SlideShare a Scribd company logo
Stopping Fraud –
Getting Rid of the Man in Your Browser
Rob Rachwald, Director of Security Strategy
Noa Bar-Yosef, Sr. Security Strategist
Agenda


   Motivation
   Problem Definition
   Shape Based Tests
   Content Based Tests
   Overall Solution Strategy
   Summary
Today’s Presenter
Rob Rachwald, Dir. of Security Strategy, Imperva

 Research
    + Directs security strategy
    + Works with the Imperva Application Defense Center
 Security experience
    + Fortify Software and Coverity
    + Helped secure Intel’s supply chain software
    + Extensive international experience in Japan, China, France, and
       Australia
 Thought leadership
    + Presented at RSA, InfoSec, OWASP, ISACA
    + Appearances on CNN, SkyNews, BBC, NY Times, and USA Today
 Graduated from University of California, Berkeley
Today’s Presenter
Noa Bar-Yosef, Senior Security Strategist, Imperva

 Research
    + Researches trends in the threat landscape
 Security experience
    + Previously, held the position of Sr. Security
      Researcher for Imperva’s Application Defense
      Center
    + Credited for multiple commercial applications’
      vulnerabilities
    + Holds a Master’s thesis specializing in Information
      Security
 Thought leadership
    + Writes a bi-weekly column on hacker trends and
       techniques for SecurityWeek
Motivation
Client Side Attacks - Scope of Problem
Major Attack Vectors
Client Side Attacks - Scope of Problem
Major Attack Vectors



            Exploiting Browser Code Vulnerabilities
            • Expected to rise with the introduction of HTML5


            Exploiting Browser Plug-ins
            • E.g. Java, Flash, PDF, Media Player


            Exploiting OS libraries
            • E.g. Graphics rendering
Client Side Attacks - Scope of Problem
2010 Vulnerability Figures


       Client side                 Server side

• 77 IE vulnerabilities,     • Only 36 vulnerabilities
  106 Firefox                 across IIS, Apache
  vulnerabilities, 188        and Tomcat
  Chrome vulnerabilities
• 73 Adobe Flash, 9
  Adobe Reader related
  vulnerabilities
• 72 Various ActiveX
  related vulnerabilities
Client Side Attacks - Scope of Problem
Malware Distribution Methods


          Drive-By-Download / Malvertizing

          Phishing, “Spear Phishing”

          Torrent and P2P

          Physical
Client Side Attacks - Scope of Problem
2010 Attack Figures

 A 2010 report by Kaspersky
   + ~600M attempts reported to KSN, more than 5 times increase
     over 2009
 Microsoft detects 60K-100K Zeus-infected machine per
  month
 2010 1H – Microsoft cleaned 6.5M bot infections
 Rustock spanned 1M computers

     Consumers cannot be expected
       to cope with the technical
         problem on their own
From Consumer Attack to a Business Problem


   The threat to
    consumers is
 constantly growing
 •Number of vulnerabilities
    •Number of attacks        We are passed the point
     •Types of attacks        of no return
      •Sophistication
                              • We cannot expect average
                                consumers to avoid infection
                                and mitigate attacks alone
                              • We cannot deny service to
                                infected consumers
                              • We cannot let the consumer
                                bear the consequences of a
                                compromise

   Usage is expanding
   beyond banking and
      popular retail
       applications
From Consumer Attack to a Business Problem


 Potential consequences (of failing to do so):
   + Reduced onboarding rate
   + Reduced activity
   + Increased refunds
   + Increased insurance rates




          Consumer facing malware
         threatens online commerce*
                Forrester Feb 2011: Malware And Trojans And Bots, Oh My!
From Consumer Attack to a Business Problem


Car User Safety        Online User Safety
Problem Definition
Client Side Trouble – Types of Interaction


    Key           • No interaction between malware and
                    application

  loggers         • Offline interaction between attacker
                    and application using stolen credentials
Client Side Trouble – Types of Interaction


                  • Some interaction between browser and
                    actual application during attack

 Phishing           • Could be used for detection of some
                      Phishing campaigns
                  • Offline interaction between attacker
                    and application using stolen credentials
Client Side Trouble – Types of Interaction


  Man in          • Extensive interaction between malware

   the              and application during attack
                  • Offline interaction between attacker

 Browser
                    and application using stolen credentials
Man in the Browser Attacks (aka Proxy Trojan)

