SlideShare a Scribd company logo
© 2014 Imperva, Inc. All rights reserved.
Bleeding Servers – How Hackers
Are Exploiting Known Vulnerabilities
Confidential1
Terry Ray, VP of Global Security Engineering, Imperva
© 2014 Imperva, Inc. All rights reserved.
Agenda
Confidential2
§  Latest Verizon Data Breach Investigation
Report (DBIR) Stats
§  Examining Vulnerabilities and Exploits
§  HeartBleed Deep-Dive
§  Understanding Data Theft
§  Mitigating HeartBleed and CVEs
© 2014 Imperva, Inc. All rights reserved.
Terry Ray, VP of Global Security Engineering
Confidential3
§  Speaker at Industry Events
•  ISSA, IANS, ISACA, Gartner, RSA
§  Designed and deployed data security solutions
for hundreds of customers in various verticals
including:
•  Healthcare
•  Oil and gas
•  Financial services
•  Government
•  eCommerce
§  Lectured on various network and data security
topics and taught numerous security courses in
over 35 countries globally
© 2014 Imperva, Inc. All rights reserved.
Latest Breach Statistics
Confidential4
Yay! A New Verizon DBIR to Talk About
© 2014 Imperva, Inc. All rights reserved.
The Big Winners
Confidential5
© 2014 Imperva, Inc. All rights reserved.
The Big Winners
Confidential6
© 2014 Imperva, Inc. All rights reserved.
The Big Winners
Confidential7
© 2014 Imperva, Inc. All rights reserved.
The Big Winners
Confidential8
© 2014 Imperva, Inc. All rights reserved.
Actual Data Loss – Breach vs Incident
Confidential9
© 2014 Imperva, Inc. All rights reserved.
Who’s Attacking – Hactivists vs Criminals
Confidential10
§  “Greed takes a back seat to ideology when it comes to
web app attacks in the 2013 dataset”
§  “74% [of ideology motivated attacks] focus on tried and
true exploits”
•  Adobe PDF with embedded exe – 4 years old
•  Microsoft server stack corruption – 6 years old
•  Microsoft RPC DCOM bug—or MS03-026 – a staggering 10 years
old—you might remember it as Blaster
•  All still in the wild
© 2014 Imperva, Inc. All rights reserved.
How You Find Out That You’ve Been Hacked
Confidential11
§  Financially motivated – discovered by customers
§  Hactivists – discovered by external sources
•  “uhh, hey guys, did you know that your webserver is
attacking us”
§  But we’re getting better at detecting breaches
ourselves
•  9%
© 2014 Imperva, Inc. All rights reserved.
CVEs Explored
Confidential12
© 2014 Imperva, Inc. All rights reserved.
Stay On Top of Vulnerabilities
Confidential13
§  The Common Vulnerabilities and Exposures (CVE)
system provides a reference-method for publicly known
information-security vulnerabilities and exposures.
§  http://cve.mitre.org/cve/
© 2014 Imperva, Inc. All rights reserved.
Classic Web Site Hacking
Confidential14
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Single Site Attack
© 2014 Imperva, Inc. All rights reserved.
Classic Web Site Hacking
Confidential15
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Multiple Site Attacks
© 2014 Imperva, Inc. All rights reserved.
Exploit Hacking
Confidential16
Hacking
1.  Identify CVE
2.  Weaponize Vulnerability
3.  Exploit
Vulnerability Targeting
Attack
© 2014 Imperva, Inc. All rights reserved.17
The Attacker’s Focus
Server Takeover
Direct Data Theft
Confidential
Source: http://www.mediabistro.com/fishbowldc/suspended-politico-scribe-hacked_b76882
Source: http://www.connectmidmissouri.com/news/story.aspx?id=600968
© 2014 Imperva, Inc. All rights reserved.
HeartBleed
Confidential18
Source: http://thequestionconcerningtechnology.blogspot.com/
© 2014 Imperva, Inc. All rights reserved.
What Is It and Why Do We Care?
Confidential19
§  The Heartbleed Bug is a serious vulnerability in the
popular OpenSSL cryptographic software library.
§  When it is exploited it leads to the leak of memory
contents from the server to the client and from the client
to the server.
§  According to Netcraft's April 2014 Web Server Survey of
958,919,789 websites, the combined market share of
Apache and nginx products on the Internet was over
66%.
© 2014 Imperva, Inc. All rights reserved.
But There’s a Patch, Right?
Confidential20
§  This vulnerability was first included in OpenSSL release
