SlideShare a Scribd company logo
#MDBW17
Davi Ottenheimer, Product Security
Managing Cloud Security
Design and Implementation
in a Ransomware World
Background
#MDBW17
#MDBW17
Whoami
>20 years of flyingpenguin
● Security Ops
● Assessments
● Investigations
● Products
#MDBW17
Realities of Securing Big Data
“Why trust a strategic
knowledge system?”
#MDBW17
Security is Evolution
● Evolution is the process not a destination
● Escalation a function of competitions
● Economics impacts risk mitigation
#MDBW17
#MDBW17
Security is Evolution
● Audit everything (Check your health)
● People who could behave responsibly may not
● BitCoin “mining” changed behavior economics
● Authentication hygiene still is top threat to security
#MDBW17
#MDBW17
Ignaz Semmelweis
1847 “Savior of mothers”
discovered hand washing
standards can drop childbed
fever from 30% to 1%
“There is one cause,
all that matters is
cleanliness”
Source: http://www.pbs.org/newshour/updates/ignaz-semmelweis-doctor-prescribed-hand-washing/
#MDBW17
Economics of “Getting Bit”
● Mining with AWS keys is wasteful
○ 1 instance per day is ~$8 cost for ~$2 mined (variable)
○ ~$6/day loss per instance
○ “Better use of dollars to buy coins instead of instance time”
● Stolen AWS key shifts waste to victims
○ Attacker spins victim instances ASAP
○ $10,000/hour victim cost burden
○ $2,500/hour attacker profit
Today’s Hot Example
#MDBW17
#MDBW17
RANSOMWARE!
● Use of access to
deny access,
unless ransom paid
● US gov: 4,000/day
ransomware
attacks in 2016
(300% over 2015)
Source: https://www.justice.gov/criminal-ccips/file/872771/
#MDBW17
Source: https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx#enterprise
RANSOMWARE!
#MDBW17
Ransomware Evolution
1994 2004 2007 2010 2014
Botnets
Adware
Spyware
Rogueware
For-Profit
“Advanced
Persistent”
Key & Cert
GPCODE CRYPTOLOCKERCRYPTOVIRUS
1989
AIDS
...
Viruses
Worms
Trojans
CRYPTOWALL
TORRENTLOCKER
TESLACRYPT
LOCKER
R.I.P.
Tron
1998
R.I.P.
Hagbard
1989
LOCKY
“KGB Hack”
> DM 100K + drugs over 3 years
> Burned to death
> http://phrack.org/issues/25/10.html
#MDBW17
An Economics Perspective
X
● Old-method experienced cost inflation
○ Cloud agility = DDoS more expensive
○ Expensive race condition for pay
● New-method experienced cost deflation
○ Scan/Exploit kits (easy to find victims)
○ Social engineering kits (easy to phish)
○ Key management kits (easy to encrypt)
○ Monetization kits (easy to extort)
“I’ve never actually stormed a castle, but I’ve
taken a bunch of siege-management courses.”
#MDBW17
Big DDoS attacks affect some AWS customers,
but chief Andy Jassy assures cloud is secure
● DDoS targeted Dynamic Network Services (Dyn)
● Dyn one of many AWS DNS providers
