Presented at
BruCON 0x0A (2018),
Oct. 4, 2018, 2 p.m.
(60 minutes).
MongoDB, Redis, Elastic, Hadoop, SMBv1, IIS6.0, Samba. What do they all have in common? Thousands of them were pwned. In Azure. In 2017.
Attackers have shifted tactics, incorporated nation-state leaked tools and are leveraging ransomware to monetize their attacks. Cloud networks are prime targets; the DMZ is gone, the firewall doesn't exist and customers may not realize they've exposed insecure services to the Internet until it's too late.
In this talk I'll discuss hunting, finding and remediating compromised customer systems in Azure - a non-trivial task with 1.59million exposed hosts and counting. Remediating system compromise is only the first stage so we'll also cover how we applied the lessons learned to proactively secure Azure Marketplace.
Finally, I will present research I've done into the default security configuration of Azure & AWS Marketplace images and present a call to action for teams working on Azure security offerings
Presenters:
-
Nate Warfield
Nate Warfield is a Senior Security Program Manager for the Microsoft Security Response Center. He spent nearly 20 years designing, building and troubleshooting enterprise & carrier-grade networks for Fortune 500 companies while simultaneously moonlighting as a Grey Hat. He learned BASIC at 8 years old, hacked his first BBS over 2400 baud dialup and has dabbled with everything from reverse engineering and network exploitation to breaking Magstripe/RFID/NFC and bricking Bluetooth devices.
Nate has spoken at several security conferences; including BlueHat 2017, Art into Science 2018, Kaspersky SAS 2018 and Troopers 18.
In his current role he manages vulnerabilities which affect Azure Cloud, Hyper-V and Windows server products – 1.25billion computers are secured every month through his work. He devotes his spare cycles to hunting hacked virtual machines in Azure, adding functionality to OSINT tools like Shodan and teaching others how to Hunt Threats Like A Boss.
Links:
Similar Presentations: