HomeMy WebLinkAbout07.b. 2016 Central San Security Report 7mbo
2016
CCCSD Securit
e ort
f A summary ofsecurity related events and
in r tia tees or the Central contra costa
Sanitary District.
_ z
J&M L
..f
-4
,I
Central Contra Costa
Sanitary District
Q2 2016
CCCSD SECURITY REPORT
Executive Summary
MALWARE
• The Fire Eye detected and blocked a total of 72 infections in 2016,of which three were classified as
critical and ten were classified as major. The Barracuda web filtering appliance blocked 1.2,728
requests to web pages that contained nialware during the year.
SPAM
The Barracuda spam filter blocked over 2,700 viruses that attempted to enter the organization via
email during the year.
NOTABLE SECURITY EVENTS
• The Intrusion Detection and Intrusion Prevention(IDS/IPS) components were enabled on the
FireEye device in the fourth quarter During this time period, 1,130 critical events were detected
and blocked across 20 different Central San devices.
• The transition.to a new-a nti-sparn/e mail filtering appliance was completed.
• Two security assessments were completed by two independent third party organizations.
• A network,account lock-out policy went into effect for every Central,San network account.
..............-.............................. . ............
Page 1
CCCSD SECURITY REPORT Q2 2016
, ;I&Ct SD
FireE e
Maiware
The FireEye detected and blocked a total of 72 infections in 2016, of which three were classified as critical
and ten were classified as major. One of the critical infections (DTI.Callback) is capable of gaining complete
control of a system and allows the compromised system to launch other attacks against PCs connected to
the same network. The second critical infection (Trojan-Hop-tto) allows malicious software programs to be
installed without consent from the PCs owner,which are then typically used to install malware on other
systems. The third critical infection was a Rasoaiware attack that was blocked before it was allowed to
execute on the PC.
In 2016, Malware created with the Angler Exploit kit was the most common type of malware that was
detected by Fire.Eye.
Top 5 Malware
*FE_Possibte_3igned_32 Oother *Exploit.Kit.MaLvertiseaertt *Exp to it.Dropper.ur[.VVX 4bExp1,oit.Kit.Riq
*Exp to it.Kit.Ang ter
32%
35%
12%
6%
Pacfbe 2
:CCCSD SECURITY REPORT - Q2 2016
ID
Intrusion I t Prgvention
The Intrusion.Detection and intrLision Prevention (IDS/IPS) components were enabled on the FireEye
device in the fourth quarter. During this time period, 11,130 critical events were detected and blocked
across 20 different Central San devices. ]DS/IFS events are an attempt by an attacher to compromise a
computing device as a result of a vulnerability.
Events Summary
1 1 r20
# Hosts
Tap 10 Attacks by Rubs
Rules Description Attack Count
1 Bash Remote Code Injection i,Shetlshock�HTTP CGI headers) 496
2 Squid CVE-2010-3072 Crafted HTTP Request Denial Of Service 388
3 TitnThumb src Parameter PHP File Upload Code Execution 84
4 possible Cross-site Scripting Attack 65
5 Microsoft XML Gore Services Uninitlalized Object Access 41
5 Mozitla products Graphics and XML Features Integer Overflows 32
7 Exirn witti Dovecot LOA sender address Parameter Remote Command Execution 14
S WordPress Slider Revolution Plugin Local File inclusion 6
9 Microsoft Internet Explorer HTML Help Remote Grade Execution 4
Page 3
,►
CCCSD SECURITY REPORT Q2 2016
Spam
The Barracuda spare filter blocked over 2,700 viruses that atterrrpted to enter the organization via email
during the year, 1.S million messages were identified as spam and an additional 814,000 pieces of enla%l,
were throttled.. Throttled messages typically indicate a high arnount of spam being sent to the CCCSD mail
server at once and are presumed to be spaxii.
L���ximit�Email:���
Rate Controlled: 27��
--
Virus:I
Bad Recipient:1 %
Spam :52%
Legitimite Ernail Virus Spam Bad Recipient 0 fete Controlled
Page 4
'-7-P -7csSECURITY
-4n C*�:CN-_ ID,a 1h, CCCSD
Web Filtering: Malware
The Barracuda web Filtering appliance blocked 12,728 requests to web pages that contained nialware
during the year. The large increase in the nuniber of requests to malicious websites in the fourth gLlaftet-
was attributed to an update to the malware scanning engine that caused numerous false positives. IT staff
is in process of investigating the validity of these regUests.
Q1 :834 Requests
Q2:992 Requests
Q3:2629 Requests
82#x9 RequestB
1 0 Q2 Q3 M Q4
Page 5
ID CCCSD SECURITY REPORT Q2 2016
Notable Security Events
• A ransomware attack was detected and stopped before it could execute on a PC, potentially saving
Central San tens of thousands of dollars in staff time that would have been needed to remove the
infection and restore the affected files.
• An email was sent to all district staff informing them that passwords of compromised LinkedIn
accounts were freely available on the internet. Employees were advised to change their Linked1n
p-assword if they had not done so since May 2016 or if their Linked1n password was the sarne or
similar to their district network password.
• The transition to a new anti-spam and email filtering appliance was completed. Service with the
prior solation,Google Apps was terminated.
• A Vulnerability scan was conducted on Central San's internet facing devices as part of the district's
Payment Card Industry(PCI) compliance requirement. No existing high risk vulnerabilities were
detected,however one potential high risk vulnerability was discovered,which was remedied in the
fourth quarter Central SAN was awarded an overall score of"3"on a scale of"S" The industry
average for this type of scan is a rating of"23."
• A comprehensive security assessment was performed on the District's external (internet facing) as
well as internal(private network) systems. The external scan found that adequate protection
exists at the district's main entry point from the internet. The internal scan found several issues
with a wide range of severity, IT staff has formulated a rernediaLion plan that is anticipated to be
competed in the second quarter of 2017.
• An account lock policy went into effect for every network logon in the district. Under this policy,a
network account will automatically lock after five unsuccessful logon attempts. The account will
then remain locked for 30 minutes,after which it will unlock automatically,
0 Intrusion Detection and Intrusion Prevention(IDS/IPS) components were enabled on the Fire Eye
device, These components will help to detect and prevent the exploitation of known
vulnerabilities across a wide range of computing devices in use at Central San.
.. ......... .................... ......
.............. ..............................
Page 6