● AWS services (Shield) help, and 3rd party too but…
“...agility single biggest reason
enterprise move to cloud”
2016 Q4 Akamai “State of the Internet” Report:
● 7 of 10 biggest (300+ Gbps) DDoS in history happened in 2016
● 3 of 10 were in 2016 Q4
Sources: https://www.geekwire.com/2016/big-ddos-attacks-hit-amazon-web-services-customers-jassy-assures-cloud-secure/,
https://www.akamai.com/us/en/about/our-thinking/state-of-the-internet-report/
#MDBW17
2008 Terry Childs Case
● San Francisco City Government Loses Control of Cloud
○ Emergency Services (Fire, Police, etc.)
○ “Almost Included Utilities” (Wastewater Treatment)
● Own Administrator (Childs) Charged With DoS
○ Deadman Traps on Switches (Erase Config)
○ Encrypted Storage (Fiber Tap at Core Led to Hidden Servers)
○ Withheld “Keys” From Staff and Management
● Found Guilty by Court
○ “His boss’ boss was an authorized user, could not be legally denied access”
○ Jury included 13 Year Network Admin and CCIE
Source: http://www.computerworld.com/article/2468913/cybercrime-hacking/terry-childs-found-guilty-of-san-francisco-fiberwan-lockout.html
#MDBW17
“Rock Solid, Secure…” June 16, 2014
#MDBW17
“...completely deleted” June 17, 2014
Ransomware
Explained
#MDBW17
#MDBW17
1. Seek vulnerable access
2. Lock and/or Encrypt
3. Extort
How Ransomware Works
Source: https://blogs.technet.microsoft.com/mmpc/2016/03/17/no-mas-samas-whats-in-this-ransomwares-modus-operandi/
#MDBW17
Seek Vulnerable Access
1. Find a foothold using credential (or even non-credentialed)
• Internet facing services
• User devices
• Platforms (github, pastebin, facebook, etc.)
2. Pivot and traverse
• Gather credentials
• Elevate privileges
• Find valuable data
North
South
East
West
Users
Apps
User
Dir
User
Dir
#MDBW17
Lock and/or encrypt
• Anything believed to be valuable to target
• Any backups (prevent restores)
• Using modern algorithms (AES256)
• Unique keys on remote infrastructure
#MDBW17
Extort
• Name of “Replaced” DB
• README
• ReadmePlease
• PLEASE_READ
• IHAVEYOURDATA
• WARNING
• WARNING_ALERT
• PWNED
• PWNED_SECURE_YOUR_STUFF_SILLY
• DELETED_BECAUSE_YOU_DIDNT_PASSWORD_PROTECT_YOUR_MONGODB
• to_get_DB_back_send_1BTC_to_1DGztzLNz1euFswtqMDWPMWSgwthdpxRtD
● Amount
○ 0.1 BTC
○ 0.15 BTC
○ 0.2 BTC
○ 0.25 BTC
○ 0.5 BTC
○ 1 BTC
Source: https://docs.google.com/spreadsheets/d/1QonE9oeMOQHVh8heFIyeqrjfKEViL0poLnY8mAakKhM/edit#gid=0
{
"_id" : ObjectId("9854a4532b5e63f722fcc9da"),
"mail" : "user@domain.com",
"note" : "SEND 0.1 BTC TO THIS ADDRESS 1DGztzLNz1euFswtqMDWPMWSgwthdpxRtD AND
CONTACT THIS EMAIL WITH YOUR IP OF YOUR SERVER TO RECOVER YOUR DATABASE !"
}
Design and
Implementation
#MDBW17
#MDBW17
Are You Ready?
● Asset Management Lifecycle
● Dependencies on Providers
