Go Back   SZONE.US Forums > Do it yourself (DIY) > Web Tips > Web Findings

Web Findings Here you will find information about the internet.

What does the payoff in the Finale look like?

Views:1252
Reply
Thread Tools Search this Thread Rate Thread
  #1  
Unread 06.05.15, 06:52 PM
Zachariah Boren's Avatar
Zachariah Boren Zachariah Boren is offline
Administrator
 
Join Date: 02.07
Location: Canoga Park, CA
Posts: 928
Blog Entries: 6
Images: 10075
Send a message via ICQ to Zachariah Boren Send a message via MSN to Zachariah Boren Send a message via twitter to Zachariah Boren
What does the payoff in the Finale look like?

06.05.15 03:29 AM

The seventh stage is the crowning glory of the attack kill chain and depending on the motive the attacker is usually keen to get to the data theft stage. In general, the previous stages help the attacker reach their objective. Attackers are known to go to great lengths to cover their tracks in order to reach this stage. In some cases, attackers have been known to lurk in the network for months or years before exfiltrating large quantities of data. Attackers are definitely getting craftier and more sophisticated. Also, when it comes to insider threats, the first six stages of the attack kill chain could be optional because the privileged malicious insider already has some level of access in the environment.



Data theft can be for purposes of blackmail, espionage, economic gain, and more. The data that is stolen can be financial data (such as credit card numbers, bank account credentials), personal data that can further be used for profit (SSN, DOB, etc.), credentials, private keys and passwords, medical records, intellectual property (source code, trade secrets, etc.), the list goes on. Each data breach is different because the motives of the attackers vary. In general, unless the attacker failed at their objective or the objective is pure destruction, it is safe to say that some form of data theft can be assumed in a breach.



An interesting question is, where does all this stolen data end up? It could remain with the attacker perpetually, as would likely be the case with nation state attackers and other sophisticated attackers. However, vast amounts of data end up in the underground community for sale, or sometimes even in the public domain as an example of the loot.



The following example showcases a recent dump of personally identifiable information (PII) that includes names, addresses, phone numbers, dates of birth, and credit card numbers, along with their CVV and expiration dates.





Remember the Sony Pictures Entertainment hack from last year? The attackers dumped hundreds of gigabytes of confidential data in the public domain, resulting in a great deal of financial and reputation loss. In addition, they also stole private keys . Private keys are highly sensitive and used in SSL / TLS, SSH, and other encrypted connections used for secure communication. There are different kinds of private keys, for example PuTTY .ppk keys and PKCS #12 files.






An excerpt from the list of files stolen from Sony Pictures Entertainment in the November 2014 hack, showing the .ppk private key files



If that's not scary enough, credentials are always valuable to an intruder either to gain additional access or for financial gain. In Linux, the basic files that store that information are the "passwd" and "shadow" files. Their equivalent in Windows is the SAM DB. All three files store usernames and hashed passwords in different but specific formats that allow a data security system to identify them as such using a regular expression.



Example of a Security Account Manager (SAM) database file in a Windows systems that stores users' passwords in a hashed format, either as a LM hash or as an NTLM hash



Once the hackers obtain hashed passwords, they can crack them using brute force or wordlists. Password cracking tools are available free online, in addition to tools such as "John the Ripper" and "RainbowCrack," which generates rainbow tables.



The above example shows the output of a SAM file run through “John the Ripper”. The simple passwords such as “ROOT” and “1234” were broken in seconds. The administrator’s password was only partially broken because the run was stopped manually very quickly.



Many other sensitive files that are not directly covered by regulations such as HIPAA or PCI are accessed and stolen by hackers. Configuration files and Process Information can also be very valuable to an attacker. Hence, being compliant does not mean that breaches will not occur. Rather, compliance is only a part of the risk mitigation process.




Data theft is the end-game of a lot of cyber-attacks. The data theft stage completes the attack kill chain. With insufficient security defenses, cybercriminals can steal intellectual property, PII, and other valuable data for financial gain and for use in other attacks. Yet even at this stage there are defenses to keep confidential data safe. Websense® TRITON® AP-DATA offers Data Loss Prevention (DLP) and Data Theft Prevention (DTP). A proper risk mitigation strategy, starting with identification of the assets to be protected combined with acceptance of the residual risk, goes a long way in raising the bar for the attackers. The payoff in the finale certainly looks attractive to the attackers and efforts to raise the bar will certainly help reduce the risk.



Primary contributor: Amit Nitzan



Other: Sindyan Bakkal








http://community.websense.com/blogs/...look-like.aspx
Reply With Quote
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Rate This Thread
Rate This Thread:



All times are GMT -8. The time now is 01:55 AM.


Powered by vBulletin® Version 3.8.5
Copyright ©2000 - 2020, Jelsoft Enterprises Ltd.
Copyright 2007 - 20017 SZONE.US All rights reserved