1.0.1 on 14th of March 2012. OpenSSL 1.0.1g released
on 7th of April 2014 fixes the issue
§  Affected Systems: OpenSSL versions 1.0.1 to 1.0.1f
© 2014 Imperva, Inc. All rights reserved.
Isn’t It Hard to Exploit?
Confidential21
Metasploit: Easy as pulling a trigger.
Source: http://www.smosh.com/smosh-pit/lists/12-monkeys-guns
© 2014 Imperva, Inc. All rights reserved.
Here, We Have a Secure Website
Confidential22
© 2014 Imperva, Inc. All rights reserved.
Fire Up a VM of Kali Linux and Try It Out
Confidential23
© 2014 Imperva, Inc. All rights reserved.
And We Have Leaked Data
Confidential24
© 2014 Imperva, Inc. All rights reserved.
So How Bad Is It?
Confidential25
© 2014 Imperva, Inc. All rights reserved.
How Bad Can It Really Get?
Confidential26
© 2014 Imperva, Inc. All rights reserved.
Retrieved Private Key
Confidential27
© 2014 Imperva, Inc. All rights reserved.
What Can We Do With This?
Confidential28
§  Steal session details and spoof users
§  Steal username and passwords
§  Steal cryptographic keys
•  Man-in-the-middle attacks
•  Spoofed website with valid SSL keys
•  Spear Phishing Attack
© 2014 Imperva, Inc. All rights reserved.
Data Theft
Confidential29
© 2014 Imperva, Inc. All rights reserved.
An Overlooked Data Security Risk
Confidential30
Databases and file servers, both repositories of
so much valuable information, are targeted
regularly…
Admins unknowingly
make unsupported
database changes.
Malware-compromised
insiders access the
database.
Unpatched vulnerabilities
allow exploit vectors.
2014 Verizon Data Breach Investigations Report
© 2014 Imperva, Inc. All rights reserved.
Protecting Your Data
Confidential31
§  “the high number of incidents still offers some insight …
where the victim’s anti-virus (AV) and intrusion prevention
system (IPS) shields could not repel firepower of that
magnitude”
© 2014 Imperva, Inc. All rights reserved.
Enterprise Security Is Evolving
Confidential32
1st pillar:
Endpoint Security
Blocks threats
targeting devices
2nd pillar:
Network Security
Blocks threats trying to
access the network
3rd pillar:
Data Center Security
Protects high-value
targets, keeping them
both secure and
accessible
Imperva provides the third pillar of enterprise security
© 2014 Imperva, Inc. All rights reserved.
Mitigation
Confidential33
Protecting Your Data From Known Vulnerabilities
© 2014 Imperva, Inc. All rights reserved.
Heartbleed Specific
Confidential34
§  Test all servers for vulnerability
§  Patch all affected servers
§  Reissue new certificates
§  Revoke all old certificates
Source: http://www.secnews.gr/archives/78340
© 2014 Imperva, Inc. All rights reserved.
Locate and Assess Servers and Apps
3535
§  Scan your network to identify all assets (cloud and
local)
•  Classify assets by information and brand sensitivity to identify
high risk landscapes
•  Prioritize efforts based on risk levels
§  Secure Database Access
•  Scan DBs for vulnerabilities or configuration flaws
•  Remove any default or unnecessary user accounts
•  Disable unneeded services
© 2014 Imperva, Inc. All rights reserved.
Perform Vulnerability Assessments
3636
§  Perform Vulnerability Assessments
•  Scan both Network and Application Layers
•  Scan all known Web Assets
•  Scan Concurrently and Continuously
•  Analyze application functionality for DDoS attack potential
and Business Logic based exploits
•  Implement assessment practice across the entire SDLC
Design" Development" QA" Production"
© 2014 Imperva, Inc. All rights reserved.
Block Web Attacks and Attack Sources
Web attacks like SQL injection, cross-site
scripting, directory traversal, and CSRF
HTTP protocol violations like extremely long
URLs and malformed Apache URI messages
Malicious sources that have attacked other sites
Known desktop scanners and hacker tools like
Nikto and Paros based on user agent or the
frequency of security violations
37
© 2014 Imperva, Inc. All rights reserved.
Webinar Materials
38
Post-Webinar
Discussions
Answers to
Attendee
Questions
Webinar
Recording Link
Join Group
Join Imperva LinkedIn Group,
Imperva Data Security Direct, for…
© 2014 Imperva, Inc. All rights reserved.
Learn more
www.imperva.com
39