● Incident Response Procedures
● Disaster Recovery Plan (Backups!)
● Identity and Access Management
○ Components
○ Standards*
● AES256
● TLS1.2
● FIPS 140-2
*https://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.html
{
● PCI/DSS
● SOC2
● ISO 27000x
● HIPAA-HITECH
● GDPR
● FedRamp (NIST 800-53)
#MDBW17
Design Considerations
● Critical Severity Vulnerability
○ Remediate Immediately (R = 0)
○ Patch Within 24 hours (e.g. HEARTBLEED)
● High Severity (R = 5 Days)
● Medium Severity (R = 60 Days)
● Low Severity
○ Business Impact Analysis
○ Customer Impact Analysis
#MDBW17
Design Considerations (RFC2904)
X
● Authentication
● Authorization
● Accounting
Source: https://tools.ietf.org/html/rfc2904
#MDBW17
Security Design Review Services
• Providers*
• AWS Trusted Advisor, Inspector
• Azure Security Center
• GCP Cloud Security Scanner
• Self
• Scan for Accidental Secret Leaks (“Github Commit Crawler”)
• Detect and Identify Assets (API Call, OVF Scan)
• Assess Configurations (SCAP, XCCDF, SSLcheck)
*https://www.mongodb.com/blog/post/how-to-avoid-a-malicious-attack-that-ransoms-your-data
#MDBW17
Implementation Example 1
• Is authentication disabled?
> if (db.adminCommand('getCmdLineOpts').parsed.security === undefined ||
db.adminCommand('getCmdLineOpts').parsed.security.authorization === undefined ||
db.adminCommand('getCmdLineOpts').parsed.security.authorization == "disabled"){
print("NO AUTH! NO AUTH!")}else{print("Good work, Auth enabled")}
• Is a default port listening (27017, 29017)?
> db.adminCommand('getCmdLineOpts').parsed.net.port
Source: https://docs.mongodb.com/manual/reference/default-mongodb-port/
#MDBW17
Implementation Example 2
Service connected to wide area network lacking any
“security group” or firewall?
1. On system outside network, grab mongodb client
> wget https://fastdl.mongodb.org/linux/mongodb-linux-x86_64-ubuntu1604-3.4.5.tgz
> tar -zxf mongodb-linux-x86_64-ubuntu1604-3.4.5.tgz -C 3.4 --strip-components=1
2. Test by connecting to Internet hostname
> ~/3.4/bin/mongo --host <urmongodb_host_name> --port <urmongodb_port>
#MDBW17
Implementation Example 2
#MDBW17
Implementation Example 2
• Bind to localhost by default in v3.5.8
• IP Whitelisting option in v3.6
• Associate IP addresses/ranges to auth roles
• If IP fail, then authentication fail
• Can restrict __system user to authenticate from only cluster nodes
#MDBW17
Design Improvement Cycles
● Daily Full Credential Scan of Any New Instance
● Weekly Full Credential Scan of Builds Prior to Staging
● Quarterly “Approved Scanning Vendor” (ASV) Report
● Biannually
○ “Full” Penetration Test
○ Code Review
#MDBW17
#MDBW17
Managing Cloud Security
Design and Implementation
in a Ransomware World
Thank You!

