- Details
- Category: Security News
Data Loss , Network & Perimeter , Risk Management
Security Experts Outline Enterprise Defense Essentials
The recent dump of attack tools linked to the Equation Group, which is widely believed to be tied to the U.S. National Security Agency and its Tailored Access Operations team, has triggered despair in technology circles (see NSA Pwned Cisco VPNs for 11 Years).
See Also: Top Trends in Cybercrime; 411 Million Attacks Detected in Just 3 Months
The thinking goes: If the NSA - and by extension any other top-flight intelligence agency - can develop attack tools to seemingly hack into almost any technology to gain access to networks, decrypt encrypted traffic and monitor targets, what hope do any organizations or individuals have that they can secure their data or systems?
As Jeff Pollard, a principal analyst focused on IT security at Forrester Research, told The Washington Post: "What is a company supposed to do when the very technology that they bought to protect them makes them vulnerable?"
Here are five takeaways from the Equation Group attack tool dump:
1. Intelligence Agencies Crave Exploits
The leak of Equation Group attack tools designed to exploit flaws in widely used software and hardware has once again prompted some information security researchers to demand that intelligence agencies such as the NSA and its sister British intelligence agency, GCHQ, promptly disclose such flaws to affected vendors. That's because the same flaw could have already been discovered by other intelligence agencies or cybercriminals.
"The question it really opens up is, 'Should NSA/GCHQ disclose the vulnerability so that manufacturers can close the hole?'" says Alan Woodward, a computer science professor at the University of Surrey. "In the past, GCHQ has done that. But it shows that these agencies have two roles: one is to gather intelligence via electronic means, and one is to keep us safe - a balance I don't envy them."
Many intelligence agencies, furthermore, actively search out these flaws, with the NSA reportedly sometimes hiring former employees from U.S. technology firms to help it reverse-engineer software and hardware.
That's why government vulnerability-sharing programs are "an exercise in optics," a.k.a. smoke and mirrors, says Michael Tanji, CSO of cybersecurity firm Kyrus - and a former U.S. Army signals intelligence analyst - in a blog post. "'Of course we'll cooperate with your vulnerability release program,' says every inter-agency representative. 'As long as it doesn't interfere with our mission,' they whisper."
But many related exploits aren't necessarily useful outside of intelligence circles. "One thing that is notable about many of these exploits is that they assume you are already inside the enterprise or have had access to the kit somewhere to taint it," says Woodward, who's also a cybersecurity adviser to the EU's law enforcement intelligence agency, Europol. "That is not the sort of thing a private hacker would do - they tend to attack from outside."
2. Ditch Outdated Devices
One target of an Equation Group attack tool - named BENIGNCERTAIN - are Cisco PIX devices. But intelligence agencies are not the only ones targeting vulnerable equipment. Botnet-building cybercriminals have also been exploiting known vulnerabilities in PIX devices located in a number of countries, including Russia and Pakistan, according to U.K.-based security researcher Kevin Beaumont.
That's despite Cisco having stopped selling PIX devices in 2009 and ceased supporting PIX devices altogether in 2013.
As of Aug. 19, however, British security researcher Mustafa Al-Bassam counted at least 15,000 PIX devices still being used, including 9,000 in Russia and nearly 3,000 in the United States.
There's actually over 15,000 Cisco PIX firewalls online today vulnerable to BENIGNCERTAIN, most of them in Russia. pic.twitter.com/rmwHBEyGW9
Clearly, organizations are not heeding vendors' advice to discard older, unsupported IT equipment. Culprits include the recent global recession, as well as information security - and IT - still being viewed by many organizations as being a cost center, says Brian Honan, who heads Dublin-based cybersecurity consultancy BH Consulting. And that leads to an "if it ain't broke, don't fix it" mentality around replacing software and hardware.
"CISOs need to get their senior management to focus on the benefits of a mature cybersecurity program and not on the costs," says Honan, who also advises Europol on cybersecurity matters.
"There are other areas in the business where costs cannot be ignored, such as health and safety and fire prevention, where legally companies have to replace outdated or end of life equipment," he adds. "However, we do not yet have that type of mature environment within cybersecurity that results in CISOs having to make a strong business case for more investment in security."
Security experts say that most products, once they lose support, can no longer be trusted to be secure. "The point when older kit should be jettisoned is simple - when it is no longer supported 'properly,'" University of Surrey's Woodward says. "I would also say that if some fundamental flaw is found in the software or hardware then it should also be binned. It is very easy for people to forget equipment that is performing a vital security task and at that point you are the weakest link."
