Sie sind auf Seite 1von 26

Architectural

Revolutions
of Cyber
Security
Ken Higuchi
General Manager, Sales
Division
INFOSEC CORPORATION

Introduction
INFOSEC CORPORATION, established in
2001, is a group of cyber security professionals
who provide a broad range of cyber security
solutions and services.
Head Office : Tokyo, Japan
Shareholders : NEC Corporation(60%) Mitsubishi
Corporation(40%)
Employees
: 110
Customers
: Military, Government, Financials, Power
Utilities,
Transportations,
Telecommunications, Broadcasters,
Manufacturers, Educations, etc.
Copytight Infosec Corporation 2015. All Rights
Solutions
: SOC Design/Deployment/Operation,
Pen-2
Reserved.

Crisis : Breaking the


Chain of Trust

CASE-1
Japan Pension
Service
(June 2015)

Cyber Attacks hitting Japan


Pension Service (1)

On June 1st, 2015

Japan Pension Service, a public


organization who manages national
pension fund, announced that
they were attacked by APT malwares,
1.25 Million and
Personal Data

were stolen

Name / Address /
Copytight
Infosec Corporation 2015.
AllNumber
Rights
Birthday
/ Pension
ID
Reserved.

Cyber Attacks hitting Japan


Pension Service (2)
Japanese Government is ready to
introduce
My Number social system from
October 2015

My Number is a unique ID
used
for taxation and pension
Copytight Infosec Corporation 2015. All Rights
Reserved.

Cyber Attacks hitting Japan


Pension
Service
(3)Systems are
If My
Number
compromised by
highly-sophisticated cyber attacks,

WHAT WOULD BE HAPPENED


Unexpected
?
Create Spoofing

Taxations?
Online Accounts ?
Create Malicious
Bank Account?
Copytight Infosec Corporation 2015. All Rights
Reserved.

The Reality is
Here are some examples of recent cases:
using a
stolen Social Security number to obtain thousands of dollars in
credit and then filing for bankruptcy in the name of her victim. More recently, a man was
Central District of California. A woman pleaded guilty to federal charges of

indicted, pleaded guilty to federal charges and was sentenced to 27 months' imprisonment
for obtaining private bank account information about an insurance

using that information to deposit $764,000


in counterfeit checks into a bank account he established.
company's policyholders and

Central District of California.Two of three defendants have pleaded guilty to identity theft,
bank fraud,and related charges for their roles in a scheme to open bank accounts with
both real and fake identification documents, deposit U.S. Treasury checks that were stolen
from the mail, and withdraw funds from those accounts.
Middle District of Florida.A defendant has been indicted on bank fraud charges for
obtaining names, addresses, and Social Security numbers from a Web
(REF)those
http://www.justice.gov/criminal-fraud/identity-theft/identity-theft-andsite and using
data to apply for a series of car loans over
identity-fraud

the Internet.

Copytight Infosec Corporation 2015. All Rights


Reserved.

CASE-2
Remote Control
Trojan
IESYS.exe
(2012-13)

Remote Control Trojan IESYS.exe


(1)

Through Jul-Sep 2012,

4 Japanese men were arrested by the


cyber police, accused of posting murder
and bombing
notices at
th
th SNS

On Oct 9

and 10

2012,

Two letters were posted on the media,


which stated;
I am the guy who posted those
criminal notices using my Trojan
Copytight Infosec Corporation 2015. All Rights
10
Reserved.
iesys.exe. Whats
the hell, police has

Remote Control Trojan IESYS.exe


(2)
Jan 2013,
Two emails was posted on the media, in which
CTF-like (Capture-the-Flag) 5 questions were
described. Police challenged this questions and
found SD-Card with a source code of iesys.exe

Feb 2013,

A man was arrested in Tokyo, accused of


(a)creating iesys.exe and (b)remotely infecting
and controlling the innocent victims by this
Trojan malware
Copytight Infosec Corporation 2015. All Rights
Reserved.