 Attacker code runs in context of victim’s browser
 Original motivation
   + No need to attack infrastructure (DNS, tap into router, etc.)
   + Defeats SSL
 Additional benefits
   + Access to local resources
   + Access to application session data
 Prominent Actors
   + ZeuS, Gozi, URLZone, Sinowal, Limbo, and SpyEye
   + Silentbanker
MitB Attacks - Proxy Trojans in Action


       Before                      After
MitB Attacks - Proxy Trojans in Action


       Before                      After
MitB Attacks - Proxy Trojans in Action


       Before                      After
Proxy Trojan Architecture




                            Web Application
  Client Machine
Proxy Trojan Architecture

                      Drop Server



                                    Inject Fake
                                    Transaction
                   Extract Data
  Tamper Page
                                                  Web Application
  Client Machine




                        Tamper Request
Shape Based Tests
A Typical Change by a Trojan


Clean                      Infected




                   Observation:
     Trojan likes to tamper with plain traffic
Observing Typical Changes by Trojans


  Encoding of     • Enforces use of traffic that is easily tampered by the
                    Trojan
Related Headers   • Avoids HTTP/1.1 connections, and compressed data


  Client Type     • Ensures identification by the drop server and other
 Identification     attacker controlled components



   Additional     • Extra data provided by an unfortunate victim
                  • Could represent client identification for attacker
  Parameters        controlled components



Parameter Order   • A consequence of fake transactions
Shape Based Tests



   Step 1:

  • The application (or a device protecting the
    application) inspects the shape of incoming
    messages for changes typical to Trojans

   Step 2:

  • If a Trojan pattern is detected mark the client
    (IP address / session / request) as “infected”
Shape Based Tests in Action

                      Drop Server
                                                  Apply Shape Tests



                                    Inject Fake
                                    Transaction
                   Extract Data
  Tamper Page
                                                         Web Application
  Client Machine

                                                        Apply Shape Tests




                        Tamper Request
Challenges – Tracking Trojan Discrepancies



• Each Trojan may           • Need to keep
display a different         track of Trojans
change                      • Create a
• Changes may be            framework for
reflected in                shape based rules
specific request            • Create a
types                       framework for
                            constructing shape
                            tests
Challenges – Avoiding False Positives



   Challenge:

   • Some real client devices do not support (or
     choose not to support) HTTP/1.1 or
     compressed data

   Solution:

   • Engage the browser in a challenge response
     protocol
Challenges – Avoiding False Positives

HTTP/1.1 200 OK
.
.
.
Content-Encoding: gzip
Refresh: 2;url=infection_test.html?infected=no

<html>
...........V*//W...Qzi...I...z...J:`.......T$......d.y.%@.^f.R,...(..y.:.J....9.V......%%...JV.J~.a...!..
~@.Dqbkc...%6....
<head>
<script>window.navigate('infection_test.html?infected=yes')</script>
</head>
<body></body>
</html>
Content Based Tests
Observing Content-Tampering Trojans


   Observation:

  • Current malware tampers HTML at the network
    layer (before it is interpreted by browser)
  • This is due to simplicity and robustness
    considerations

   Solution:

  • Use client side code to verify integrity of HTML
    page content in coordination with the server
OK Solution: Altering the Trojan Behavior



   Naïve Solution

   • Step 1: “Provoke” the MitB into making changes
   • Step 2: Compare the HTML content to known Trojan
     behaviors

   Challenges

   • MitB can be configured to avoid this type of manipulation
   • Solution requires constant chase after MitB configuration
     files
      Requires constructing an up-to-date database of “known
        behaviors”
Better Solution: Content-Based Tests


   Step 1:

   • Server computes a digest of the delivered HTML page
     Random (invisible) elements are injected into the page before computation

   Step 2:

   • Server appends a page digest computation function to the HTML page
     Computation function code includes a random salt

   Step 3:

   • When page is loaded into the browser, the computation function is invoked,
     computes the digest and sends it to the server for verification

   Step 4:

   • If the browser does not send back a digest then infection is assumed
Content Based Tests in Action

                           Drop Server          Compute Digest and Inject
                                                Digest Computation Function



                                         Inject Fake
                                         Transaction
                    Extract Data
  Tamper Page
                                                              Web Application
  Client Machine