More Related Content

PDF
More Databases. More Hackers. More Audits.
PDF
The Anatomy of Comment Spam
PDF
Top Five Security Must-Haves for Office 365
PDF
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
PDF
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
PDF
Protect Your Data and Apps in the Public Cloud
PDF
Database monitoring - First and Last Line of Defense
PPTX
Man in the Cloud Attacks
More Databases. More Hackers. More Audits.
The Anatomy of Comment Spam
Top Five Security Must-Haves for Office 365
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
Protect Your Data and Apps in the Public Cloud
Database monitoring - First and Last Line of Defense
Man in the Cloud Attacks

What's hot (20)

PPTX
Stop Account Takeover Attacks, Right in their Tracks
PDF
The Non-Advanced Persistent Threat
PDF
More databases. More hackers.
PPTX
Why Network and Endpoint Security Isn’t Enough
PDF
Extend Enterprise Application-level Security to Your AWS Environment
PDF
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
PPTX
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
PPTX
Hackers, Cyber Crime and Espionage
PPT
The State of Application Security: Hackers On Steroids
PDF
Top 10 Database Threats
PDF
Database Security, Better Audits, Lower Costs
PDF
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
PPTX
Information Security: Advanced SIEM Techniques
PDF
Information Security Whitepaper
PDF
Security and Compliance
PDF
The Security Policy Management Maturity Model: How to Move Up the Curve
PDF
SAP Cloud security overview 2.0
PPTX
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
PDF
Cheatsheet for your cloud project
PPTX
IBM QRadar Xforce
Stop Account Takeover Attacks, Right in their Tracks
The Non-Advanced Persistent Threat
More databases. More hackers.
Why Network and Endpoint Security Isn’t Enough
Extend Enterprise Application-level Security to Your AWS Environment
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hackers, Cyber Crime and Espionage
The State of Application Security: Hackers On Steroids
Top 10 Database Threats
Database Security, Better Audits, Lower Costs
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Information Security: Advanced SIEM Techniques
Information Security Whitepaper
Security and Compliance
The Security Policy Management Maturity Model: How to Move Up the Curve
SAP Cloud security overview 2.0
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Cheatsheet for your cloud project
IBM QRadar Xforce

Viewers also liked (12)

PDF
Lessons Learned From the Yahoo! Hack
PDF
Anatomy of the Compromised Insider
PDF
Is Your Business Safe From Malware And Targeted Attacks
PDF
The Value of Shared Threat Intelligence
PDF
Web Application Attack Report, Edition #4
PDF
Top Security Trends for 2014
PDF
6 Most Surprising SharePoint Security Risks
PDF
Automation of Web Application Attacks
PDF
Preparing for the Imminent Terabit DDoS Attack
PDF
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
PPTX
Gartner MQ for Web App Firewall Webinar
PDF
Top Cyber Security Trends for 2016
Lessons Learned From the Yahoo! Hack
Anatomy of the Compromised Insider
Is Your Business Safe From Malware And Targeted Attacks
The Value of Shared Threat Intelligence
Web Application Attack Report, Edition #4
Top Security Trends for 2014
6 Most Surprising SharePoint Security Risks
Automation of Web Application Attacks
Preparing for the Imminent Terabit DDoS Attack
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
Gartner MQ for Web App Firewall Webinar
Top Cyber Security Trends for 2016

Similar to Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities (20)

