Conf42 Chaos Engineering 2022 - Online

Defeating Ransomware Attacks with Security Chaos Engineering

Video size:

Abstract

Due to the rapid increase of ransomware attacks in the last year, 2021 was tagged the “Golden Era of Ransomware”. Most ransomware countermeasures recommend backups and runbooks. However, these techniques are seldom verified to ascertain the level of technical efficiency they provide. Furthermore, the human operators who use these ransomware countermeasures rarely have the opportunity to understand how to react to ransomware scenarios. A more effective way is by leveraging security chaos engineering to overcome the aforementioned shortcomings. By conducting planned experiments, ransomware countermeasures can be crafted as a hypothesis and proven. This approach enables security incident response teams to gain confidence in their technical and organizational skills as well as practice how to operate the ransomware countermeasures.

Summary

  • Kennedy Torkura will talk about defeating ransomware attacks with security chaos engineering. Make up real time feedback into the behavior of your distributed systems. Errors in real time allows you to not only experiment with confidence, but respond instantly to get things working again.
  • Ransomware is a type of malicious software that blocks access to data or computer systems. Usually by encrypting it until the victim pays a ransom fee to the attacker. Victims will pay a total amount of about $265,000,000 because of ransomware by 2031.
  • Five main impacts of ransomware attacks. Financial loss, reputation damage, legal implications. Often the case where it either directly violates regulations like GDPR. And of course, it disrupts business.
  • Ransomware is a combination of multiple steps. Before a ransomware becomes successful, it means the attackers have carried out multiple attacks against the infrastructure. And they're also distributed using ransomware as a service, which is another factor that has made ransomware to become very rampant these days.
  • There is a lot of misconceptions about ransomware in the cloud. Attackers are now beginning to target cloud based systems, cloud infrastructures. One of the major drivers of this change of tactics is the Covid-19 pandemic. The line between on premises and cloud systems is blurred.
  • The cloud is not immune to ransomware. These cloud offers in the cloud, these is the shared responsibility model. A lot of the security measures that have to be put in place are a responsibility of customers. We will see an attack in the next few slides that shows how s these buckets are being targeted.
  • The implications of ransomware in the cloud could be worse than the implications in traditional or on premises environments. One of the first layers of ransomware countermeasures is training and awareness. Security chaos engineering is one of the robust ways to prevent yourself from becoming a victim of ransomware attacks.
  • Security chaos engineering is for the protection of the attributes of security. You want to make sure that the security attributes, which are confidentiality, integrity, and availability are not violated. These scenarios are typically based on Amazon Web services and could be applied to even every other cloud service provider.
  • Security incident response in cloud environment introduces a lot of challenges. These challenges kind of impact or kind of limit how efficient runbooks can be. Runbooks have to be updated periodically, as often as possible. Also these runbooks must be aligned with the current state of the infrastructure.
  • Cloud environments are not immune to ransomware attacks they can suffer from. You can use security chaos engineering to check whether you are resistant to ransomware attack. I am readily available for you online or on Twitter to answer your questions around this topic.