                                                              Compare Digests



                            Tamper Request

          Compute Digest
Content-Based Tests: Strengths


1) Digest cannot be pre-computed by malware due to the
   random HTML elements
2) Digest cannot be computed by malware without
   executing the digest computation function
   + Requires malware to implement / invoke Javascript engine
3) Computation function can be extended to explicitly
   reference the randomly injected HTML elements
   through DOM functions
   + Requires the malware to implement / fake DOM
4) Malware cannot dismiss test
Content-Based Tests: Strengths


5) Does not depend on specific MitB configuration and the
   expected changes
   + Only depends on protected application page
   + Some configuration options should be available to restrict the
     parts of the page that are digested
       – Avoid elements produced by client side code

6) Breaking the tie with attackers
   + Complexity of the computation process can be increased with
     small effort
   + Resulting changes to malware code are complex and painful,
     increasing its footprint
Overall Solution Strategy
Look at the Complete Picture


Apply shape based       … And content-based
  tests…                  tests
Interact with Infected Clients



Provide clear visual warnings

Contact customer offline

Apply business access policies
 • Example 1: Allow data extraction but deny transaction
 • Example 2: Limit transaction size

Automatically employ extra validation through side channels
 • Adaptive authentication

Keep a more comprehensive audit trail for the user / session
MitB is Only Part of the Landscape


   Identifying account takeover

   • Server side fraud detection
   • Device profiling and reputation
   • Advanced authentication

   Defeat phishing campaigns

   • Detect and takedown campaigns
   • Detect victims in real time
Requires a Flexible Deployment Framework


         Cannot change application code
         whenever capabilities change or
         threats morph


         Be able to protect legacy applications


         Create consistency across all
         applications and flexibility in choosing
         vendors
Summary
Summary


 Threat to consumer is constantly growing and is past the
  point where we can expect most of our consumers to
  avoid infection
 Consumer infection has become a business problem
 While providers should urge consumers to be prudent
  they MUST learn how to interact with infected
    Some car safety mechanisms are
  consumers and create a safe business environment for
  them regardless of the general threat
    already regulated. We can expect
    the same from business IT
    security
Summary


 Enterprise IT is failing to properly tackle client based
  attacks within enterprise
 The growing number of so called “APT” attacks on
  organizations demonstrate the effect of “compromised
  insider”
 Failures stem from the same reason: try to avoid
  infection rather than learn to interact with infected
  clients
Imperva’s Fraud Solution
SecureSphere 9.0 - Fraud Prevention Services


 SecureSphere integrates with Trusteer to detect users
  infected with malware like SpyEye, Zeus, Gozi & Silon
  1. User accesses Website
  2. SecureSphere redirects browser to Trusteer
  3. Browser downloads, runs malware check
  4. Result reaches WAF for analysis



                               Is this endpoint safe?




                                   Pass / Block
Use Case: Man in the Browser – Fraud Malware

 Challenge
     + Fraud malware performing activities on behalf of
       customers, causing money losses & customers
       dissatisfaction
     + FFIEC compliance requirements


 Solution
     + Detect infected end-devices
     + Block sensitive areas in the application from infected
       devices
     + Report on users connected from infected end-devices


49
ThreatRadar Fraud Prevention Stopping MitB

                     SecureSphere provides full
                     event detail to analyze Man
                     in the Browser (MitB) attacks
Centrally Manage Fraud and Web Security

    Known Attack
        Sources

                                                  User Infected
                                                  with Malware

 Geolocation                SecureSphere Policy
                                  Engine


 User Name                                        Browser and Agent


               Web Attack
                Detection                            Bot Detection


   Combining Web fraud with WAF policies enhances
    accuracy of fraud detection
Webinar Materials

 Get LinkedIn to
 Imperva Data Security Direct for…

                         Answers to
        Post-Webinar
                          Attendee
         Discussions
                         Questions



          Webinar
                        Webinar Slides
       Recording Link
www.imperva.com




- CONFIDENTIAL -

More Related Content

PDF
Man-In-The-Browser attacks
PDF
Man In The Browser
PPTX
Man in the Browser attacks on online banking transactions
PPT
CSI2008 Gunter Ollmann Man-in-the-browser
PDF
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
PDF
Web Security: A Primer for Developers
PDF
Cyber Attacks on Financial _ Vikjava
PPTX
Isaca conference threat_modeling_marco_morana_short.pdf
Man-In-The-Browser attacks
Man In The Browser
Man in the Browser attacks on online banking transactions
CSI2008 Gunter Ollmann Man-in-the-browser
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
Web Security: A Primer for Developers
Cyber Attacks on Financial _ Vikjava
Isaca conference threat_modeling_marco_morana_short.pdf

What's hot (20)

PPTX
Men in the Server Meet the Man in the Browser
PDF
Web Security - Introduction v.1.3
PPTX
Industry reactions to wanna cry ransomware attacks
PDF
IRJET- Cyber Attacks and its different Types
PPT
Web Application Security Testing
PDF
Million Browser Botnet
PDF
A Mitigation Technique For Internet Security Threat of Toolkits Attack
PDF
ToorCon 14 : Malandroid : The Crux of Android Infections
PPTX
Social engineering
PDF
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
PDF
Cyber Attack Analysis : Part I DDoS
PPTX
News Bytes
PPTX
CYBER SECURITY THREATS - Polytechnic Ungku Omar
PPT
Web Security and Network Security
PPTX
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
DOCX
The financial sector under siege from vicious banking malware @ReveeliumBlog
PPTX
Web security
PPT
Ransomware - The Growing Threat
PDF
8 Types of Cyber Attacks That Can Bother CISOs in 2020
PPTX
Methods Hackers Use
Men in the Server Meet the Man in the Browser
Web Security - Introduction v.1.3
Industry reactions to wanna cry ransomware attacks
IRJET- Cyber Attacks and its different Types
Web Application Security Testing
Million Browser Botnet
A Mitigation Technique For Internet Security Threat of Toolkits Attack
ToorCon 14 : Malandroid : The Crux of Android Infections
Social engineering
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
Cyber Attack Analysis : Part I DDoS
News Bytes
CYBER SECURITY THREATS - Polytechnic Ungku Omar
Web Security and Network Security
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
The financial sector under siege from vicious banking malware @ReveeliumBlog
Web security
Ransomware - The Growing Threat
8 Types of Cyber Attacks That Can Bother CISOs in 2020
Methods Hackers Use
Ad

Viewers also liked (6)

PDF
Shape Security @ WaffleJS October 16
PDF
JavaScript and the AST
PDF
Defeating Man-in-the-Browser Malware
PPTX
Self Defending Applications
PDF
AppSec California 2017 CSP: The Good, the Bad and the Ugly
PDF
Detecting headless browsers
Shape Security @ WaffleJS October 16
JavaScript and the AST
Defeating Man-in-the-Browser Malware
Self Defending Applications
AppSec California 2017 CSP: The Good, the Bad and the Ugly
Detecting headless browsers
Ad

Similar to How to Stop Man in the Browser Attacks (20)

PPTX
Spiceworld 2011 - AppRiver breakout session
PPT
An introduction to honeyclient technology
PDF
TRISC 2010 - Grapevine , Texas
PDF
Scaling Web 2.0 Malware Infection
PDF
Client-Side Penetration Testing Presentation
PPT
Web Application Testing for Today’s Biggest and Emerging Threats
PDF
Advanced Malware Analysis
PDF
Battling Malware In The Enterprise
PPTX
Surfing with Sharks KS ED TECH 2012
PDF
Dan Guido SOURCE Boston 2011
PPT
3 Hkcert Trend
PPTX
Emerging Threats and Trends in Online Security
PDF
ISSA Journal Paper - JavaScript Infection Model
PPTX
IBM Smarter Business 2012 - IBM Security: Threat landscape
PPTX
Real Business Threats!
PDF
PDF
Scansafe Annual Global Threat Report 2009
PPTX
2013 Security Threat Report Presentation
PDF
Top Security Trends for 2013
PDF
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
Spiceworld 2011 - AppRiver breakout session
An introduction to honeyclient technology
TRISC 2010 - Grapevine , Texas
Scaling Web 2.0 Malware Infection
Client-Side Penetration Testing Presentation
Web Application Testing for Today’s Biggest and Emerging Threats
Advanced Malware Analysis
Battling Malware In The Enterprise
Surfing with Sharks KS ED TECH 2012
Dan Guido SOURCE Boston 2011
3 Hkcert Trend
Emerging Threats and Trends in Online Security
ISSA Journal Paper - JavaScript Infection Model
IBM Smarter Business 2012 - IBM Security: Threat landscape
Real Business Threats!
Scansafe Annual Global Threat Report 2009
2013 Security Threat Report Presentation
Top Security Trends for 2013
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...

