security pitfalls - home : security and privacylistically cyber security & safety risks...

30
Security Pitfalls A review of recurring failures Dr. Dominik Herrmann Download slides at https://dhgo.to/pitfalls

Upload: others

Post on 14-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

SecurityPitfallsAreviewofrecurringfailures

Dr.DominikHerrmann

Downloadslidesathttps://dhgo.to/pitfalls

Page 2: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

For common Internet Crime Schemes see http://www.ic3.gov/crimeschemes.aspx 2

Researchonsecurity,privacy,onlinetracking,forensics.

Postdocresearcher UniversityofHamburg

Temporaryprofessor UniversityofSiegen

JuniorFellow GermanInformaticsSociety

Page 3: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Mediareportsaboutsecurityrevolvearoundfear,uncertainty,anddoubt.

3

Page 4: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Manyvulnerabilitiescouldbeavoided,ifvendorsfollowedbestpracticesandsecuritymanagementstandards.

4https://www.enisa.europa.eu/activities/Resilience-and-CIIP/smart-infrastructures/intelligent-public-transport/good-practices-recommendations/at_download/fullReport

Page 5: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Problem:Bestpracticesareoftenabstractandoforganizationalnature.

5https://www.enisa.europa.eu/activities/Resilience-and-CIIP/smart-infrastructures/intelligent-public-transport/good-practices-recommendations/at_download/fullReport

integratecybersecurityincorporategovernance

implementastrategy addressingho-listically cybersecurity&safetyrisks

implementriskmgmt. forcybersecu-rity inmulti-stakeholderenvironmentsincl.contractorsanddependencies

clearlyandroutinelyspecifytheircybersecurityrequirements

annuallyreviewcybersecurityprocess-es,practicesandinfrastructures

createproducts/solutions thatmatchthecybersecurityrequirements ofend-users

collaborateinthedevelopmentofIPT-specificstandards andapplythemtoIPTsolutions

developatrustedinformationsharingplatform onrisksandvulnerabilities

providesecurityguidance forsystems,productsandsolutions

OPERATORS MANUFACTURERS

Page 6: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Asmoreandmoredataisstoredandprocessed,securingdataagainstattacksbecomesmoreimportant.

https://www.schneier.com/blog/archives/2016/09/organizational_1.html 6

availabilityconfidentiality

integrity

RANSOMWAREDATALEAKS

ORGANIZATIONALDOXING

DATAMANIPULATION

Page 7: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

7

TheClassicalEngineeringPerspective

PROACTIVESECURITY

Page 8: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

8

Weakness1: Outofsight,outofmind

Page 9: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Exploitingknownvulnerabilitiesisstillaverysuccessfulattackvector.Vendorsandusersfailtopatchtheirsoftwareinatimelymanner.

http://www.wired.co.uk/news/archive/2016-04/06/panama-papers-mossack-fonseca-website-security-problems 9

Mossack FonsecaranoldOutlookWebAccess(2009),Drupal(2013,25vulns)

Heartbleed (2014)128kvulnerabledevicesin9/2016

Page 10: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

http://bc.ctvnews.ca/security-flaw-lets-smartphone-users-hack-transit-gates-1.2852464 10

UltraReset attackonMiFare Ultralight(NewJersey&SanFrancisco,2012)…stillworksin2016(Vancouver)

Page 11: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

11Weakness2: Foolswithtools…don’tknowtheirtrade

Page 12: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Duetounawareness,carelessness,andhaste,vendorsshipproductswithembarrassingsecurityholes,forinstanceinuserauthentication.

http://heise.de/-3248831and http://heise.de/-3308004 12

ABUS,Blaupunkt,Lupusalarmsystems(2016):

insecuredefaultpasswordscanbedisabledwithoutthePIN

also:Loxone SmartHome (2016)

Page 13: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Manyindustriesarecurrentlylearninghowtodosecurityproperly.

http://www.hotforsecurity.com/blog/vulnerability-in-vaillant-heating-systems-allows-unauthorized-access-5926.html 13

Vaillant heatings (2015):

authenticationandpasswordcheckperformedbyaJavaappletintheuser’sbrowser

Page 14: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

14Weakness3: Underestimatingtheadversary

Page 15: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Insecuredesignsresultfromsoftwaredevelopersmakingpoordecisionsbecauseofwrongassumptions.

http://www.forbes.com/sites/thomasbrewster/2015/02/02/bmw-door-hacking/ 15

BMWConnectedDrive (2015)

– allcarsusedthesamecryptographickey

– communicationwithBMWserverswasnot protected

Impact: cardoorscouldbeunlockedbysendingafakedSMStothecar

Page 16: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Insecuredesignsresultfromsoftwaredevelopersmakingpoordecisionsbecauseofwrongassumptions.

