account-takeover the anatomy of · 2018-11-06 · key takeaway modern password authentication...

49
The Anatomy of Account-Takeover Grzegorz Milka ([email protected])

Upload: others

Post on 20-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

The Anatomy of Account-Takeover

Grzegorz Milka ([email protected])

Page 2: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Financial data Personal data Contacts Identity(impersonation)

Online accounts are valuable targets

Page 3: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Data breaches are always there

Page 4: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

https://techcrunch.com/2017/08/23/i-was-hacked/

And so are targeted hijacks

Page 5: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

We want to protect all users,and today we discuss

passwords.

Page 6: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Key takeaway

Modern password authentication requires a risk-aware,

defense-in-depth system.

Page 7: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Password theft ecosystem

Page 8: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Malware (Keyloggers)

The three avenues of password theft

Data breach Phishing

Page 9: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

© “Wall-e” 2008

Commoditization of abuse

Page 10: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Data breach market Keyloggers Phishing kits

The wares on sale

Page 11: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

In 2016, we have collected over 4000 data breach dumps with over credentials.3.3B

Markets can be tracked

Page 12: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

12%-43%*reuse rate

*”Data breaches, phishing, or malware?”

Users reuse passwords

Page 13: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

17%*reuse rate

* internal estimate

Users reuse passwords

Page 14: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Number of valid Google passwords found in data breaches:

67 Million

Page 15: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Volume of credentials stolen in 2016*

*all services, lower bound

Keyloggers>1M

Data breaches>3.3B

Phishing>12M

Page 16: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Hijacking likelihood*Compared to a general active account, how much more likely it is that you will be a victim of hijacking if we know:

*lower boundHad a keyloggerYou were in a breach Were phished

>10x >40x>500x

Page 17: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

PreventionSign-in risk detection

Challenges

Page 18: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Modern password authentication requires a risk-aware, defense-in-depth system.

Key takeaway

Page 19: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system
Page 20: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Safe Browsing

Page 21: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

We notify compromised users and ask them to change their password.

Page 22: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Prevention

Sign-in risk detectionChallenges

Page 23: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Password-only authentication is risky.

Page 24: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

<10%2FA

~12%Password managers*

Of Americans*Pew Research Center

Of active Google accounts

Adoption of additional security is low

Page 25: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Image courtesy of Dr Frank Stajano, “Passwords and the Evolution of Imperfect Authentication”

Sign-in risk detection

Page 26: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

How surprised we are to see you login like that?Unusual location, device, time

How suspicious does the login look?● Similarity to known hijacking

patterns● Is user at risk?

Dimensionality of risk

Page 27: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Hijackers adapt.

Page 28: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

~83%phishing kits

In the end, we don’t look at user’s location for many users.

$message .= "---------------+ Begin +--------------\n";

$message .= "Email : ".$_POST['Email']."\n";

$message .= "Password : ".$_POST['Passwd']."\n";

$message .= "---------+ IP Address & Date +---------\n";

$message .= "IP Address: ".$ip."\n";

$message .= "Country: ".$country."\n";

$message .= "Date: ".$adddate."\n";

Geocloaking

Page 29: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Prevention

Sign-in risk detection

Challenges

Page 30: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Dynamic 2FA: Ask for additional verification

When the sign-in is risky That is solvable by the user

Page 31: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Modern password authentication requires a risk-aware, defense-in-depth system.

Key takeaway

Page 32: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

2 things that can go wrong

Page 33: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Hijacker gets in

“The burglar” by Eastlake Times (https://goo.gl/yh4zyB),CC BY 2.0

Page 34: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

User is locked out

Page 35: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Choose the challenge that minimizes damage

MAIL VERIFICATIONAllow SMS CODE GOOGLE PROMPT Deny

Page 36: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

10%Of users

have problems passing this challenge

Secondary e-mail verification

Page 37: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Vulnerable to password reuse

Secondary e-mail verification

Page 38: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

SMS code

Vulnerable to phishing...18% of observed phishing kits collect phone data.

… and other methodsThere are multiple ways to get the SMS code besides phishing.

Page 39: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

https://techcrunch.com/2017/08/23/i-was-hacked/

Page 40: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

SMS code

Most successful hijackings of high-value 2FA-accounts involve breaking the SMS code.

SMS code interception happens in targeted attacks as well as in opportunistic ones.

Page 41: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

“by January 2016, [the number of phone hijackings] had increased to 2,658.”

Lorrie Cranor, FTC Chief Technologist

SMS code

Page 42: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Google Prompt

Nothing stops the user from just clicking “Yes”

More flexibleWe can present more data and use additional signals for risk-analysis

Page 43: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

In-session detection

Page 44: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Hijacking monetization

Viral-phishing and scams

Theft of personal data

Spamming and product abuse

Page 45: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Bringing the user into the loop

Page 46: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

20:54:24 | LOGIN (new) |20:55:51 | MAIL_DELETE | 1 (new device notifn.)

Finding the hijacker in-session

Page 47: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

20:54:24 | LOGIN (new) |20:55:51 | MAIL_DELETE | 1 (new device notifn.)21:01:30 | EXPORT_CONTACTS |

Finding the hijacker in-session

Page 48: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

20:54:24 | LOGIN (new) |20:55:51 | MAIL_DELETE | 1 (new device notifn.)21:01:30 | EXPORT_CONTACTS |21:06:45 | MAIL_SEND | with phishing links21:07:50 | MAIL_FILTER | “hacked”->Trash21:08:07 | LOGOUT |

Finding the hijacker in-session

Page 49: Account-Takeover The Anatomy of · 2018-11-06 · Key takeaway Modern password authentication requires a risk-aware, defense-in-depth system

Modern password authentication requires a risk-aware, defense-in-depth system.

Key takeaway