More from Imperva (20)

PPTX
Cybersecurity and Healthcare - HIMSS 2018 Survey
PPTX
API Security Survey
PPTX
Imperva ppt
PPTX
Beyond takeover: stories from a hacked account
PPTX
Research: From zero to phishing in 60 seconds
PDF
Making Sense of Web Attacks: From Alerts to Narratives
PDF
How We Blocked a 650Gb DDoS Attack Over Lunch
PPTX
Survey: Insider Threats and Cyber Security
PPTX
Companies Aware, but Not Prepared for GDPR
PPTX
Rise of Ransomware
PDF
7 Tips to Protect Your Data from Contractors and Privileged Vendors
PDF
SEO Botnet Sophistication
PDF
Phishing Made Easy
PDF
Imperva 2017 Cyber Threat Defense Report
PDF
Combat Payment Card Attacks with WAF and Threat Intelligence
PDF
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
PDF
Get Going With Your GDPR Plan
PDF
Cyber Criminal's Path To Your Data
PDF
Combat Today's Threats With A Single Platform For App and Data Security
PPTX
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Cybersecurity and Healthcare - HIMSS 2018 Survey
API Security Survey
Imperva ppt
Beyond takeover: stories from a hacked account
Research: From zero to phishing in 60 seconds
Making Sense of Web Attacks: From Alerts to Narratives
How We Blocked a 650Gb DDoS Attack Over Lunch
Survey: Insider Threats and Cyber Security
Companies Aware, but Not Prepared for GDPR
Rise of Ransomware
7 Tips to Protect Your Data from Contractors and Privileged Vendors
SEO Botnet Sophistication
Phishing Made Easy
Imperva 2017 Cyber Threat Defense Report
Combat Payment Card Attacks with WAF and Threat Intelligence
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
Get Going With Your GDPR Plan
Cyber Criminal's Path To Your Data
Combat Today's Threats With A Single Platform For App and Data Security
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Electronic commerce courselecture one. Pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Understanding_Digital_Forensics_Presentation.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
sap open course for s4hana steps from ECC to s4
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Electronic commerce courselecture one. Pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Big Data Technologies - Introduction.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

