get worse © 2012 Monterey Technology Group Inc.
  • 17. Bottom Line  Install the new updates from Adobe  Setup rules for the bad known  Watch my blog or social media feeds  Keep an eye on http://forums.adobe.com/community/certificate?vi ew=discussions  Check your AV  Hang on tomorrow  Going forward Take control of patching Implement software restrictions, AppLocker or intelligent white listing © 2012 Monterey Technology Group Inc.
  • 18. Brought to you by www.lumension.com Speaker  Russ Ernst – Group Product Manager
  • 19. Defense-in-Depth Strategy Successful risk mitigation starts AV with a solid vulnerability manage- Control the Bad ment foundation, augmented by Device Control additional layered defenses which Control the Flow go beyond the traditional blacklist approach. HD and Media Encryption Control the Data Application Control Control the Gray Patch and Configuration Management Control the Vulnerability Landscape 19
  • 20. Defense-in-Depth with Intelligent Whitelisting Known Unknown Unwanted, Application Configuration Malware Malware Unlicensed, Vulnerabilities Vulnerabilities Unsupported applications AntiVirus X X Application X X Control Patch & X X Remediation Security Configuration X Management
  • 21. More Information • Free Security Scanner Tools • Get a Quote (and more) » Application Scanner – discover all the apps http://www.lumension.com/ being used in your network intelligent-whitelisting/buy-now.aspx#7 » Vulnerability Scanner – discover all OS and application vulnerabilities on your network » Device Scanner – discover all the devices being used in your network http://www.lumension.com/Resources/ Security-Tools.aspx • Lumension® Intelligent Whitelisting™ » Online Demo Video: http://www.lumension.com/Resources/ Demo-Center/Endpoint-Security.aspx » Free Trial (virtual or download): http://www.lumension.com/ intelligent-whitelisting/free-trial.aspx 21