Transcript

This transcript was autogenerated. To make changes, submit a PR.
Jamaica. Make up real time feedback into the behavior of your distributed systems and observing changes, exceptions. Errors in real time allows you to not only experiment with confidence, but respond instantly to get things working again. Close. Hello, everybody. Welcome to my talk. Also, welcome to comfortitude Chaos Engineering. My name is Kennedy Torkura. I am the cofounder CTO and c two admitigant, the continuous security verification platform. So this leveraging, I'm going to be talking defeating ransomware attacks, attacks with security chaos engineering. My Twitter handle is up there, and feel free to reach out to me to ask questions regarding my talk. I'm very passionate about this topic, and I'm always wishing, I'm always available to talk about it. All right, so firstly, let us look at ransomware. Right, an overview of ransomware attacks. So, ransomware, what is it? It is basically a type of malicious software, which is actually called malware, that threatens these publish or blocks access to data or computer systems, usually by encrypting it until the victim pays a ransom fee to the attacker. So what ransomware does is it's similar to what kidnappers do in the physical world. They kidnap people and then they ask for some kind of ransom which has to be paid before they release victims. Similarly, this is the same method that the ransomware attackers employ, with the difference that these time around, these attacks, actually happen in the digital space. Now, let us look at some statistics about ransomware attacks that have happened in recent years. And what we have here in this graph. These pie chart is actually gotten from the Zofos report, one of their security reports for last year. And we can see these, that actually there is 79% of ransomware. And this pie chart actually explains the amount of incident response that they carried out, because this is a managed security provider. So they kind of offer services for other companies because of their expertise. And according to the report from last year, most of the incidents, response activities that they carried out were in response of ransomware attacks, 79%. That is really high. Also, there are a lot of statistics online if you check about ransomware in the last one year, 18 months. So what we see from sonic wall is that there is 148% increase of ransomware between Q two of 2020 and Q two of 2021. A lot of ransomware attacks. Also, we see ransomware attacks, about 190.4 million ransomware attacks, just as at q three of last year. The same from sonic wall. There is also an interesting report, actually, this is from the FBI. The FBI in the United States specifically, these have received complaints just in the first half of last year, 2084 complaints about ransomware and of course, talking about finances. This time around, according to cybersecurity Ventures, victims will pay a total amount of about $265,000,000 because of ransomware by 2031. So these are just some statistics about ransomware, how prevalent it is, how it is expanding, how it is becoming a very huge problem for enterprises and even people. And it just goes to say how important it is for us to begin to take care of or to begin to prevent ourselves from becoming victims of ransomware. All right, now, we already looked at some of the impacts of ransomware, but here I just want to highlight on five main impacts of ransomware attacks. Of course, the first is financial loss. As we have seen, there's a lot of loss of financial. Companies have to pay a lot of money to the criminals that are behind these ransomware attacks. There's also data laws because oftentimes, even after paying ransom, the agents, the malicious people behind ransomware attacks, they do not return all the data. Sometimes these don't even return. They don't even hand over the encryption keys or even if these do that, these are reports that the victims are never able to recover. All the data that got missing, got lost as a result of the attack. And of course, these is also reputation damage. Okay, so the reputation of a company is badly smeared. If they fall victim to these attacks, they have to do a lot of communication tactics, firstly to their customers, to their investors, to the public. They have to apologize. And it's a bad reputation for a company. And they have to spend a lot of money, a lot of resources to be able to repair this reputation if they are ever able to do that. Legal implications also, this is really huge nowadays, especially for companies that are in Europe, we got the GDPR and usually what around somewhere, as we'll see later on, is a culmination of many attacks. Right? The attackers go through multiple steps. And it's often the case that some of these attacks actually expose data, as we have seen. And it's often the case where it either directly violates regulations like GDPR, or it's also the problem where customers of a company that is a victim of ransomware actually take the company to the court. They take the company because sometimes ransomware impacts their own activities. It makes the customers lose money, it makes them lose resources, and they take the company that provided a service to them to court and becomes a legal case. And of course, it disrupts business. Right? In Germany here, a few months ago, a company called Mediamact, which is one of the biggest online retail shops, they were attacked by ransomware. Now, this ransomware actually made it impossible for PoS systems to be used in the shops so the people could buy, they could not actually pay for services for products these bought. And this disrupted a lot of business activities. So ransomware, one of the biggest impacts it has, which we feel immediately, is the fact that was a company, your business is disrupted, you cannot serve your customers, you cannot go about your normal activities. It's a big pain. All right, now let us look at the steps, right? And as I said before, ransomware is a combination of multiple steps. In fact, before a ransomware becomes successful, it means the attackers have carried out multiple attacks against the infrastructure, against the victim. And in the end, they are able to kind of identify that material, they're able to identify that resource that is very critical to you, so critical that they can place a huge amount of money and you're going to pay. So what I'm showing here on the screen is about a specific ransomware called winter two. And this, Rama, is actually a ransomware that targets windows operating systems. And usually