securing organizational credentials - internet2 · 2019-03-27 · securing organizational...

28
Securing Organizational Credentials: New and Pervasive Cyber-Threats PRESENTER NAME: Kim Milford Executive Director, REN-ISAC

Upload: others

Post on 19-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

Securing Organizational Credentials:New and Pervasive Cyber-Threats

PRESENTER NAME: Kim MilfordExecutive Director, REN-ISAC

Page 2: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 2 ]

THREATS

Page 3: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 3 ]

Page 4: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 4 ]

Ransomware

Page 5: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 5 ]

Business Email Compromise

Page 6: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 6 ]

Page 7: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 7 ]

REN-ISAC CSIRT Notifications, 12/31/2018

0 200 400 600 800 1000 1200 1400 1600 1800 2000

Dorkbot, 2015

Nivdort, 2016

Pushdo, 2007

Fleercivet, 2014

Kelihos, 2010

ZeroAccess, 2013

Ponmocup, 2006

Gozi, 2013

Bedep, 2015

Conficker, 2008

Page 8: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 8 ]

CSIRT STATISTICS, 2018 COMPARED TO 2016

Page 9: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 9 ]

STOLEN CREDENTIALS

Page 10: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 10 ]

Stolen Credentials Used for Exfiltration

Page 11: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 11 ]

Page 12: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 12 ]

Page 13: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 13 ]

Page 14: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 14 ]

IMPACT

Page 15: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 15 ]

Page 16: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 16 ]

Password Dump Cleanup

Parse out old domain names

Run the list through a macro to see if the password composition meets

current (enforced) password policy.

Feed surviving credentials into a script that checks against current authoritative

credential store.

Reset passwords on at-risk/exploited credentials and notify users

Page 17: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 17 ]

Page 18: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 18 ]

• Underreported• If reported at all, generally a long delay• Risk is uncertain, depends on circumstances

– Requires additional analysis

Stolen Credentials

Page 19: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 19 ]

MITIGATION

Page 20: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 20 ]

Training and Education

Page 21: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 21 ]

Two Factor Authentication

Page 22: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 22 ]

Page 23: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 23 ]

Modlishka

Page 24: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 24 ]

MITM Mitigation

• User education• U2F tokens• Password managers• Limit exposure, e.g, short timeouts for tokens• Phishing page detection, e.g. Chrome extension• Site authentication to the user• Reduce the life of user accounts

Page 25: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 25 ]

Student Lifecycle

0

1

2

3

4

5

6

Application Admission Enrollment

Student Accounts Granted

Page 26: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 26 ]

Student Lifecycle

- Account disabled after 2 consecutive semesters of non-enrollment- Account disabled 6 months after last enrolled semester, OnTrack account

disabled 1 year after last enrolled semester - Deactivated one term after student was last eligible to register, deleted

one term after that - Access retained for "things like unofficial transcripts and academic and

employment information"; email deactivated after no attendance for a year

- Access retained for "things like unofficial transcripts and academic and employment information"; email deactivated after no attendance for a year

Page 27: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 27 ]

References• 2018 Verizon Data Breach Investigations Report

– https://enterprise.verizon.com/resources/reports/dbir/

• 2015 DHS Intelligence Assessment on Research and Education (R&E)– https://intellihub.com/wp-content/uploads/2015/02/DHS-UniversityCyberThreats.pdf

• March 2019: Wall Street Journal “Chinese Hackers Target Universities in Pursuit of Maritime Military Secrets”

• FireEye Threat Report: APT40 Examining a China-Nexus Espionage Actor– https://www.fireeye.com/blog/threat-research/2019/03/apt40-examining-a-china-nexus-

espionage-actor.html

• https://haveibeenpwned.com/

Page 28: Securing Organizational Credentials - Internet2 · 2019-03-27 · Securing Organizational Credentials: New and Pervasive Cyber -Threats. PRESENTER NAME: Kim Milford. Executive Director,

[ 28 ]