SlideShare une entreprise Scribd logo
1  sur  14
AURORA ZERO DAY  EXPLOIT OVERVIEW Providing Comprehensive Systems and Network Security http://www.locked.com  (877) 744-3444 Mission Critical Systems, Inc. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Important terminology for this discussion.. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Aurora Internet Explorer Zero-Day Attack The Aurora attacks leveraged a combination of previously unknown vulnerabilities  in Internet Explorer (IE6, IE7, and IE8) on Windows (XP, Vista, and 7) – as well as nearly a dozen pieces of malware and several levels of encryption to burrow deeply into company networks and obscure their activity.  As early as December 2009, emails containing links to malicious websites which exploited this vulnerability were sent to Google, Adobe, and approximately 30 other companies in a spearphishing attack.  When users clicked on the links, a piece of exploit code on the web site attacked the vulnerability and installed an initial infection of malware onto the users machine.  www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Aurora Internet Explorer Zero-Day Attack Once the malware was installed on the machine, additional malicious code was downloaded.  One of the malicious programs established an encrypted SSL connection to the hackers network. This remote backdoor allowed the hacker unfettered and undetectable access to the users machine. This allowed the attackers ongoing access to the computer and to use it as a “beachhead” into other parts of the network to search for login credentials, intellectual property and whatever else they were seeking. It is believed that the attackers were targeting source-code repositories of many of the companies and succeeded in reaching their target in many cases. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Aurora Internet Explorer Zero-Day Attack The Aurora attach is an example of an Advanced Persistent Threat : •  Advanced  means the adversary can operate in the full spectrum of computer intrusion. •  Persistent  means the adversary is formally tasked to accomplish a mission. •  Threat  means the adversary is not a piece of mindless code. Since the code is now publicly available, we expect the number of attacks of this type will grow with time. It is also expected that the next wave of attacks to come from cybercriminals whose techniques are equally sophisticated, but whose motives are somewhat different. They will most certainly be hunting for data, but it will be for monetary gain rather than information gathering. Essentially, the attack is ongoing.  www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Aurora Internet Explorer Risk by Platform DEP =  Data Execution Prevention (DEP) is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system.  The primary benefit of DEP is to help prevent code execution from data pages. Typically, code is not executed from the default heap and the stack. Hardware-enforced DEP detects code that is running from these locations and raises an exception when execution occurs. Software-enforced DEP can help prevent malicious code from taking advantage of exception-handling mechanisms in Windows. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Attack Timeline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Video of the Exploit in Action www.locked.com 877-744-3444 © 2009 Mission Critical Systems.  Courtesy McAfee : http://www.youtube.com/watch?v=53Yv-xAdstc
Anti-Virus is not enough ! ,[object Object],[object Object],[object Object],[object Object],As of January 21, only 25% of AV vendors tracked protect against the payload according to    www.virustotal.com   www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
- IE is not the only vulnerable application - Vulnerabilities are constantly being discovered ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Exploit Packs Hackers are sharing code and tools. ‘Exploit packs’ suggest a new level of sophistication in attacks and drive-by malware downloads. These are basically packed exploits that intelligently chooses exploits based on the client’s browser, search for vulnerable applications, and then exploit them with the proper exploit. So now its not good enough to just update Internet Explorer. All you apps better be patched, or have alternative protection measures in place.  The window to remediate is growing smaller and the bad guys are getting faster. Its getting tough out there.. Businesses have to adapt to these ever changing threats   www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Solutions.…  Desktop Anti-Virus  ( Symantec ,  McAfee ) –  Host protection is an absolute must, but not necessarily a good FIRST line of defense. Anti-Virus products rely on anti-virus signatures to detect the PAYLOAD – not the exploit used to deliver the payload. You can have thousands of signatures over the course of the exploit.  Vulnerability Scanners  ( eEye ,  Symantec Enterprise Security Manager ,  McAfee  Vulnerability Manager )  – useful for determining what machines are un-patched, but offers no real time protection. DLP  ( Vontu ,  Websense ,  RSA )  – Data Loss Prevention could allow companies to prevent the theft and leakage of confidential data and code, but would not prevent the initial infection or owning of the machines. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Solutions (continued).…  IPS   ( Tipping Point ,  Check Point ,  McAfee )  - Requires a signature update to detect the exploit, but these offer proactive protection against different varieties of payloads. IPS companies are usually given advanced notice of an exploit before announced to the public, making them a good line of defense.  Host IPS  ( McAfee ,  Symantec ,  eEye ) –  Host IPS is an excellent tool for preventing unknown exploits from taking advantage of vulnerabilities, as they are looking for specific behaviors. HIPS complements traditional signature and heuristic antivirus detection methods, since it does not need continuous updates to stay ahead of new malware. Many Anti-Virus packages offer HIPS as an upgrade.  Gateway HTTP and HTTPS Inspection  ( Websense Security Gateway ,  McAfee WebWasher ) -  Gateway Security products are one of the best ways to protect yourself, as they combine Anti-Virus, URL Filtering, and Exploit Protection in a single product. For example, Websense provided its customers of Web Security Gateway with zero day protection from this attack before it began in December (actually the protection mechanisms stopped it as of January 2009.  By correlating spam (Phishing attacks) with malicious links, infected websites, payload delivery sites, as well as exploit/vulnerability protection and antivirus, they were able to determine the attack and block access. They provide inbound inspection for viruses, malicious code, as well as standard URL filtering for HTTP, HTTPS, and FTP.  www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
Questions? Providing Comprehensive System and Network Security http://www.locked.com  Mission Critical Systems (877)744-3444 www.locked.com 877-744-3444 © 2009 Mission Critical Systems.