How to Stop Man in the Browser Attacks

  • 1. Stopping Fraud – Getting Rid of the Man in Your Browser Rob Rachwald, Director of Security Strategy Noa Bar-Yosef, Sr. Security Strategist
  • 2. Agenda  Motivation  Problem Definition  Shape Based Tests  Content Based Tests  Overall Solution Strategy  Summary
  • 3. Today’s Presenter Rob Rachwald, Dir. of Security Strategy, Imperva  Research + Directs security strategy + Works with the Imperva Application Defense Center  Security experience + Fortify Software and Coverity + Helped secure Intel’s supply chain software + Extensive international experience in Japan, China, France, and Australia  Thought leadership + Presented at RSA, InfoSec, OWASP, ISACA + Appearances on CNN, SkyNews, BBC, NY Times, and USA Today  Graduated from University of California, Berkeley
  • 4. Today’s Presenter Noa Bar-Yosef, Senior Security Strategist, Imperva  Research + Researches trends in the threat landscape  Security experience + Previously, held the position of Sr. Security Researcher for Imperva’s Application Defense Center + Credited for multiple commercial applications’ vulnerabilities + Holds a Master’s thesis specializing in Information Security  Thought leadership + Writes a bi-weekly column on hacker trends and techniques for SecurityWeek
  • 6. Client Side Attacks - Scope of Problem Major Attack Vectors
  • 7. Client Side Attacks - Scope of Problem Major Attack Vectors Exploiting Browser Code Vulnerabilities • Expected to rise with the introduction of HTML5 Exploiting Browser Plug-ins • E.g. Java, Flash, PDF, Media Player Exploiting OS libraries • E.g. Graphics rendering
  • 8. Client Side Attacks - Scope of Problem 2010 Vulnerability Figures Client side Server side • 77 IE vulnerabilities, • Only 36 vulnerabilities 106 Firefox across IIS, Apache vulnerabilities, 188 and Tomcat Chrome vulnerabilities • 73 Adobe Flash, 9 Adobe Reader related vulnerabilities • 72 Various ActiveX related vulnerabilities
  • 9. Client Side Attacks - Scope of Problem Malware Distribution Methods Drive-By-Download / Malvertizing Phishing, “Spear Phishing” Torrent and P2P Physical
  • 10. Client Side Attacks - Scope of Problem 2010 Attack Figures  A 2010 report by Kaspersky + ~600M attempts reported to KSN, more than 5 times increase over 2009  Microsoft detects 60K-100K Zeus-infected machine per month  2010 1H – Microsoft cleaned 6.5M bot infections  Rustock spanned 1M computers Consumers cannot be expected to cope with the technical problem on their own
  • 11. From Consumer Attack to a Business Problem The threat to consumers is constantly growing •Number of vulnerabilities •Number of attacks We are passed the point •Types of attacks of no return •Sophistication • We cannot expect average consumers to avoid infection and mitigate attacks alone • We cannot deny service to infected consumers • We cannot let the consumer bear the consequences of a compromise Usage is expanding beyond banking and popular retail applications
  • 12. From Consumer Attack to a Business Problem  Potential consequences (of failing to do so): + Reduced onboarding rate + Reduced activity + Increased refunds + Increased insurance rates Consumer facing malware threatens online commerce* Forrester Feb 2011: Malware And Trojans And Bots, Oh My!
  • 13. From Consumer Attack to a Business Problem Car User Safety Online User Safety
  • 15. Client Side Trouble – Types of Interaction Key • No interaction between malware and application loggers • Offline interaction between attacker and application using stolen credentials
  • 16. Client Side Trouble – Types of Interaction • Some interaction between browser and actual application during attack Phishing • Could be used for detection of some Phishing campaigns • Offline interaction between attacker and application using stolen credentials
  • 17. Client Side Trouble – Types of Interaction Man in • Extensive interaction between malware the and application during attack • Offline interaction between attacker Browser and application using stolen credentials
  • 18. Man in the Browser Attacks (aka Proxy Trojan)  Attacker code runs in context of victim’s browser  Original motivation + No need to attack infrastructure (DNS, tap into router, etc.) + Defeats SSL  Additional benefits + Access to local resources + Access to application session data  Prominent Actors + ZeuS, Gozi, URLZone, Sinowal, Limbo, and SpyEye + Silentbanker
  • 19. MitB Attacks - Proxy Trojans in Action Before After
  • 20. MitB Attacks - Proxy Trojans in Action Before After
  • 21. MitB Attacks - Proxy Trojans in Action Before After
  • 22. Proxy Trojan Architecture Web Application Client Machine
  • 23. Proxy Trojan Architecture Drop Server Inject Fake Transaction Extract Data Tamper Page Web Application Client Machine Tamper Request
  • 25. A Typical Change by a Trojan Clean Infected Observation: Trojan likes to tamper with plain traffic
  • 26. Observing Typical Changes by Trojans Encoding of • Enforces use of traffic that is easily tampered by the Trojan Related Headers • Avoids HTTP/1.1 connections, and compressed data Client Type • Ensures identification by the drop server and other Identification attacker controlled components Additional • Extra data provided by an unfortunate victim • Could represent client identification for attacker Parameters controlled components Parameter Order • A consequence of fake transactions
  • 27. Shape Based Tests Step 1: • The application (or a device protecting the application) inspects the shape of incoming messages for changes typical to Trojans Step 2: • If a Trojan pattern is detected mark the client (IP address / session / request) as “infected”
  • 28. Shape Based Tests in Action Drop Server Apply Shape Tests Inject Fake Transaction Extract Data Tamper Page Web Application Client Machine Apply Shape Tests Tamper Request
  • 29. Challenges – Tracking Trojan Discrepancies • Each Trojan may • Need to keep display a different track of Trojans change • Create a • Changes may be framework for reflected in shape based rules specific request • Create a types framework for constructing shape tests