PDF
Hacking Encounters of the 3rd Kind
PDF
Hiding in Plain Sight: The Danger of Known Vulnerabilities
PPTX
Imperva - Hacking encounters of the 3rd kind
PDF
A Blueprint for Web Attack Survival
PPTX
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PDF
Cyber Side-Effects - Cloud Databases and Modern Malware
PDF
Know Your Attacker - Core Security
PDF
Threat Modeling for the Internet of Things
PPTX
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
PDF
Protecting Against Vulnerabilities in SharePoint Add-ons
PPTX
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
PPTX
A DevOps Guide to Web Application Security
PPTX
Web Application Security
PDF
Dual Detection Engines - Using Layered Security to Battle Cybercrime
PDF
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
PDF
Av is dead long live managed endpoint security
PDF
The Value of Crowd-Sourced Threat Intelligence
PDF
Detect & Remediate Malware & Advanced Targeted Attacks
PPTX
A Closer Look at Isolation: Hype or Next Gen Security?
Hacking Encounters of the 3rd Kind
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Imperva - Hacking encounters of the 3rd kind
A Blueprint for Web Attack Survival
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Combating Insider Threats – Protecting Your Agency from the Inside Out
Cyber Side-Effects - Cloud Databases and Modern Malware
Know Your Attacker - Core Security
Threat Modeling for the Internet of Things
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
Protecting Against Vulnerabilities in SharePoint Add-ons
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
A DevOps Guide to Web Application Security
Web Application Security
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Av is dead long live managed endpoint security
The Value of Crowd-Sourced Threat Intelligence
Detect & Remediate Malware & Advanced Targeted Attacks
A Closer Look at Isolation: Hype or Next Gen Security?

More from Imperva (19)

PPTX
Cybersecurity and Healthcare - HIMSS 2018 Survey
PPTX
API Security Survey
PPTX
Imperva ppt
PPTX
Beyond takeover: stories from a hacked account
PPTX
Research: From zero to phishing in 60 seconds
PDF
Making Sense of Web Attacks: From Alerts to Narratives
PDF
How We Blocked a 650Gb DDoS Attack Over Lunch
PPTX
Survey: Insider Threats and Cyber Security
PPTX
Companies Aware, but Not Prepared for GDPR
PPTX
Rise of Ransomware
PDF
7 Tips to Protect Your Data from Contractors and Privileged Vendors
PDF
SEO Botnet Sophistication
PDF
Phishing Made Easy
PDF
Imperva 2017 Cyber Threat Defense Report
PDF
Combat Payment Card Attacks with WAF and Threat Intelligence
PDF
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
PDF
Get Going With Your GDPR Plan
PDF
Cyber Criminal's Path To Your Data
PDF
Combat Today's Threats With A Single Platform For App and Data Security
Cybersecurity and Healthcare - HIMSS 2018 Survey
API Security Survey
Imperva ppt
Beyond takeover: stories from a hacked account
Research: From zero to phishing in 60 seconds
Making Sense of Web Attacks: From Alerts to Narratives
How We Blocked a 650Gb DDoS Attack Over Lunch
Survey: Insider Threats and Cyber Security
Companies Aware, but Not Prepared for GDPR
Rise of Ransomware
7 Tips to Protect Your Data from Contractors and Privileged Vendors
SEO Botnet Sophistication
Phishing Made Easy
Imperva 2017 Cyber Threat Defense Report
Combat Payment Card Attacks with WAF and Threat Intelligence
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
Get Going With Your GDPR Plan
Cyber Criminal's Path To Your Data
Combat Today's Threats With A Single Platform For App and Data Security

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
Programs and apps: productivity, graphics, security and other tools
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
Approach and Philosophy of On baking technology
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
KodekX | Application Modernization Development
Cloud computing and distributed systems.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities

  • 1. © 2014 Imperva, Inc. All rights reserved. Bleeding Servers – How Hackers Are Exploiting Known Vulnerabilities Confidential1 Terry Ray, VP of Global Security Engineering, Imperva
  • 2. © 2014 Imperva, Inc. All rights reserved. Agenda Confidential2 §  Latest Verizon Data Breach Investigation Report (DBIR) Stats §  Examining Vulnerabilities and Exploits §  HeartBleed Deep-Dive §  Understanding Data Theft §  Mitigating HeartBleed and CVEs
  • 3. © 2014 Imperva, Inc. All rights reserved. Terry Ray, VP of Global Security Engineering Confidential3 §  Speaker at Industry Events •  ISSA, IANS, ISACA, Gartner, RSA §  Designed and deployed data security solutions for hundreds of customers in various verticals including: •  Healthcare •  Oil and gas •  Financial services •  Government •  eCommerce §  Lectured on various network and data security topics and taught numerous security courses in over 35 countries globally
  • 4. © 2014 Imperva, Inc. All rights reserved. Latest Breach Statistics Confidential4 Yay! A New Verizon DBIR to Talk About
  • 5. © 2014 Imperva, Inc. All rights reserved. The Big Winners Confidential5
  • 6. © 2014 Imperva, Inc. All rights reserved. The Big Winners Confidential6
  • 7. © 2014 Imperva, Inc. All rights reserved. The Big Winners Confidential7
  • 8. © 2014 Imperva, Inc. All rights reserved. The Big Winners Confidential8
  • 9. © 2014 Imperva, Inc. All rights reserved. Actual Data Loss – Breach vs Incident Confidential9
  • 10. © 2014 Imperva, Inc. All rights reserved. Who’s Attacking – Hactivists vs Criminals Confidential10 §  “Greed takes a back seat to ideology when it comes to web app attacks in the 2013 dataset” §  “74% [of ideology motivated attacks] focus on tried and true exploits” •  Adobe PDF with embedded exe – 4 years old •  Microsoft server stack corruption – 6 years old •  Microsoft RPC DCOM bug—or MS03-026 – a staggering 10 years old—you might remember it as Blaster •  All still in the wild
  • 11. © 2014 Imperva, Inc. All rights reserved. How You Find Out That You’ve Been Hacked Confidential11 §  Financially motivated – discovered by customers §  Hactivists – discovered by external sources •  “uhh, hey guys, did you know that your webserver is attacking us” §  But we’re getting better at detecting breaches ourselves •  9%
  • 12. © 2014 Imperva, Inc. All rights reserved. CVEs Explored Confidential12
  • 13. © 2014 Imperva, Inc. All rights reserved. Stay On Top of Vulnerabilities Confidential13 §  The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. §  http://cve.mitre.org/cve/
  • 14. © 2014 Imperva, Inc. All rights reserved. Classic Web Site Hacking Confidential14 Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Single Site Attack
  • 15. © 2014 Imperva, Inc. All rights reserved. Classic Web Site Hacking Confidential15 Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Multiple Site Attacks
  • 16. © 2014 Imperva, Inc. All rights reserved. Exploit Hacking Confidential16 Hacking 1.  Identify CVE 2.  Weaponize Vulnerability 3.  Exploit Vulnerability Targeting Attack
  • 17. © 2014 Imperva, Inc. All rights reserved.17 The Attacker’s Focus Server Takeover Direct Data Theft Confidential Source: http://www.mediabistro.com/fishbowldc/suspended-politico-scribe-hacked_b76882 Source: http://www.connectmidmissouri.com/news/story.aspx?id=600968
  • 18. © 2014 Imperva, Inc. All rights reserved. HeartBleed Confidential18 Source: http://thequestionconcerningtechnology.blogspot.com/
  • 19. © 2014 Imperva, Inc. All rights reserved. What Is It and Why Do We Care? Confidential19 §  The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. §  When it is exploited it leads to the leak of memory contents from the server to the client and from the client to the server. §  According to Netcraft's April 2014 Web Server Survey of 958,919,789 websites, the combined market share of Apache and nginx products on the Internet was over 66%.
  • 20. © 2014 Imperva, Inc. All rights reserved. But There’s a Patch, Right? Confidential20 §  This vulnerability was first included in OpenSSL release 1.0.1 on 14th of March 2012. OpenSSL 1.0.1g released on 7th of April 2014 fixes the issue §  Affected Systems: OpenSSL versions 1.0.1 to 1.0.1f
