NSE1 Threat Landscape
NSE1 Threat Landscape
NSE1 Threat Landscape
Study Guide
for NSE 1:
The Threat
Landscape
February 1
2016
Fortinet
Network
Security
Solutions
ii
iii
iv
Contemporary and future threat landscapes are dynamic and often include unforeseen technological
advances. Devices and applications are under development and appear on the market at more rapidly
and with those new technologies come new threats. Not only companies and organizations, but
individual users of less expensive technology such as smartphones, tablets, and laptop computers who
are novices where information security is concerned must deal with optimizing their devices and
applications while blocking potential threats.
With the explosion of social media as the
primary source of connectivity for so many
people internationally, addressing the hidden
threats from social media sites is a continuing
challengeand more cross-platform sharing and
integration will continue to make device and
network security an evolving challenge at all
levels.
Evolution of Adversaries
Computer hacking was once the realm of curious teenagers. It's now the arena of government spies,
professional thieves and soldiers of fortunebut dont count out the curious teenagers just yet; more
and more young people are enamored with the prospectand thrillof hacking and seeing how far
they can get.
As you review the illustration of escalating threat levels (Figure 1), you will notice that a key factor
defining threat level is the level of resources (training, equipment, funding) available to the adversary.
As hacking elevated from individuals to large, well-organized, and well-resourced entities, additional
benefits became available to hackers that provide enhanced capability over individual efforts.
Hacker Tools
Hackers rely on two primary categories of tools to facilitate their activities:
Social engineering is the use of content that convinces or encourages people to do something to
accomplish the hackers missionusually something damaging. The tactics vary as methods and tools
vary among different hackers with different objectives. Social engineering relies on non-technical
methods of intrusion that often trick people into breaking normal security procedures. Because it
leverages the human factor, social engineering is one of the greatest threats to organizations because of
the difficulty in controlling individual actions among members or employees.
Numerous techniques are available to the hacker. In fact, this is by necessity, as social engineering
targets human factors, which vary across a wide range of technical, social, and responsibility levels.
Therefore, social engineering encompasses numerous techniques that provide options to influence
many different human perspectives, and may include the following methods:
Spoofing is a technique where one person or program masquerades successfully as
another. This is usually accomplished by falsifying data to make the hacker appear as the
other entity.
Phishing is not unlike going fishing. The hacker attempts to acquire sensitive user
information (such as usernames, passwords, account data, or even directly steal money)
for malicious reasons by masquerading as a trustworthy entity in electronic
communications. This is particularly widespread among e-mail, but may also be used
through false web pages.
Spearphishing is an e-mail spoofing fraud that targets specific organizations in order to
gain unauthorized access to confidential, proprietary, or personal data. This is generally
a technique not used by individuals; rather, spearphishing is often used by perpetrators
out for financial gain, trade secrets, or military information.
Watering-hole Attacks target specific groupsorganizations, companies, industry,
regionto indirectly infect the groups network machines. The attacker analyzes which
Internet sites people from the group are likely to visit, infects the site(s) with malware,
and then waits for an individual from the group to access it. Once the individual is
infected, that person spreads it within the organization, widening access for the hacker.
Known viruses. These are cataloged in anti-virus programs and defenses have been developed
to counter the threatsometimes referred to as inoculating the machine or network against the
virus.
Unknown viruses. These are viruses that are not yet cataloged or do not yet have a
countermeasure developed to inoculate machines or networks. These unknowns may include
exploits developed and for sale to hackers, adaptive viruses, wrappers, and polymorphic code.
Combination. Because an attack does in restricted neither to a single piece of malware nor a
single attacking device or vector, the use of multiple viruses that include both known and
unknown varieties, may be used by hackers.
Threat Timeline
From the last quarter of 2013 through the first quarter of 2014, major network attacks affected large
companies and billions of consumers. These attacks not only affected business systems, but also had the
ability to infect personal systems and mobile devices, such as the Heartbleed and Find My iPhone
attacks. Figure 2 chronicles those threats and the targets affected by them.
DESCRIPTION
Adobe Hack
An estimated 2.9 million customer IDs, passwords, and possibly names & credit information.
Quarian
Backdoor
MS Office ZeroDay Attack
Android/
Hackdrive
OSX/Crisis
Google Play Hack
(Japanese &
Koreans)
Android/Balloon
Popper:
EVENT
Android/
GaLeaker
Turkish Hack
Reveton Variants
Adobe Flash in
Exploit Kit
Target Corp Hack
GnuTu (Linux)
Fail & Apple
SSL/TLS Bug
Heartbleed
Find My iPhone
eBay
Basecamp DDoS
Ransom Hack
Android Balloon Pop 2 Game hack stole WhatsApp conversations from users.
DESCRIPTION
Collected Google (Gmail) IDs, but not associated passwords.
Russian hackers stole 54 million Turkish citizens ID numbers, addresses, fathers names.
Ransomware using random extensions to hide DLLs in batch files like rundll32.exe. Locked
machines and would not release unless user paid ransom fee to unlock.
Replacing earlier versions of the Blackhole exploit after arrest of the writer, this malware used
popup technology to disrupt Adobe software use.
Hackers stole credit and debit card information for over 40 million customers
goto fail programming errors left encrypted data open to hackers.
More recent attacks affected numerous well-known and high-utilization sites (Table 2).
DESCRIPTION
Detected unauthorized access to 250,000 accounts.
Lost thousands of email addresses to a hacker accessed
support information of 3 major clients.
Was attacked by 45 pieces of custom malware, 53
employees systems compromised.
Blames ongoing cyber-attack for a breach, which impacted
2.4 million payment cards.
Resets passwords for 50 million users after detecting
suspicious activity on its network.
Notifies 50 million users that attackers had infiltrated and
gained access to systems.
Indicates up to 160,000 social security numbers exposed by
hack.
Other victims included: Michaels, Home Depot, AOL, Avast, Holiday Inn, Neiman Marcus, P. F. Changs,
and J.P. Morgan Chase.
Advanced Threats
Advanced threats include modern and emerging threats, many of which engage more complex
methods that the simpler and focused attacks of the past. Advanced Persistent Threat (APT)
technology, has evolved at a Moores Law clip since magician Nevil Maskelyne hacked a public
demonstration of apparently secure wireless telegraphy technology in 1903, sending insulting Morse
code messages through an auditoriums projector. Since the dawn of the computer age, people have
used advanced software to target specific companies or individuals in an attack designed to either
damage or steal data. What makes todays APTs unique and frightening are the sophistication of the
malware, the vectors theyre choosing for attack and the perseverance with which theyre going after
their targets.
10
Advanced. Using organized methods, advanced malware, buying new tools constantly
developed.
Persistent. Patient. Using more social engineering combined with malware and codes. Can be
very hard to detect, with expectation of higher payout.
Threats. Designed to attack deliberate choices of target. Credit Card info is cheap on the open
market. Now its about business disruption, massive identity theft, IP theft, spying.
11
From the most basic threats of past years through the development and emergence of APTs, the threats
for computers networks continue to evolve, presenting continued challenges to those charged with the
responsibility of network protectionfrom the network security administrator down to the individual
desktop user. The following section presents discussion on fundamental concepts in modern network
security.
12
13
14
Spam/Phishing Message
Malicious URL
Malicious Applications
Malicious Code
General Known Threats
Unknown Threats
On the other side of the battle are the tools for network security managers:
Anti-botnet
Intrusion Prevention (IPS)
Antivirus/Antimalware
(AV/AM)
Vulnerability Management
15
Anti-spam
Web Filtering
IP Reputation
Application Control
Web Application Security
Database Protection
Advanced Threat
Protection (ATP)
Infrastructure Evolution
In a world growing ever more complex with network portability being built into an increasing
number of devices of varying capabilities, network security continues to evolve in complexity
and importance. In the 1980s a transition from early closed networks to a broader Internet
occurred, with the advent of Ethernet, Bitnet, TCP/IP, SMTP, DNS, and in 1985the first .com
domain name registration. It was not until six years later, in 1991, that the Worldwide Web
(WWW) came into existence; by 1995, what we know now as the modern Internet became
17
Star Trek introduced the idea of floppy disks and flip cellular phones.
The Forbin Project introduced the idea of supercomputers running complex algorithms
that controlled government functions and could potentially supplant human decisionmakers. Later ideas included War Games and Terminator.
1976 the Osborne 1 was the first portable computeralthough not by todays
standards.
The first .com domain was registered in 1985, and the Worldwide Web began in 1991.
The Internet as we know it today did not come online until 1995a mere 20 years ago!
A Japanese company introduced the first smartphone in 1999although it was a
relatively simple device compared to todays smartphones.
Many of us remember the hype around the Y2K bug (would computers go back to 1900
at midnight?). Early programs were written with just the last two digits of the year with
the 19xx assumed
Believe it or not, the first tablet came out in 2002but not as light and useful as todays
models.
The discussion between the labelling and merits of Next Generation Firewall (NGFW)
and Unified Threat Management (UTM) expanded and carried on through 2009, with
Gartner, IDC, and Fortinet in the fray.
2007 saw the introduction of the first iPhone (wow, seems longer ago than that!)
Finally, 2013-2014 turned out to be a year of breaches by advanced threats targeting
specific entities (which we will discuss more in a few minutes).
No longer was high-tech the sole domain of major companies, organizations, and government
agencies, but the global information network became the domain of everyone from multi-billion
dollar international conglomerates to grade school children (Figure 8). As technologies
developed, the industry response was typically the addition of new stand-alone, single- or dualpurpose hardware or integrated hardware-software packages designed to address newly
identified threats. This resulted in a constant state of expensive upgrades that added network
complexity, integration of new devices and scrubbing and repurposing or disposing of legacy
hardware, new policy development and new management consoles. This served to increase
workload, retraining, and complexity for network administrators and end users, exacerbating
the balancing problem between security and productivity.
18
Size Matters
As technology evolved, appliance size necessary to house its components decreased. From early
computers that used vacuum tubes and took up entire rooms, to decreasing media size with
increased media capacity, to unplugging from cables and wires to conduct operations with
mobile devices, the size of computers has decreased while capabilities grew. Today,
smartphones and tablets can accomplish many functions previously requiring larger appliances
with ever-evolving functionality. In fact, with modern remote technology, a smartphone user
19
Advanced Threats
Experienced hackers or groups of hackers possessing significant resources pose an increased
threat to systems and networks, including developing and implementing techniques not
previously used to compromise, gain control of, or shut down service. Advanced Threat
Protectionalso referred to as Advanced Persistent Threat Protectionprovides integrated
measures to detect and block advanced threats. These measures include botnet and phishing
antivirus profiling, as well as zero-day threat protection and using sandboxing to analyze,
identify, and block suspicious code and add the suspicious code profile to the ATP signature
database.
20
Threat Prevention. Intrusion Prevention (IPS), application control, Web filtering, email
filtering, antimalware.
21
22
23
24
25
AD
Active Directory
ADC
ADN
Infrastructure as a Service
ICMP
ICSA
AM
Antimalware
API
ID
Identification
APT
IDC
ASIC
IDS
ASP
IM
Instant Messaging
ATP
IMAP
AV
Antivirus
AV/AM Antivirus/Antimalware
BYOD Bring Your Own Device
CPU
DDoS
DLP
DNS
DoS
Denial of Service
DPI
DSL
FTP
FW
Firewall
Gb
Gigabyte
GbE
Gigabit Ethernet
Gbps
GSLB
GUI
26
IoT
Internet of Things
IP
Internet Protocol
IPS
IPSec
IPTV
IT
Information Technology
J2EE
LAN
LDAP
LLB
LOIC
MSP
NSS Labs
OSI
SPoF
PaaS
Platform as a Service
SQL
PC
Personal Computer
SSL
SWG
SYN
POE
POP3
TCP
Quality of Service
RDP
SaaS
Software as a Service
UDP
SDN
Software-Defined Network
URL
SEG
USB
SFP
UTM
SFTP
SIEM
VM
Virtual Machine
SLA
VoIP
SM
Security Management
VPN
SMB
WAF
SMS
27
XSS
Cross-site Scripting
28
29
30
Application Awareness
Phishing. Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email
in an attempt to gather personal and financial information from recipients. Typically, the messages
appear to come from well-known and trustworthy Web sites. Web sites that are frequently spoofed by
phishers include PayPal, eBay, MSN, Yahoo, BestBuy, banks, and government agencies. A phishing
expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure
hoping to fool at least a few of the prey that encounter the bait.
Risk Management. The process of identifying, assessing and controlling threats to an organization's
capital and earnings. Such threats include financial uncertainty, legal liabilities, strategic management
errors, accidents, natural disasters and information technology (IT) security threats.
Sandboxing. A Sandbox is designed to detect and analyze advanced attacks designed to bypass
traditional security defenses. Sandboxing refers to the process of isolating unknown or potentially
malicious codes to fully execute all functions before allowing the traffic to download into the network.
By analyzing files in a contained environment to identify previously unknown threats and uncovering the
full attack lifecycle, if malicious activity is discovered, Advanced Threat Protection (ATP) can block it.
Security Information and Event Management (SIEM). An approach to security management that seeks
to provide a holistic view of an organizations information technology (IT) security. Most SIEM systems
deploy multiple collection agents to gather security-related events from end-user devices, servers,
network equipment and specialized security equipment like firewalls, AV/AM or IPS. The collectors
forward events to a centralized management console, which performs inspections and flags anomalies.
31
Content Filtering
VPN Capabilities
Load Balancing
Vulnerability. In cybersecurity, vulnerability refers to a flaw in a system that can leave it open to attack.
A vulnerability may also refer to any type of weakness in a computer system itself, in a set of
procedures, or in anything that leaves information security exposed to a threat. Cutting down
vulnerabilities provides fewer options for malicious users to gain access to secure information.
Watering Hole. The watering hole attack method targets specific groups (organization, company,
industry, region, etc.). In this attack, the attacker guesses or observes which websites the group often
uses and infects one or more of them with malware. Eventually, some member of the targeted group
gets infected, resulting in the malware being spread to others in the targeted group.
Web Filtering. Web Filtering technology gives you the option to explicitly allow web sites, or to pass web
traffic uninspected both to and from known-good web sites in order to accelerate traffic flows. The most
advanced web content filtering technology enables a wide variety of actions to inspect, rate, and control
perimeter web traffic at a granular level. Using web content filtering technology, these appliances can
classify and filter web traffic using multiple pre-defined and custom categories.
32