16

BMWConnectedDrive (2015)

– allcarsusedthesamecryptographickey

– communicationwithBMWserverswasnotprotected

Impact: cardoorscouldbeunlockedbysendingafakedSMStothecar

“Nooneisableto…”– reverseengineerthehard-warewherethekeyisstored

– setupafakeGSMnetworktosendanSMStothecar

Page 17: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Insecuredesignsresultfromsoftwaredevelopersmakingpoordecisionsbecauseofwrongassumptions.

17

BMWConnectedDrive (2015)

– allcarsusedthesamecryptographickey

– communicationwithBMWserverswasnotprotected

Impact: cardoorscouldbeunlockedbysendingafakedSMStothecar

Researchersjustdidit.– reverseengineerthehard-warewherethekeyisstored

– setupafakeGSMnetworktosendanSMStothecar

Page 18: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Insecuredesignsresultfromsoftwaredevelopersmakingpoordecisionsbecauseofwrongassumptions.

http://fortune.com/2016/08/11/volkswagen-car-remote-warning/ 18

Page 19: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

19

Weakness4: Outsourcingsecuritytovendors……cangetoutofhandquickly

Page 20: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

TheRFIDticketsusedforpublictransportinBerlinstoredthelast10waypoints,whichcouldbeusedtocreatepersonallocationprofilesofcommuters.

http://glm.io/118226 20

– operatorsdeniedtheleakuntilprovenwrong– claimedthattrackingwasenabledbyvendor

withouttheirknowledge

Page 21: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

21

Weakness5: SocialEngineering

Page 22: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

High-profilefraudsheavilyrelyonsocialengineering.

http://www.securityweek.com/austrian-firm-fires-ceo-after-56-million-cyber-scamhttps://www.leoni.com/en/press/releases/details/leoni-targeted-by-criminals/ 22

“FakePresidentFraud”

also:“SpearPhishing”

Page 23: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Consumershaveprivacyrights,e.g.toaccessanddeletetheirpersonaldata.Handlingrequestsisveryfrustratingforconsumersandvendors.

http://arxiv.org/abs/1602.01804 23

Weconductedafieldstudywith150appsand120websites.

Evenafterthesecondmailonly 1in2vendorscomplied.

1in4websiteownerscouldbetrickedintosendingthedatatoadifferent e-mailaddress.

Mostvendorsdeletedouraccountswithoutpriorconfirmation.

Page 24: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

24

AMoreRecentApproach

REACTIVESECURITY

TheClassicalEngineeringPerspective

PROACTIVESECURITY

Page 25: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Itisdifficulttotrackdownproficientadversaries.

https://bitcoin.org,https://torproject.org 25

anonymizedcommunications

cryptographiccurrencies

Page 26: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

26

notallhackersareequal

intrusiondetection

emergencyprotocols

3CONSIDERATIONSFORREACTIVESECURITY

findanomalies(logging&audits)

operationsandcommunications

blackhats vs.whitehats

Page 27: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Vendorsoftenmisstheopportunitytocollaboratewithsecurityresearchers.

https://www.schneier.com/blog/archives/2013/08/scientists_bann.html 27

opportunityforvendorsbugsuncoveredbythesecuritycommunity

Page 28: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Vendorsoftenmisstheopportunitytocollaboratewithsecurityresearchers.

https://www.cnet.com/news/judge-orders-halt-to-defcon-speech-on-subway-card-hacking/ 28

opportunityforvendorsbugsuncoveredbythesecuritycommunity

Page 29: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Asaresultthereisaflourishingblackmarketforsecurityvulnerabilities.Inresponse,thesoftwareindustryhasstartedtosetupbugbountyprograms.

29

opportunityforvendorsbugsuncoveredbythesecuritycommunity

blackmarketforzero-dayexploits

whitemarketbugbountyprograms

Page 30: Security Pitfalls - Home : Security and Privacylistically cyber security & safety risks implement risk mgmt. for cybersecu-rity in multi-stakeholder environments incl. contractors

Considerattacksonconfidentiality,integrity,andavailableofyour(customers’)data.

Learnfromattacksonothersandavoidcommonmistakesinproactivemeasures.

Preparetoreacttosecurityincidentsandcollaboratewiththesecuritycommunity.

1

2

3

TAKE-AWAYMESSAGES

SecurityPitfalls

[email protected]:https://dhgo.to/pitfalls