  • 21. © 2014 Imperva, Inc. All rights reserved. Isn’t It Hard to Exploit? Confidential21 Metasploit: Easy as pulling a trigger. Source: http://www.smosh.com/smosh-pit/lists/12-monkeys-guns
  • 22. © 2014 Imperva, Inc. All rights reserved. Here, We Have a Secure Website Confidential22
  • 23. © 2014 Imperva, Inc. All rights reserved. Fire Up a VM of Kali Linux and Try It Out Confidential23
  • 24. © 2014 Imperva, Inc. All rights reserved. And We Have Leaked Data Confidential24
  • 25. © 2014 Imperva, Inc. All rights reserved. So How Bad Is It? Confidential25
  • 26. © 2014 Imperva, Inc. All rights reserved. How Bad Can It Really Get? Confidential26
  • 27. © 2014 Imperva, Inc. All rights reserved. Retrieved Private Key Confidential27
  • 28. © 2014 Imperva, Inc. All rights reserved. What Can We Do With This? Confidential28 §  Steal session details and spoof users §  Steal username and passwords §  Steal cryptographic keys •  Man-in-the-middle attacks •  Spoofed website with valid SSL keys •  Spear Phishing Attack
  • 29. © 2014 Imperva, Inc. All rights reserved. Data Theft Confidential29
  • 30. © 2014 Imperva, Inc. All rights reserved. An Overlooked Data Security Risk Confidential30 Databases and file servers, both repositories of so much valuable information, are targeted regularly… Admins unknowingly make unsupported database changes. Malware-compromised insiders access the database. Unpatched vulnerabilities allow exploit vectors. 2014 Verizon Data Breach Investigations Report
  • 31. © 2014 Imperva, Inc. All rights reserved. Protecting Your Data Confidential31 §  “the high number of incidents still offers some insight … where the victim’s anti-virus (AV) and intrusion prevention system (IPS) shields could not repel firepower of that magnitude”
  • 32. © 2014 Imperva, Inc. All rights reserved. Enterprise Security Is Evolving Confidential32 1st pillar: Endpoint Security Blocks threats targeting devices 2nd pillar: Network Security Blocks threats trying to access the network 3rd pillar: Data Center Security Protects high-value targets, keeping them both secure and accessible Imperva provides the third pillar of enterprise security
  • 33. © 2014 Imperva, Inc. All rights reserved. Mitigation Confidential33 Protecting Your Data From Known Vulnerabilities
  • 34. © 2014 Imperva, Inc. All rights reserved. Heartbleed Specific Confidential34 §  Test all servers for vulnerability §  Patch all affected servers §  Reissue new certificates §  Revoke all old certificates Source: http://www.secnews.gr/archives/78340
  • 35. © 2014 Imperva, Inc. All rights reserved. Locate and Assess Servers and Apps 3535 §  Scan your network to identify all assets (cloud and local) •  Classify assets by information and brand sensitivity to identify high risk landscapes •  Prioritize efforts based on risk levels §  Secure Database Access •  Scan DBs for vulnerabilities or configuration flaws •  Remove any default or unnecessary user accounts •  Disable unneeded services
  • 36. © 2014 Imperva, Inc. All rights reserved. Perform Vulnerability Assessments 3636 §  Perform Vulnerability Assessments •  Scan both Network and Application Layers •  Scan all known Web Assets •  Scan Concurrently and Continuously •  Analyze application functionality for DDoS attack potential and Business Logic based exploits •  Implement assessment practice across the entire SDLC Design" Development" QA" Production"
  • 37. © 2014 Imperva, Inc. All rights reserved. Block Web Attacks and Attack Sources Web attacks like SQL injection, cross-site scripting, directory traversal, and CSRF HTTP protocol violations like extremely long URLs and malformed Apache URI messages Malicious sources that have attacked other sites Known desktop scanners and hacker tools like Nikto and Paros based on user agent or the frequency of security violations 37
  • 38. © 2014 Imperva, Inc. All rights reserved. Webinar Materials 38 Post-Webinar Discussions Answers to Attendee Questions Webinar Recording Link Join Group Join Imperva LinkedIn Group, Imperva Data Security Direct, for…
  • 39. © 2014 Imperva, Inc. All rights reserved. Learn more www.imperva.com 39