the infection vector is through RDP. And they actually also use phishing attacks to target their victims, which might be employees of a company, they might be normal individuals. And they're also distributed using ransomware as a service, which is another factor that has made ransomware to become very rampant these days. Because what ransomware as a service does is it lowers the entry barrier for people who want to conduct, who want to use these attacks because they don't need to have, again, the technical capabilities to develop ransomware. These don't have to write it from the scratch. They just go to the service provide of ransomware, which are usually available in the dark web. And they go there and buy the tools and they even offer them services and they buy it at a cheap rate and they are able to use it. So the important thing about this slide here is just to show the attack can of Wadrama. So Wadrama, as I said before, starts with an RDP brute force attack, and then the next thing is it scans for connectivity and also for new targets. The interesting thing in step three there is you see that the ransomware itself, tons of security controls, so it has the capability to identify that you're using maybe some firewalls or some antivirus devices or any software that might detect its presence, and it switches it off. It does another network reconnaissance to kind of understand your network, to understand your keys to the kingdom, to understand what kinds of resources are more critical to you. As a victim, based on that, it might move, literally, it might move from one resource to the other, from one network to the other. And other things, as you see in step five that might occur is credential theft. So they begin to see your credentials. They want to gain root access to certain resources in your network. They place a backdoor so that they can actually, if at all, you detect them at this point in time and you flush them out of the system, they leave backdoors which will enable them to come back to your system along the way, you see, they also have con miner to mine bitcoins in the victim system. And the last step, which is step eight, is where they actually ask for ransomware. So you can see that there's a lot of work that they have to do. There's a lot of security loopholes that they have to exploit along the way. Eventually, they arrive at a place where they feel confident enough that they have verified a resource that is so important that they can place a high price tag on it and they can force their victims to pay for this resource to be returned or to pay for the decryption key of the resource. Okay, so we have looked at ransomware, and now how about these cloud. Okay, so do we have ransomware that happen in the cloud? There is a lot of misconceptions about ransomware in the cloud, and we're going to be looking at some of those ones. Firstly, what we have seen in recent years is that ransomware has actually, the attackers, the perpetrators of ransomware attacks, are now beginning to target cloud based systems, cloud infrastructures, cloud native systems. And why is that? Well, one of the major drivers of this change of tactics is the Covid-19 pandemic. All right, so Covid-19 has come and we are still in the pandemic. Hopefully, we are out of it very soon. However, many companies have realized that they have to transform these infrastructure. They are undergoing the digital transformation and they are moving to the cloud because these cloud offers for them most of those facilities that will help their systems to be agile, to be elastic, to be robust. One of the major problems about moving to the cloud, amongst many other challenges that people face when they move to the cloud, is the fact that especially for companies, for enterprises that have both on premises and cloud systems, the line between on premises and cloud systems actually is blurred. Right. It is blurred because some cloud service providers make it so easy for the on premises and the in cloud infrastructure to connect. And so this connection becomes a good bridge for attackers to also leverage. And they can actually leverage such connections to easily attack or to move, move laterally from on premises systems to cloud based systems. The next thing is misconception. So one of them that I have heard about is the cloud is immune to ransomware, right? The cloud is not immune to ransomware. Cloud is not immune. These cloud offers in the cloud, these is the shared responsibility model, which is one of the models that is not well understood by most customers or most people who migrate to the cloud. Right. As a user of the cloud, you got your own responsibility. You have a lot of things to take care of, especially everything that is referred to as a logical security measure. You got to take care of it. So because of that infrastructure like object story, like x ray buckets on AWS, a lot of the security measures that have to be put in place are a responsibility of customers. And we will see an attack in the next few slides that actually shows how s these buckets are being targeted and being used, have been targeted during ransomware attacks. All right, so one of the key things I wanted to take from this slide is that the implications of ransomware in the cloud could be worse than the implications in traditional or on premises environments. And the major thing is because firstly, most cloud resources are misconfigured. According to Gartner, 99% of cloud resources are going to fall to attacks because of misconfigurations. So there is a high chance that attackers are going to get access, they're going to get privileged access, are they going to leverage it, and they're going to get access to resources that they can use for ransomware. All right, so what are the countermeasures that are in place now? There are a lot of countermeasures that have been put out there for ransomware. A lot of them are written provided by the cloud service providers themselves. There are also countermeasures that are provided by different security vendors or security organizations. One of the important things, as we have seen, that ransomware is a combination of multiple attacks, is that you have to enable a defense in depth security architecture. Your security architecture has got to be layered. It is a layered security system that can actually detect or proven ransomware. So what we see on this slide, these is basically a very nice way of describing defense in depth. We see that one of the first layers of ransomware countermeasures is training and awareness. Right. You have