Web Breach Incident Analysis and Countermeasures
MONITORAPP’s Business Division Pilyong Yoon- Deputy Manager
Due to smartphones, internet access is now easier than ever and with the internet, the web, shopping, delivery, and banking are easily accessible. However, with this convenience comes the risk of hacking. This article will look at how to analyze web incidents and how to deal with them.- Contents -
Summary
Analysis
Action plan
1. Summary Web servers have to provide public services so it’s delivered through HTTP and HTTPS protocols using 80 and 443 ports. Hence, it is a common practice to install a firewall on top of the network security infrastructure and set its inbound policies to only allow 80 and 443. Because the web service ports are open to the public, hackers started to attack vulnerabilities on the web. Hacker’s targets have changed throughout history. At the beginning of 2000, when the internet was less popular, hackers simply attacked to show off their skills but recently hackers have been targeting personal information and planting ransomware for financial gain. Below are some of the well-known hacking incidents. *Note that these incidents happened in South Korea.- Auction site hacking incident (August 2008)
- Damages: More than 10 million personal information leaks
- Hacked the DB server through the web
- Nate (SK coms) hacking incident (July 2011)
- Damages: Over 35 million personal information leaks
- Internal PC was infected through a file compressor software update -> Accessed the DB server through the infected internal PC
- EBS hacking incident (May 2012)
- Damages: Over 2 million personal information leaks
- Server hacking (web shell upload) using the web community board vulnerability
- 20 cyber terrorism (March 2013)
- Damages: Internal system destruction of a major financial/media companies using malicious codes
- Gained access to primary and secondary C&C (command control) servers using the web community board vulnerability -> Infected internal PCs using malware -> Spread malware to collect internal information using the C&C server -> Infected and destroyed the updated management server by distributing malicious codes to the internal corporate system.
- Analysis Procedure
- Information/data collection
- Collect relevant data through the help of the related parties such as the clients and the admins
- Collection of the breached files
- Breached server info (IP/OS/Application)
- Breached domain and URL info (www.monitorapp.com, index.html)
- Whether similar incidents happened in the past
- Weblog
- OS event log
- WAF information collection
- Collect a month worth of logs from the breach date
- Export a list of protected web servers
- Check SW/HW bypass information in the audit log
- Collect system logs during the breach using GUI
- Check the time stamp on the webserver and the WAF
- Was the breach actually through the web?
- There are no logs, no suspicion.
- Did they delete the log? WAF log as well?
- Breach incidents can have many points of entry so guidance is needed for clients and admins to check for various possible breach points.
- ex) Infected developer’s PC / FTP service/ file sharing services, etc.
- Verify if the breach is through the web and if there is a possibility of another attack
- Temporarily build a packet dump server through tap switch or S/W mirroring on the network above the WAF
- Strengthen WAF security policies and weblogging
- Action Plan
- A1:2017-Injection
- Application countermeasures
- You can prevent malicious queries from being inserted by validating query values on the web server or the web application. You can prevent malicious syntax insertion by configuring the web application so that it only has the privileges needed to perform its function.
- The internal application must be configured so the query is not visible in the parameter.
- WAF countermeasures
- When it comes to SQL injection policies, keep exception handling to a minimum, and operate as a block mode.
- Make sure you use the latest pattern update.
- A3:2017-Sensitive Data Exposure
- Application countermeasures
- If you discover a personal information leak (social security number, credit card number, EIN, business license number, phone number, email, bank account number, address, etc.), block the whole page, or block out the sensitive information in the output. You must be cautious when using personal information in any case.
- With stricter personal information laws, encryption is required when it comes to personal info.
- WAF countermeasures
- If for some inevitable reason, some personal information must be displayed, then you must configure the setting so that certain digits are not displayed.
- When implementing SSL, the decryption function is automatically supported so this can help prevent the exposure of personal info.
- A5:2017-Broken Access Control
- Application countermeasures
- Except for public sources, “block” should be the default policy.
- Instead of granting authorization to certain users, only give authorization to the owner.
- Disable directory listing function on the webserver and make sure important data or backup data are not on the web route.
- If access control fails, then logging in should be required, and if repeated failed attempts occur, an alarm should be sent to the administrator.
- WAF countermeasures
- Set the method to only use GET and POST. When using WebDAV, only allow a minimum amount of access to the domain in question.
- Configure the WAF to block directory access and listing attempts.
- Configure to block unnecessary request attempts by setting positive/negative policies regarding web extension.