That doesn't mean vendors should have carte blanche to stop supporting older products just because they're trying to sell customers new ones. "You should expect equipment to last for a decent amount of time, and it is part of due diligence to ask vendors expected life of the equipment and software," Woodward says.
3. Enterprises Must Defend Themselves
The Equation Group leak is a reminder that intelligence agencies' missions are not to report flaws to technology vendors. As Tanji writes in a blog post, "Intelligence agencies are not here to defend your enterprise."
Tanji says intelligence agencies "exist to gather information, analyze it, and deliver their findings to policymakers so that they can make decisions about how to deal with threats to the nation. Period."
So don't expect intelligence agencies to take responsibility for vendors selling secure products with bug-free code. For that, enterprises must hold their vendors directly accountable.
It absolutely blows my mind that a handful of people on Twitter had to drive the research on #BENIGNCERTAIN, push for vendor acknowledgement
4. Treat All Vendors With Caution
The Equation Group toolset dump - as well as exploitable flaws in firewall vendors' products - are reminders that no piece of hardware or software can be treated as 100 percent secure. So organizations should subject all vendors and products to a risk assessment to help them pick the best and most secure tool for the job, Honan says.
"Companies should consider a layered defense approach to their security whereby they use security solutions from different vendors in order to continue to provide some level of security in the event one layer fails or is compromised," he adds.
5. Continuously Monitor Your Networks
Clearly, any component of IT infrastructure - especially firewalls and VPN appliances - is a target for enterprising attackers, be they foreign intelligence agencies, cybercrime gangs or teenagers with too much time on their hands. "If you run a firewall installation at a large organization, now would be a good time to start logging incoming traffic for oddities," British researcher Al-Bassam says via Twitter.
Honan, who founded Ireland's first computer emergency response team, says monitoring is a must. "CISOs must implement continuous monitoring of all systems to know what normal operations look like on their network, so that any unusual usage patterns can be examined further to indicate if there is a compromise," he says.
- Details
- Category: Security News

The New York Times says its Moscow bureau has been targeted by suspected Russian cyberattackers, but its internal systems have not been compromised.
See Also: Protecting Your Assets Across Applications, Services and Tiers
The confirmation follows a CNN report on Aug. 23 that the FBI is investigating a series of cyberattacks that affected the Times and other unidentified U.S. news organizations. The report, which cited anonymous U.S. officials, said the attacks had been detected in recent months and implied that some have been successful.
The Times reacted quickly to that report by publishing one of its own. "We are constantly monitoring our systems with the latest available intelligence and tools. We have seen no evidence that any of our internal systems, including our systems in the Moscow bureau, have been breached or compromised," spokeswoman Eileen Murphy says in a news story published by the Times.
An FBI spokesman declined to comment on those reports or any potential investigation being undertaken by the bureau.
U.S. and Russian tensions over cyber activity are at an all-time high. Experts widely suspect Russia is behind a series of cyberattacks against several Democratic Party organizations and Democratic presidential nominee Hillary Clinton's campaign (see DNC Breach More Severe Than First Believed).
"Attribution can be hard, although in the last five years, it has gotten better as the government has concluded that good attribution was necessary if it wanted to have a chance at a viable deterrence policy," says Martin Libicki, a domestic and national security expert at the think tank The Rand Corp. "One thing that makes attribution easier is that hackers persist in doing the same thing over and over again - and they can afford to be repetitive because the downside of a hack being attributed have, so far, been modest."
Russia may have also had a hand in the recent leak of a powerful set of software exploits and spying tools that security experts were built by the NSA, although clear evidence of Russia's involvement has not emerged (see Confirmed: Leaked Equation Group Hacking Tools Are Real).
Follows Critical Reports
The New York Times's coverage has often deeply antagonized countries such as Russia and China, so it's perhaps no surprise that spies would want to keep tabs on their reporters.
China warned the Times of "consequences" even before the paper published an October 2012 expose describing vast wealth accumulated by family members of former Prime Minister Wen Jiabao.
Three months later, the Times said suspected Chinese hackers had used malware to obtain access to its networks. Corporate passwords for all of its employees were stolen, and the hackers accessed the personal computers of 53 employees. The email accounts of both the Times' Shanghai bureau chief and former Beijing bureau chief were accessed.
"It was presumed that they were looking for sources that helped The New York Times story on corruption associated with Premier Wen," Rand's Libicki says. "The Russians may have similar motivations, although recent Russian behavior suggests they also could have been looking to dox NYT employees or those mentioned in internal Times documents and messages."
