Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Broken Links - Emergence and Future of Software Supply-Chain Compromises

Broken Links - Emergence and Future of Software Supply-Chain Compromises

The last two years have been filled with high-profile enterprise security incidents that shared a common origin: breach of a trusted software provider. In truth, supply chain attacks have played a key role in numerous targeted and opportunistic attacks - many of which flew under the radar - for years. This presentation examines the emergence of software supply chain compromises; the factors incentivizing attackers to adopt this approach; and practical approaches to risk mitigation and defense that enterprises can take in response.

Ryan Kazanciyan

December 06, 2018
Tweet

More Decks by Ryan Kazanciyan

Other Decks in Technology

Transcript

  1. Broken Links: 
 Emergence and Future of Software Supply Chain

    Compromises Ryan Kazanciyan - Chief Product Officer, Tanium Black Hat Europe 2018
 December 6, 2018
  2. MeDoc UltraEdit
 “Wily 
 Supply” Ask.com 
 Partner Network Classic

    Shell
 & Audacity Transmission 2018 2017 2016 2019 HandBrake 2015 Mint
 Linux Altair
 EvLog GOM Media
 Player SimDisk 2016 2013
  3. Elmedia
 Player 2015 CCleaner MeDoc UltraEdit
 “Wily 
 Supply” Ask.com

    
 Partner Network Classic Shell
 & Audacity Transmission Mint
 Linux Altair
 EvLog GOM Media
 Player SimDisk 2018 2017 2016 2013 2019 Net-
 Sarang Web Developer
 +8 Chrome 
 extensions HandBrake PyPi
 10 pkgs npm 
 38 pkgs
  4. Elmedia
 Player 2015 CCleaner MeDoc UltraEdit
 “Wily 
 Supply” Ask.com

    
 Partner Network Classic Shell
 & Audacity Transmission Mint
 Linux Altair
 EvLog GOM Media
 Player SimDisk PDFescape Gentoo
 Linux Vesta-
 PC MEGA
 Chrome
 extension StatCounter phpBB Arch 
 Linux
 AUR ESLint npm 
 event-
 stream npm
 getcookies 2018 2017 2016 2013 2019 MediaGet Net-
 Sarang Docker 
 Hub Docker 
 Hub Web Developer
 +8 Chrome 
 extensions HandBrake PyPi
 10 pkgs PyPi
 12 pkgs npm 
 38 pkgs
  5. Elmedia
 Player* 2015 CCleaner MeDoc UltraEdit
 “Wily 
 Supply” Ask.com

    
 Partner Network Classic Shell
 & Audacity Transmission* Mint
 Linux Altair
 EvLog GOM Media
 Player SimDisk PDFescape Gentoo
 Linux Vesta-
 PC MEGA
 Chrome
 extension StatCounter phpBB Arch 
 Linux
 AUR ESLint npm 
 event-
 stream npm
 getcookies 2018 2017 2016 2013 2019 MediaGet* Net-
 Sarang Docker 
 Hub Docker 
 Hub HandBrake* PyPi
 10 pkgs PyPi
 12 pkgs npm 
 38 pkgs Attacks that delivered signed malware Web Developer
 +8 Chrome 
 extensions * Signed with a different certificate than the original developer
  6. 32%six to ten endpoint agents Ponemon Institute, “2017 State of

    the Endpoint Report” 27%ten or more endpoint agents
  7. 5-7 x # of endpoints 1-3 x # of endpoints

    Large networks (>100k endpoints) Small networks (<100k endpoints) * Measured by total unique instances of installed application versions
  8. Elmedia
 Player 2015 CCleaner MeDoc UltraEdit
 “Wily 
 Supply” Ask.com

    
 Partner Network Classic Shell
 & Audacity Transmission Mint
 Linux Altair
 EvLog GOM Media
 Player SimDisk PDFescape Gentoo
 Linux Vesta-
 PC MEGA
 Chrome
 extension StatCounter phpBB Arch 
 Linux
 AUR ESLint npm 
 event-
 stream npm
 getcookies 2018 2017 2016 2013 2019 MediaGet Net-
 Sarang Docker 
 Hub Docker 
 Hub Web Developer
 +8 Chrome 
 extensions HandBrake PyPi
 10 pkgs PyPi
 12 pkgs npm 
 38 pkgs
  9. 5 million downloads of 17 infected images 12,000 users infected

    400,000 users infected event-stream ~8 million downloads 1.2 million extension users exposed 700,000 web sites exposed
  10. 5 million downloads of 17 infected images ~$90,000 (545 Monero

    coins) https://techcrunch.com/2018/06/15/tainted-crypto-mining-containers-pulled-from-docker-hub/
  11. Elmedia
 Player 2015 CCleaner MeDoc UltraEdit
 “Wily
 Supply” Classic Shell


    & Audacity Transmission Mint
 Linux Altair
 EvLog GOM Media
 Player SimDisk PDFescape Gentoo
 Linux Vesta-
 PC MEGA
 Chrome
 extension StatCounter PyPi
 (10 pkgs) phpBB Arch 
 Linux
 AUR ESLint npm 
 event-
 stream npm
 getcookies 2018 2017 2016 2013 2019 MediaGet PyPi
 (12 pkgs) Net-
 Sarang Docker 
 Hub Docker 
 Hub npm 
 (38 pkgs) Ask.com 
 Partner Network HandBrake Web Developer
 +8 Chrome 
 extensions
  12. phpBB (2018) UltraEdit (2017) Mega Extension (2018) ESLint (2018) Gentoo

    Linux (2018) Web Developer Extension (2017) Elmedia Player (2017) Transmission (2016) Arch Linux AUR (2018) StatCounter (2018) Handbrake (2017) npm - 38 pkgs (2017) PyPi 10 pkgs (2017) VestaPC (2018) NetSarang (2017) MediaGet (2018) npm - getcookies (2018) MeDoc (2017) CCleaner (2017) Ask.com Partner Network (2016) PDFEscape (2018) PyPi - 12 pkgs (2018) Docker Hub (2017) 0 100 200 300 Approximate # of days Initial compromise to resolution < 1 day > 1 month
  13. What • EDR telemetry • On-disk program files & dependencies

    • Normalized application inventory Where • Endpoint coverage (device types, operating systems, organizational units) • Which teams have access to which data?
  14. What • EDR telemetry • On-disk program files & dependencies

    • Normalized application inventory Where • Endpoint coverage (device types, operating systems, organizational units) • Which teams have access to which data? When • How current is the data? • How far back does the data go? • How quickly can you search it?
  15. • Second-stage malware
 • Persistence mechanisms
 • Credential theft
 •

    Lateral movement
 • Data gathering Attackers still need to expand beyond an initial compromise
  16. Where will these startups get their training data or learning

    models? How will they be protected? www.logicalfallacytarot.com
  17. • Software supply-chain attacks are just another means of initial

    compromise - the same foundational principles for detection, containment, and response still apply
  18. • Software supply-chain attacks are just another means of initial

    compromise - the same foundational principles for detection, containment, and response still apply • Ensure you have a complete, timely, and accurate record of all software on all your computing devices - then drive towards stronger governance over it
  19. • Software supply-chain attacks are just another means of initial

    compromise - the same foundational principles for detection, containment, and response still apply • Ensure you have a complete, timely, and accurate record of all software on all your computing devices - then drive towards stronger governance over it • Challenge your enterprise software vendors to attest to their investment and attention to supply-chain risk