More Related Content

PPTX
Introducing Stitch
PPTX
Private Cloud Self-Service at Scale
PPTX
Sizing MongoDB Clusters
PPTX
Building the Real-Time Performance Panel
PPTX
It's a Dangerous World
PPTX
Securing Your Enterprise Web Apps with MongoDB Enterprise
PPTX
Managing Multi-Tenant SaaS Applications at Scale
PPTX
Performance Tipping Points - Hitting Hardware Bottlenecks
Introducing Stitch
Private Cloud Self-Service at Scale
Sizing MongoDB Clusters
Building the Real-Time Performance Panel
It's a Dangerous World
Securing Your Enterprise Web Apps with MongoDB Enterprise
Managing Multi-Tenant SaaS Applications at Scale
Performance Tipping Points - Hitting Hardware Bottlenecks

What's hot (20)

PPTX
Powering Microservices with Docker, Kubernetes, Kafka, and MongoDB
PPTX
Bye Bye Legacy: Simplifying the Journey
PDF
MongoDB World 2018: Building a New Transactional Model
PPTX
Power Real Estate Property Analytics with MongoDB + Spark
PDF
MongoDB .local Bengaluru 2019: New Encryption Capabilities in MongoDB 4.2: A ...
PPTX
Practical Design Patterns for Building Applications Resilient to Infrastructu...
PPTX
Common Cluster Configuration Pitfalls
PDF
MongoDB .local Chicago 2019: Modern Data Backup and Recovery from On-premises...
PDF
Engineering an Encrypted Storage Engine
PDF
MongoDB World 2019: MongoDB Atlas Data Lake Technical Deep Dive
PPTX
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
PDF
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
PDF
MongoDB World 2018: Transactions and Durability: Putting the “D” in ACID
PPTX
Webinar: Architecting Secure and Compliant Applications with MongoDB
PDF
MongoDB SoCal 2020: MongoDB Atlas Jump Start
PPTX
Scaling MongoDB to a Million Collections
PDF
MongoDB .local Bengaluru 2019: MongoDB Atlas Data Lake Technical Deep Dive
PPTX
MongoDB 3.4: Deep Dive on Views, Zones, and MongoDB Compass
PDF
MongoDB .local Bengaluru 2019: The Journey of Migration from Oracle to MongoD...
PDF
MongoDB .local Toronto 2019: MongoDB Atlas Jumpstart
Powering Microservices with Docker, Kubernetes, Kafka, and MongoDB
Bye Bye Legacy: Simplifying the Journey
MongoDB World 2018: Building a New Transactional Model
Power Real Estate Property Analytics with MongoDB + Spark
MongoDB .local Bengaluru 2019: New Encryption Capabilities in MongoDB 4.2: A ...
Practical Design Patterns for Building Applications Resilient to Infrastructu...
Common Cluster Configuration Pitfalls
MongoDB .local Chicago 2019: Modern Data Backup and Recovery from On-premises...
Engineering an Encrypted Storage Engine
MongoDB World 2019: MongoDB Atlas Data Lake Technical Deep Dive
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2018: Transactions and Durability: Putting the “D” in ACID
Webinar: Architecting Secure and Compliant Applications with MongoDB
MongoDB SoCal 2020: MongoDB Atlas Jump Start
Scaling MongoDB to a Million Collections
MongoDB .local Bengaluru 2019: MongoDB Atlas Data Lake Technical Deep Dive
MongoDB 3.4: Deep Dive on Views, Zones, and MongoDB Compass
MongoDB .local Bengaluru 2019: The Journey of Migration from Oracle to MongoD...
MongoDB .local Toronto 2019: MongoDB Atlas Jumpstart
Ad

Viewers also liked (17)

PDF
Advantages of privacy by design in IoE
PDF
Privacy By Designer (PHP.ghent)
PDF
Top career課件
PDF
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
PPTX
Privacy by Design - taking in account the state of the art
PPSX
Information Security Governance: Concepts, Security Management & Metrics
PDF
Safeguarding privacy in research design
PDF
20171106 - Privacy Design Lab - LINDDUN
PPT
Privacy by Design Seminar - Jan 22, 2015
PDF
Don't Ask, Don't Tell - The Virtues of Privacy By Design
PPTX
Privacy by design
PPTX
Privacy by Design: White Papaer
PDF
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
PDF
Security by design: An Introduction to Drupal Security
PDF
Ame Elliott – No, Thank You: User Experience Design for Privacy
PDF
Data Pipeline Matters
PDF
Advantages of privacy by design in IoE
Privacy By Designer (PHP.ghent)
Top career課件
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
Privacy by Design - taking in account the state of the art
Information Security Governance: Concepts, Security Management & Metrics
Safeguarding privacy in research design
20171106 - Privacy Design Lab - LINDDUN
Privacy by Design Seminar - Jan 22, 2015
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Privacy by design
Privacy by Design: White Papaer
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Security by design: An Introduction to Drupal Security
Ame Elliott – No, Thank You: User Experience Design for Privacy
Data Pipeline Matters
Ad

Similar to Managing Cloud Security Design and Implementation in a Ransomware World (20)

