Title
AWS re:Invent 2023 - Speed, scale & stealth: Securing against ATO events (SEC233)
Summary
- Frank Walsh, field CTO for Human, discusses the importance of securing applications against Account Takeover (ATO) events.
- Attackers are increasingly targeting applications for financial gain, using sophisticated methods to monetize different stages of the attack lifecycle.
- Common attack vectors include credential stuffing, exploiting password reset interfaces, and leveraging stolen credentials.
- The underground marketplace for cybercrime is highly sophisticated, with attackers supporting each other's efforts.
- Security events are increasing in speed and scale, leading to alert fatigue and ineffective "whack-a-mole" strategies.
- Attackers use automation and distribute their activities across numerous IPs and accounts to evade detection.
- The key to defeating attackers is to increase the speed and scale of responses, using automation to counteract their tactics.
- Attackers utilize legitimate tools like Selenium or PhantomJS for malicious purposes, and even monetize attack toolkits.
- Human's defense platform aims to activate defenses that operate continuously, self-improve, and confirm the human identity and intent behind interactions.
- Human offers integration with AWS services like CloudFront and Lambda to help customers prevent ATO and reduce the time spent on managing security events.
- The company was founded by individuals with deep roots in the cybersecurity community and is present at AWS re:Invent to assist with application defense strategies.
Insights
- The presentation emphasizes the evolving nature of cyber threats, particularly the sophistication and organization of attackers who operate like businesses.
- The underground economy of cybercrime is a significant driver of ATO events, with attackers finding new ways to profit from every stage of an attack.
- The traditional reactive security measures are no longer sufficient; proactive and automated defenses are necessary to keep up with the speed and stealth of modern cyber attacks.
- The use of legitimate development and testing tools by attackers highlights the dual-use nature of technology and the need for robust security measures that go beyond simple pattern recognition.
- The integration of security solutions with cloud services like AWS is crucial for a seamless defense strategy that does not impede the core functionality and user experience of applications.
- Human's approach to security focuses on verifying the humanity and intent of users, suggesting a shift towards behavioral analysis and continuous authentication to distinguish between legitimate users and attackers.
- The mention of Human's roots in the cybersecurity community and DEF CON underscores the importance of expertise and a deep understanding of both defensive and offensive tactics in developing effective security solutions.