  • 30. Challenges – Avoiding False Positives Challenge: • Some real client devices do not support (or choose not to support) HTTP/1.1 or compressed data Solution: • Engage the browser in a challenge response protocol
  • 31. Challenges – Avoiding False Positives HTTP/1.1 200 OK . . . Content-Encoding: gzip Refresh: 2;url=infection_test.html?infected=no <html> ...........V*//W...Qzi...I...z...J:`.......T$......d.y.%@.^f.R,...(..y.:.J....9.V......%%...JV.J~.a...!.. ~@.Dqbkc...%6.... <head> <script>window.navigate('infection_test.html?infected=yes')</script> </head> <body></body> </html>
  • 33. Observing Content-Tampering Trojans Observation: • Current malware tampers HTML at the network layer (before it is interpreted by browser) • This is due to simplicity and robustness considerations Solution: • Use client side code to verify integrity of HTML page content in coordination with the server
  • 34. OK Solution: Altering the Trojan Behavior Naïve Solution • Step 1: “Provoke” the MitB into making changes • Step 2: Compare the HTML content to known Trojan behaviors Challenges • MitB can be configured to avoid this type of manipulation • Solution requires constant chase after MitB configuration files  Requires constructing an up-to-date database of “known behaviors”
  • 35. Better Solution: Content-Based Tests Step 1: • Server computes a digest of the delivered HTML page Random (invisible) elements are injected into the page before computation Step 2: • Server appends a page digest computation function to the HTML page Computation function code includes a random salt Step 3: • When page is loaded into the browser, the computation function is invoked, computes the digest and sends it to the server for verification Step 4: • If the browser does not send back a digest then infection is assumed
  • 36. Content Based Tests in Action Drop Server Compute Digest and Inject Digest Computation Function Inject Fake Transaction Extract Data Tamper Page Web Application Client Machine Compare Digests Tamper Request Compute Digest
  • 37. Content-Based Tests: Strengths 1) Digest cannot be pre-computed by malware due to the random HTML elements 2) Digest cannot be computed by malware without executing the digest computation function + Requires malware to implement / invoke Javascript engine 3) Computation function can be extended to explicitly reference the randomly injected HTML elements through DOM functions + Requires the malware to implement / fake DOM 4) Malware cannot dismiss test
  • 38. Content-Based Tests: Strengths 5) Does not depend on specific MitB configuration and the expected changes + Only depends on protected application page + Some configuration options should be available to restrict the parts of the page that are digested – Avoid elements produced by client side code 6) Breaking the tie with attackers + Complexity of the computation process can be increased with small effort + Resulting changes to malware code are complex and painful, increasing its footprint
  • 40. Look at the Complete Picture Apply shape based … And content-based tests… tests
  • 41. Interact with Infected Clients Provide clear visual warnings Contact customer offline Apply business access policies • Example 1: Allow data extraction but deny transaction • Example 2: Limit transaction size Automatically employ extra validation through side channels • Adaptive authentication Keep a more comprehensive audit trail for the user / session
  • 42. MitB is Only Part of the Landscape Identifying account takeover • Server side fraud detection • Device profiling and reputation • Advanced authentication Defeat phishing campaigns • Detect and takedown campaigns • Detect victims in real time
  • 43. Requires a Flexible Deployment Framework Cannot change application code whenever capabilities change or threats morph Be able to protect legacy applications Create consistency across all applications and flexibility in choosing vendors
  • 45. Summary  Threat to consumer is constantly growing and is past the point where we can expect most of our consumers to avoid infection  Consumer infection has become a business problem  While providers should urge consumers to be prudent they MUST learn how to interact with infected Some car safety mechanisms are consumers and create a safe business environment for them regardless of the general threat already regulated. We can expect the same from business IT security
  • 46. Summary  Enterprise IT is failing to properly tackle client based attacks within enterprise  The growing number of so called “APT” attacks on organizations demonstrate the effect of “compromised insider”  Failures stem from the same reason: try to avoid infection rather than learn to interact with infected clients
  • 48. SecureSphere 9.0 - Fraud Prevention Services  SecureSphere integrates with Trusteer to detect users infected with malware like SpyEye, Zeus, Gozi & Silon 1. User accesses Website 2. SecureSphere redirects browser to Trusteer 3. Browser downloads, runs malware check 4. Result reaches WAF for analysis Is this endpoint safe? Pass / Block
  • 49. Use Case: Man in the Browser – Fraud Malware  Challenge + Fraud malware performing activities on behalf of customers, causing money losses & customers dissatisfaction + FFIEC compliance requirements  Solution + Detect infected end-devices + Block sensitive areas in the application from infected devices + Report on users connected from infected end-devices 49
  • 50. ThreatRadar Fraud Prevention Stopping MitB SecureSphere provides full event detail to analyze Man in the Browser (MitB) attacks
  • 51. Centrally Manage Fraud and Web Security Known Attack Sources User Infected with Malware Geolocation SecureSphere Policy Engine User Name Browser and Agent Web Attack Detection Bot Detection  Combining Web fraud with WAF policies enhances accuracy of fraud detection
  • 52. Webinar Materials Get LinkedIn to Imperva Data Security Direct for… Answers to Post-Webinar Attendee Discussions Questions Webinar Webinar Slides Recording Link