PDF
Managing Cloud Security Design and Implementation in a Ransomware World
PPTX
Security on AWS
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PPT
CyberCrime in the Cloud and How to defend Yourself
PPTX
AWS Spotlight Series - Modernization and Security with AWS
PPTX
Security on AWS, 2021 Edition Meetup
PPTX
Security on AWS, 2021 Edition Meetup
PDF
Are you ready for the next attack? Reviewing the SP Security Checklist
PDF
Are you ready for the next attack? reviewing the sp security checklist (apnic...
PDF
Data security in cloud
PDF
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
PPTX
Practical Security for the Cloud
PDF
AWS Chicago user group meetup on June 24, 2014
PPTX
Short story about your information processing - cloud part
PPTX
Securing your Cloud Deployment
PPT
Security Capability Model - InfoSec Forum VIII
PDF
Good-cyber-hygiene-at-scale-and-speed
PDF
Why Corporate Security Professionals Should Care About Information Security
PPTX
11 19-2015 - iasaca membership conference - the state of security
Managing Cloud Security Design and Implementation in a Ransomware World
Security on AWS
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
CyberCrime in the Cloud and How to defend Yourself
AWS Spotlight Series - Modernization and Security with AWS
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition Meetup
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Data security in cloud
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Practical Security for the Cloud
AWS Chicago user group meetup on June 24, 2014
Short story about your information processing - cloud part
Securing your Cloud Deployment
Security Capability Model - InfoSec Forum VIII
Good-cyber-hygiene-at-scale-and-speed
Why Corporate Security Professionals Should Care About Information Security
11 19-2015 - iasaca membership conference - the state of security

More from MongoDB (20)

PDF
MongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
PDF
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
PDF
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
PDF
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
PDF
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
PDF
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
PDF
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
PDF
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
PDF
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
PDF
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
PDF
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
PDF
MongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
PDF
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
PDF
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
PDF
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
PDF
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
PDF
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
PDF
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
PDF
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
PDF
MongoDB .local Paris 2020: Les bonnes pratiques pour sécuriser MongoDB
MongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
MongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
MongoDB .local Paris 2020: Les bonnes pratiques pour sécuriser MongoDB

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Big Data Technologies - Introduction.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
KodekX | Application Modernization Development
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
Spectroscopy.pptx food analysis technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Empathic Computing: Creating Shared Understanding
Programs and apps: productivity, graphics, security and other tools
Big Data Technologies - Introduction.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
KodekX | Application Modernization Development
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf

Managing Cloud Security Design and Implementation in a Ransomware World

  • 1. #MDBW17 Davi Ottenheimer, Product Security Managing Cloud Security Design and Implementation in a Ransomware World
  • 3. #MDBW17 Whoami >20 years of flyingpenguin ● Security Ops ● Assessments ● Investigations ● Products
  • 4. #MDBW17 Realities of Securing Big Data “Why trust a strategic knowledge system?”
  • 5. #MDBW17 Security is Evolution ● Evolution is the process not a destination ● Escalation a function of competitions ● Economics impacts risk mitigation #MDBW17
  • 6. #MDBW17 Security is Evolution ● Audit everything (Check your health) ● People who could behave responsibly may not ● BitCoin “mining” changed behavior economics ● Authentication hygiene still is top threat to security #MDBW17
  • 7. #MDBW17 Ignaz Semmelweis 1847 “Savior of mothers” discovered hand washing standards can drop childbed fever from 30% to 1% “There is one cause, all that matters is cleanliness” Source: http://www.pbs.org/newshour/updates/ignaz-semmelweis-doctor-prescribed-hand-washing/
  • 8. #MDBW17 Economics of “Getting Bit” ● Mining with AWS keys is wasteful ○ 1 instance per day is ~$8 cost for ~$2 mined (variable) ○ ~$6/day loss per instance ○ “Better use of dollars to buy coins instead of instance time” ● Stolen AWS key shifts waste to victims ○ Attacker spins victim instances ASAP ○ $10,000/hour victim cost burden ○ $2,500/hour attacker profit
  • 10. #MDBW17 RANSOMWARE! ● Use of access to deny access, unless ransom paid ● US gov: 4,000/day ransomware attacks in 2016 (300% over 2015) Source: https://www.justice.gov/criminal-ccips/file/872771/
  • 12. #MDBW17 Ransomware Evolution 1994 2004 2007 2010 2014 Botnets Adware Spyware Rogueware For-Profit “Advanced Persistent” Key & Cert GPCODE CRYPTOLOCKERCRYPTOVIRUS 1989 AIDS ... Viruses Worms Trojans CRYPTOWALL TORRENTLOCKER TESLACRYPT LOCKER R.I.P. Tron 1998 R.I.P. Hagbard 1989 LOCKY “KGB Hack” > DM 100K + drugs over 3 years > Burned to death > http://phrack.org/issues/25/10.html
  • 13. #MDBW17 An Economics Perspective X ● Old-method experienced cost inflation ○ Cloud agility = DDoS more expensive ○ Expensive race condition for pay ● New-method experienced cost deflation ○ Scan/Exploit kits (easy to find victims) ○ Social engineering kits (easy to phish) ○ Key management kits (easy to encrypt) ○ Monetization kits (easy to extort) “I’ve never actually stormed a castle, but I’ve taken a bunch of siege-management courses.”
  • 14. #MDBW17 Big DDoS attacks affect some AWS customers, but chief Andy Jassy assures cloud is secure ● DDoS targeted Dynamic Network Services (Dyn) ● Dyn one of many AWS DNS providers ● AWS services (Shield) help, and 3rd party too but… “...agility single biggest reason enterprise move to cloud” 2016 Q4 Akamai “State of the Internet” Report: ● 7 of 10 biggest (300+ Gbps) DDoS in history happened in 2016 ● 3 of 10 were in 2016 Q4 Sources: https://www.geekwire.com/2016/big-ddos-attacks-hit-amazon-web-services-customers-jassy-assures-cloud-secure/, https://www.akamai.com/us/en/about/our-thinking/state-of-the-internet-report/
  • 15. #MDBW17 2008 Terry Childs Case ● San Francisco City Government Loses Control of Cloud ○ Emergency Services (Fire, Police, etc.) ○ “Almost Included Utilities” (Wastewater Treatment) ● Own Administrator (Childs) Charged With DoS ○ Deadman Traps on Switches (Erase Config) ○ Encrypted Storage (Fiber Tap at Core Led to Hidden Servers) ○ Withheld “Keys” From Staff and Management ● Found Guilty by Court ○ “His boss’ boss was an authorized user, could not be legally denied access” ○ Jury included 13 Year Network Admin and CCIE Source: http://www.computerworld.com/article/2468913/cybercrime-hacking/terry-childs-found-guilty-of-san-francisco-fiberwan-lockout.html
  • 19. #MDBW17 1. Seek vulnerable access 2. Lock and/or Encrypt 3. Extort How Ransomware Works Source: https://blogs.technet.microsoft.com/mmpc/2016/03/17/no-mas-samas-whats-in-this-ransomwares-modus-operandi/