Contenu connexe

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

En vedette

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Aurora Internet Explorer Zero Day Attack

  • 1. AURORA ZERO DAY EXPLOIT OVERVIEW Providing Comprehensive Systems and Network Security http://www.locked.com (877) 744-3444 Mission Critical Systems, Inc. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 2.
  • 3. Aurora Internet Explorer Zero-Day Attack The Aurora attacks leveraged a combination of previously unknown vulnerabilities in Internet Explorer (IE6, IE7, and IE8) on Windows (XP, Vista, and 7) – as well as nearly a dozen pieces of malware and several levels of encryption to burrow deeply into company networks and obscure their activity. As early as December 2009, emails containing links to malicious websites which exploited this vulnerability were sent to Google, Adobe, and approximately 30 other companies in a spearphishing attack.  When users clicked on the links, a piece of exploit code on the web site attacked the vulnerability and installed an initial infection of malware onto the users machine. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 4. Aurora Internet Explorer Zero-Day Attack Once the malware was installed on the machine, additional malicious code was downloaded. One of the malicious programs established an encrypted SSL connection to the hackers network. This remote backdoor allowed the hacker unfettered and undetectable access to the users machine. This allowed the attackers ongoing access to the computer and to use it as a “beachhead” into other parts of the network to search for login credentials, intellectual property and whatever else they were seeking. It is believed that the attackers were targeting source-code repositories of many of the companies and succeeded in reaching their target in many cases. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 5. Aurora Internet Explorer Zero-Day Attack The Aurora attach is an example of an Advanced Persistent Threat : •  Advanced means the adversary can operate in the full spectrum of computer intrusion. •  Persistent means the adversary is formally tasked to accomplish a mission. •  Threat means the adversary is not a piece of mindless code. Since the code is now publicly available, we expect the number of attacks of this type will grow with time. It is also expected that the next wave of attacks to come from cybercriminals whose techniques are equally sophisticated, but whose motives are somewhat different. They will most certainly be hunting for data, but it will be for monetary gain rather than information gathering. Essentially, the attack is ongoing.  www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 6. Aurora Internet Explorer Risk by Platform DEP = Data Execution Prevention (DEP) is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system. The primary benefit of DEP is to help prevent code execution from data pages. Typically, code is not executed from the default heap and the stack. Hardware-enforced DEP detects code that is running from these locations and raises an exception when execution occurs. Software-enforced DEP can help prevent malicious code from taking advantage of exception-handling mechanisms in Windows. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 7.
  • 8. Video of the Exploit in Action www.locked.com 877-744-3444 © 2009 Mission Critical Systems. Courtesy McAfee : http://www.youtube.com/watch?v=53Yv-xAdstc
  • 9.
  • 10.
  • 11. Exploit Packs Hackers are sharing code and tools. ‘Exploit packs’ suggest a new level of sophistication in attacks and drive-by malware downloads. These are basically packed exploits that intelligently chooses exploits based on the client’s browser, search for vulnerable applications, and then exploit them with the proper exploit. So now its not good enough to just update Internet Explorer. All you apps better be patched, or have alternative protection measures in place. The window to remediate is growing smaller and the bad guys are getting faster. Its getting tough out there.. Businesses have to adapt to these ever changing threats www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 12. Solutions.… Desktop Anti-Virus ( Symantec , McAfee ) – Host protection is an absolute must, but not necessarily a good FIRST line of defense. Anti-Virus products rely on anti-virus signatures to detect the PAYLOAD – not the exploit used to deliver the payload. You can have thousands of signatures over the course of the exploit. Vulnerability Scanners ( eEye , Symantec Enterprise Security Manager , McAfee Vulnerability Manager ) – useful for determining what machines are un-patched, but offers no real time protection. DLP ( Vontu , Websense , RSA ) – Data Loss Prevention could allow companies to prevent the theft and leakage of confidential data and code, but would not prevent the initial infection or owning of the machines. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 13. Solutions (continued).… IPS ( Tipping Point , Check Point , McAfee ) - Requires a signature update to detect the exploit, but these offer proactive protection against different varieties of payloads. IPS companies are usually given advanced notice of an exploit before announced to the public, making them a good line of defense. Host IPS ( McAfee , Symantec , eEye ) – Host IPS is an excellent tool for preventing unknown exploits from taking advantage of vulnerabilities, as they are looking for specific behaviors. HIPS complements traditional signature and heuristic antivirus detection methods, since it does not need continuous updates to stay ahead of new malware. Many Anti-Virus packages offer HIPS as an upgrade. Gateway HTTP and HTTPS Inspection ( Websense Security Gateway , McAfee WebWasher ) - Gateway Security products are one of the best ways to protect yourself, as they combine Anti-Virus, URL Filtering, and Exploit Protection in a single product. For example, Websense provided its customers of Web Security Gateway with zero day protection from this attack before it began in December (actually the protection mechanisms stopped it as of January 2009.  By correlating spam (Phishing attacks) with malicious links, infected websites, payload delivery sites, as well as exploit/vulnerability protection and antivirus, they were able to determine the attack and block access. They provide inbound inspection for viruses, malicious code, as well as standard URL filtering for HTTP, HTTPS, and FTP. www.locked.com 877-744-3444 © 2009 Mission Critical Systems.
  • 14. Questions? Providing Comprehensive System and Network Security http://www.locked.com Mission Critical Systems (877)744-3444 www.locked.com 877-744-3444 © 2009 Mission Critical Systems.