11

Remote Control Trojan IESYS.exe


(3)

The guy claimed I am


innocent too, one of the
victims of iesys.exe!
May 2014, the guy finally confessed that he
did all.
Copytight Infosec Corporation 2015. All Rights
Reserved.

12

Crisis: Breaking the Chain of Trust

Who are you?


Crisis of trust for online
identification

Who is good/bad?
Crisis of trust for intentions
Copytight Infosec Corporation 2015. All Rights
Reserved.

13

If the analogy comes to Banking


Trojans?
Trojan
Infected
Remote
Control

How do
you trust
him?

Unintended
Transaction
Compensatio
n

XX
BANK

Cash
Transfer

XX
BANK

Copytight Infosec Corporation 2015. All Rights


Reserved.

14

Mission Impossible : The


Challenge

Mission Impossible
Given Conditions
a) Endpoint devices (PC/Smartphones) are infected by
malwares
b) User credentials (ID/PW) are compromised
c) Internet traffics can easily be tapped / modified
d) There are certain number of evils at the user side

Distinguish trusted
transactions
under untrusted
Copytight Infosec Corporation 2015. All Rights
Reserved.

16

Mission Impossible: Untrusted


Circumstances Easy to Tap or Modify
ADVERSARIE
S

the Traffics / Data

INTERNE
T

Credential
s

Malicious
Remote Controls

SERVICER
S

USERS

TROJAN

Easy Deployment
of Malicious
Codes & Processes

Bad Guys,
Sometimes
Copytight Infosec Corporation 2015. All Rights
Reserved.

17

Mission Impossible: Five-Step


Challenges
1.
Issue a private key with user-dependent,
2.
3.
4.

specific parameters (Blocking spoofing


logins)
The Servicer can only be connected through
the Trusted Virtual Network (Blocking BadDNS, Man-in-the-Middle)
Traffics between the client and the Servicers
shall be fully encrypted (Blocking Man-in-theMiddle)
Block all the remote sessions excluding
single session
with the edge node (Disabling
Copytight Infosec Corporation 2015. All Rights
Reserved.

18

Im Possible: Blocking Compromised


Account
ADVERSARIE
S
Spoof

Trusted Virtual
Network

Login

SERVICER
S

Edge Node

INTERNE
T

Credential
s

TROJAN

Private KeyUSERS
Machinedependent

Copytight Infosec Corporation 2015. All Rights


Reserved.

19

Im Possible: Disabling Session


Hijack & Trojan
Trusted Virtual
Network

ADVERSARIE
S

SERVICER
S

Edge Node

INTERNE
T
Policy Enforcement
Private Key
Machine
Specific

USERS

TROJAN

Copytight Infosec Corporation 2015.


Reserved.

Session Control
Apps/Process
Control
Traffic Encryption
All Rights

20

Project Ozone
Architectural Revolutions of Cyber
Security

Ozone represents Risk Zero Zone


with
a molecule of three key components of
cyber security

Copytight Infosec Corporation 2015. All Rights


Reserved.

22

WE ARE POSSIBLE - Change the Game


Rules by Ozone

Realtime
Threat
Intelligence

Centralized
Applications
Repository

Realtime
Transaction
Monitoring

OZONE
The Internet
Trusted identity,
Trusted location and
Trusted single connection
Copytight Infosec Corporation 2015. All Rights
Reserved.

Trusted transaction,
Trusted applications,
Trusted location and
Trusted single connection

23

WE ARE POSSIBLE - Solutions


enabled by Ozone

Ozone Network Security

For all the people who want


highly secured network access

Ozone File Security

For all the people who want to


protect their information/data
even if those are stolen

Ozone Transaction
Security
Ozone ID Federation
Platform

For all the people who want


highly secured e-business
environment
For all the people who want to
trust your users

Copytight Infosec Corporation 2015. All Rights


Reserved.

24

For more information,


Please contact
NEC/Infosec.
Copytight Infosec Corporation 2015. All Rights
Reserved.

25

Thank you!

ken.higuchi@infosec.co.
jp
Copytight Infosec Corporation 2015. All Rights
Reserved.

26

Das könnte Ihnen auch gefallen