  • 20. #MDBW17 Seek Vulnerable Access 1. Find a foothold using credential (or even non-credentialed) • Internet facing services • User devices • Platforms (github, pastebin, facebook, etc.) 2. Pivot and traverse • Gather credentials • Elevate privileges • Find valuable data North South East West Users Apps User Dir User Dir
  • 21. #MDBW17 Lock and/or encrypt • Anything believed to be valuable to target • Any backups (prevent restores) • Using modern algorithms (AES256) • Unique keys on remote infrastructure
  • 22. #MDBW17 Extort • Name of “Replaced” DB • README • ReadmePlease • PLEASE_READ • IHAVEYOURDATA • WARNING • WARNING_ALERT • PWNED • PWNED_SECURE_YOUR_STUFF_SILLY • DELETED_BECAUSE_YOU_DIDNT_PASSWORD_PROTECT_YOUR_MONGODB • to_get_DB_back_send_1BTC_to_1DGztzLNz1euFswtqMDWPMWSgwthdpxRtD ● Amount ○ 0.1 BTC ○ 0.15 BTC ○ 0.2 BTC ○ 0.25 BTC ○ 0.5 BTC ○ 1 BTC Source: https://docs.google.com/spreadsheets/d/1QonE9oeMOQHVh8heFIyeqrjfKEViL0poLnY8mAakKhM/edit#gid=0 { "_id" : ObjectId("9854a4532b5e63f722fcc9da"), "mail" : "user@domain.com", "note" : "SEND 0.1 BTC TO THIS ADDRESS 1DGztzLNz1euFswtqMDWPMWSgwthdpxRtD AND CONTACT THIS EMAIL WITH YOUR IP OF YOUR SERVER TO RECOVER YOUR DATABASE !" }
  • 24. #MDBW17 Are You Ready? ● Asset Management Lifecycle ● Dependencies on Providers ● Incident Response Procedures ● Disaster Recovery Plan (Backups!) ● Identity and Access Management ○ Components ○ Standards* ● AES256 ● TLS1.2 ● FIPS 140-2 *https://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.html { ● PCI/DSS ● SOC2 ● ISO 27000x ● HIPAA-HITECH ● GDPR ● FedRamp (NIST 800-53)
  • 25. #MDBW17 Design Considerations ● Critical Severity Vulnerability ○ Remediate Immediately (R = 0) ○ Patch Within 24 hours (e.g. HEARTBLEED) ● High Severity (R = 5 Days) ● Medium Severity (R = 60 Days) ● Low Severity ○ Business Impact Analysis ○ Customer Impact Analysis
  • 26. #MDBW17 Design Considerations (RFC2904) X ● Authentication ● Authorization ● Accounting Source: https://tools.ietf.org/html/rfc2904
  • 27. #MDBW17 Security Design Review Services • Providers* • AWS Trusted Advisor, Inspector • Azure Security Center • GCP Cloud Security Scanner • Self • Scan for Accidental Secret Leaks (“Github Commit Crawler”) • Detect and Identify Assets (API Call, OVF Scan) • Assess Configurations (SCAP, XCCDF, SSLcheck) *https://www.mongodb.com/blog/post/how-to-avoid-a-malicious-attack-that-ransoms-your-data
  • 28. #MDBW17 Implementation Example 1 • Is authentication disabled? > if (db.adminCommand('getCmdLineOpts').parsed.security === undefined || db.adminCommand('getCmdLineOpts').parsed.security.authorization === undefined || db.adminCommand('getCmdLineOpts').parsed.security.authorization == "disabled"){ print("NO AUTH! NO AUTH!")}else{print("Good work, Auth enabled")} • Is a default port listening (27017, 29017)? > db.adminCommand('getCmdLineOpts').parsed.net.port Source: https://docs.mongodb.com/manual/reference/default-mongodb-port/
  • 29. #MDBW17 Implementation Example 2 Service connected to wide area network lacking any “security group” or firewall? 1. On system outside network, grab mongodb client > wget https://fastdl.mongodb.org/linux/mongodb-linux-x86_64-ubuntu1604-3.4.5.tgz > tar -zxf mongodb-linux-x86_64-ubuntu1604-3.4.5.tgz -C 3.4 --strip-components=1 2. Test by connecting to Internet hostname > ~/3.4/bin/mongo --host <urmongodb_host_name> --port <urmongodb_port>
  • 31. #MDBW17 Implementation Example 2 • Bind to localhost by default in v3.5.8 • IP Whitelisting option in v3.6 • Associate IP addresses/ranges to auth roles • If IP fail, then authentication fail • Can restrict __system user to authenticate from only cluster nodes
  • 32. #MDBW17 Design Improvement Cycles ● Daily Full Credential Scan of Any New Instance ● Weekly Full Credential Scan of Builds Prior to Staging ● Quarterly “Approved Scanning Vendor” (ASV) Report ● Biannually ○ “Full” Penetration Test ○ Code Review #MDBW17
  • 33. #MDBW17 Managing Cloud Security Design and Implementation in a Ransomware World Thank You!