to train your employees. They have to understand the basics of cyber hygiene. They have to understand that they are targets to things like phishing emails, and they have to avoid the temptation of clicking links that seem malicious. So basically, there are four main types of controls. When we talk about defense in depth, there are the preventive controls, which include things like firewalls, authentication and authorization, identity and access management systems. These are also the detective controls, which actually detect malicious activities in your environment that might be indicators of compromise regarding sims and login systems. Then we also have recovery controls. Right? Recovery controls are those controls that will help a compromised system to come back to life to resume its normal activities. And what are these controls? These include things like backups, disaster recovery methods, incident response, and of course, I've already talked about security awareness. In summary, most of the ransomware countermeasures fall under these four controls. Now, you might be wondering, okay, what has this to do with security chaos engineering? Right? And I'm here today to tell you that security chaos engineering is one of the robust or one of the best ways you can actually prevent yourself from becoming a victim of ransomware attacks. Now, security case engineering is the identification of security control failures through proactive experimentation to build confidence in the system's ability to defend against malicious conditions. Right. And we're going to be looking a little bit into it. We are in chaos engineering conference. So I want to believe that most of the audience already are sort of used or have heard of chaos engineering. Chaos engineering. Security chaos engineering, actually, it implements most of the techniques or the methods or the approaches of chaos engineering. However, this time around, the focus is on security. The focus is on security attributes, on confidentiality, integrity, and availability. All right, so let's look at how security cares engineering is what it actually means. So basically, in security career, the first thing that you do in security case engineering is to define your hypothesis. In these case, you're talking about security faults. It's about injecting security faults into your infrastructure so that you can verify if the security controls are functioning was you expect them to function. All right? And this infrastructure could be code, source code, could be things like docker containers, could be cloud infrastructure, could be kubernetes clusters. In the end, you're actually conducting those security faults so that you will perceive or you will verify if your preventive controls, like the ones we just talked about in the last slide, if they are working as they should work. And because this is security, at the end of the day, there are three main things in your infrastructure or in your security architecture that you want to prevent, right? You want to make sure that the security attributes, which are confidentiality, integrity, and availability are not violated. Any violation of these is a security breach. It's a security problem. It might lead to cyberattacks, it might lead to a lot of problems. So at the core of security chaos engineering is for the protection of the attributes of security, which are confidentiality, integrity and availability. Now let us look at an example scenarios of a ransomware. In this case, it is a bucket ransomware attack. Now, during a bucket ransomware attack, the attacks basically, and there are various ways this could be conducted. The scenario we're going to be using today is just a hypothetical one which might happen. So in these case, firstly, the attacker creates a user called Bob. And after creating these user, that user, Bob tries to get access to an EKS cluster, a kubernetes cluster on Amazon Web services. By the way, these scenario is typically based on Amazon Web services and actually could be applied to even every other cloud service provider since they have similar. So. Well, Bob tries to get access to the EKS clusters. He's able to get access to it. He compromises one of the clusters, a pod in the cluster. From there, he gets to understand that this pod is actually looking towards an s three bucket. And this pod is actually either dumping information or retrieving information from an s three bucket. And it's able to understand that that s, these bucket actually has information that is very critical, maybe things like credit card information or Social Security numbers or it could be anything that is very delicate for the company. And so the next thing it does is to move forward, take over the bucket, encrypt it, request for ransomware. And that is more or less the lifecycle of a ransomware attacks. Okay. What's interesting for us here is, well, in this scenario could be actually a security chaos engineering experiment that you're conducting for your AWS infrastructure. And what you're going to be looking for, firstly, is in the first step of this attack, let's call it in this attack actually, where a user is created, you want to understand, okay, the detective controls that have been put in place. And this could be like cloud security posture management systems. It could be like the AWS config. These are security controls that should identify when unauthorized access is carried out or these should actually identify unauthorized access. They should identify when people who are not supposed to create new resources are creating new resources like a user. And this is something that you will expect these kinds of tools to detect in the next step. As we discussed, the attacks went forward and got access to an eks cluster and then went forward to compromise one of the pods. Right. And from a security standpoint, you're going to be interested to understand whether these activities that were done by the attacker before he successfully compromised a pod, if any of the Kubernetes security controls detected this exploitation, if it was detected, whether threat detection tools like AWS guard duty or security hub that are actually supposed to detect the range of activities that will be conducted, understand, by an attacker to be able to really conduct this attack. Okay. And now we get to the point where the attacks actually compromises the s, these bucket. And even in this case, these are a lot of activities. Like I said, for the attacker to identify that this bucket has sensitive information, there is going to be a lot of reconnaissance, there's going to be a lot of probing attacks, and these are attacks that should be detected. These are specific commands against an s three bucket that should be deemed as malicious. And you will expect also, again, that things like the access analyzer of AWS that kind of identifies when access to resources are suspicious, you expect it to kind of fire up an alert or from the security hub and such tools. Yes. And we finally get to the point where the attack is successful. And as a victim, you're already asking yourself whether to pay or not to pay because you already saw the request from the attacker for a ransom, right? And this is the point where incident response is actually triggered. Incident response in most cases is triggered at the end, after the attack is almost successful or is already successful after these ransom has been requested for. Of course. And these is the point, again where things like backups are, people begin to try to trigger their backups to bring their system back to life, to resume their business activities. And you want to ask whether are your backups even accessible? Are they usable? Are these already corrupted? Are they run books that you use for incident response? Are they even accurate? Are they functional? Are they updated? Now these are questions that are very interested, very interesting from a security chaos engineering experiments. So how do we even run these experiment? So there is a concept of game days, which are specific periods that are set aside to conduct security chaos engineering experiments, right? So game days are usually used by DevOps, by sres, to conduct experiments that kind of test how robust or their systems are, how available they are, how they can respond to incident response. But security game days this time around are with a security focus. I will not go into details of the components of people who should attend this sort of security game days, but essentially you're going to be having your security team there. You're going to be having maybe some sres, anybody who is actually part of the security incident response mechanism or lifecycle. You want that person to be part of the game days, part of the security game days. All right. Now you might also be thinking about what kinds of security activities should constitute or are good candidates for security chaos engineering. And there is a very good resource that was released by Amazon Web Services called these ransomware risk management on AWS using the NIST cybersecurity framework. And in this document, there are a lot of possibilities. These are a lot of recommended practices that should constitute either prevention, detection, or recovery from ransomware. Agreed again, that these are very specific to Amazon Web services, but again, they are similar resources that you will find in other cloud service providers. So what are these things? There are things like, we have already mentioned some of them. Things like checking if backups are already in place, whether they are well configured, corruption testing, deny listing, looking at things like your EC, two security groups, route 53, if all of these AWS resources are well configured to prevent or to detect or to even recover from ransomware. So go check these resource out and I'm sure that you're going to have some good insights as in where to start running your game days from. One important topic I want to talk about here is about continuous verification of runbooks, right? So we all know that runbooks are extremely helpful for security incident response and also for even normal incident response. Basically, runbooks carry these compose of certain steps that are written that can be executed in an incident response scenarios and which helps these operators to actually be a little bit help the operators to be a little bit proactive. Now, runbooks are very useful. However, security incident response in cloud environment introduces a lot of challenges, right? And these challenges kind of impact or kind of limit how efficient runbooks can be. All right. One of the challenges is because in the cloud infrastructure is constantly changing. Infrastructure is not static. Therefore, this means that runbooks also cannot be static. Runbooks have to be updated periodically, as often as possible. And also these runbooks have to be aligned with the current state of the infrastructure. And this is very important because security teams, they gain confidence by exercising runbooks. All right, before I conclude, I just want to highlight about some relevant resources. Since I come from an academic research background. During my doctoral research, I did a lot of research about security Chaos engineering. And some of these papers are already published. And if want good materials that will support your security chaos engineering journey. Yeah, these are some nice materials that will help you. And I also had a chance to be one of the contributing authors to the first book on security chaos engineering. And this was released last year. I was very lucky to be invited by Aaron Reinhardt and Kelly Shortridge. And this book has also very good content around security chaos engineering. All right, so this is the last slide. And, yeah, just to mention some important points again. Firstly, ransomware is a real threat. Cloud environments are not immune to ransomware attacks they can suffer from, and there are attacks that happened in real life. Also, security chaos engineering provides for you, means that you can verify your security posture. And this includes ransomware. Right. You can use security chaos engineering to check whether you are resistant to ransomware attack, to check if whatever measure that you have put in place to either detect or prevent or even recover you from ransomware. You can actually use security chaos engineering to check whether those controls are working as you kind of expect these to work. All right, so thank you very much for listening to my talk. I am readily available for you online or on Twitter to answer your questions around this topic. Have a nice conference. Right.
...

Kennedy Torkura

Co-Founder & CTO @ Mitigant

Kennedy Torkura's LinkedIn account Kennedy Torkura's twitter account



Join the community!

Learn for free, join the best tech learning community for a price of a pumpkin latte.

Annual
Monthly
Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Delayed access to all content

Immediate access to Keynotes & Panels

Community
$ 8.34 /mo

Immediate access to all content

Courses, quizes & certificates

Community chats

Join the community (7 day free trial)