This year, in early May, the Times published an extensive report on how Russia ran a sophisticated laboratory at the 2014 Winter Games in Sochi that aimed to conceal Russian athletes' use of banned substances. The story featured the first public comments from laboratory director Grigory Rodchenkov, who fled to Los Angeles after those games, fearing for his safety.
Tough to Defend Reporters
In theory, news organizations would carefully safeguard their reporters, given that the information they collect could be attractive targets for intelligence agencies or organizations conducting corporate espionage.
But reporters stationed overseas are often at a defensive disadvantage. In-country equipment providers could supply routers to reporters and news organizations' bureaus, for example, that have been tampered with to facilitate remote surveillance. Network traffic flows through in-country carriers may also be monitored by intelligence agencies. Physical access to offices is also potentially easier overseas, creating the possibility that sophisticated monitoring equipment has also been surreptitiously installed.
Using a VPN service, which encrypts traffic from a computer to the VPN services' computers, can offer some security by not exposing browsing traffic to local ISPs. But even those connections could be compromised if users' login credentials get stolen, perhaps through simple phishing attacks or if the VPN service itself has been compromised. Mobile phone connections and landlines, meanwhile, would have to be treated as being completely insecure.
"Reporters are particularly vulnerable because they need a lot of latitude to effectively do their jobs," says Ryan Stolte, CTO for cybersecurity firm Bay Dynamics. "They travel to countries and connect to diverse networks which are more easily exploitable. All of those factors make them more vulnerable to a cyberattack than your average corporate employee."
Journalists Are Valuable Targets
Journalists are prized targets because they have data that sometimes is never published, says James Lewis, a senior vice president and director of strategic technologies programs at the Center for Strategic and International Studies in Washington. They can also talk to people that foreign agents have trouble engaging, he says.
News organizations have traditionally been soft targets. "At least until recently, media network security was terrible," Lewis says.
Lewis believes the recent attacks aren't a warning or a threat but rather an effort to figure out who the Times is speaking with and what it knows. "If there are embarrassing emails that can be leaked - so much the better," he says. "It's a favorite Russian trick."
Executive Editor Eric Chabrow contributed to this report.
- Details
- Category: Security News
Compliance , Data Breach , Privacy
Infidelity Dating Site Agrees to Privacy, Security Overhaul
Ashley Madison, the extramarital online hookup service breached in 2015, has agreed to bolster its security and make key data retention changes after regulators in Australia and Canada ruled that the site had violated local privacy laws (see Ashley Madison Breach: 6 Lessons).
See Also: A Smarter Approach to Third-Party Vendor Risk: A Case Study
Both the Office of the Privacy Commissioner of Canada and the Office of the Australian Information Commissioner found Avid Life Media, the Toronto-based company that runs the website, did not have documented information security policies in place or proper breach detection capabilities. The company violated both Canadian and Australian privacy laws, regulators ruled.
"It is not sufficient for an organization such as ALM, or any organization that holds large amounts of personal information of a sensitive nature, to address information security without an adequate and coherent governance framework," the regulators say in a summary of the investigation published Aug. 22.
In one of the more damaging findings, ALM acknowledged fabricating a medal icon and other "trustmarks" that were displayed on Ashley Madison's homepage. The marks implied the website had strong security, which deceived users in order to get their consent, the regulators say.
The Ashley Madison breach, one of the most high-profile incidents of last year, was particularly sensitive give the lurid nature of the service. In mid-July 2015, a group calling itself the Impact Team gave ALM an ultimatum: shut down Ashley Madison and a related site, Established Men, or else the attackers would dump user data.
The Impact Team claimed that Ashley Madison was a fraud and opposed some terms of the website, which included having to pay a fee for the full erasure of an account.
The company resisted, even after the group leaked a small sample of data. The Impact Team then released three dumps, comprising nearly 30GB of data. The files included customer names, email addresses, postal codes, partial credit card numbers, hashed passwords, GPS data and the amount paid for subscription services for some 36 million accounts (see Researchers Crack 11 Million Ashley Madison Passwords).
Also released were embarrassing internal companies emails, including those of former CEO Noel Biderman; source code for some of ALM's websites; financial records and company documents.
In July, ALM officials told Reuters that the U.S. Federal Trade Commission is also investigating the breach. The company also faces a raft of class-action lawsuits tied to the disclosure of personal data and charges that it manipulated male customers by using automated chat bots (see No Surprise: Ashley Madison Breach Triggers Lawsuits).
Security Overhaul
In July, Avid Life Media changed its name to Ruby Corp., announced that it had hired a new CEO and dropped the infamous Ashley Madison tagline - "Life is short. Have an affair." - in favor of "Find your moment." It also now bills Ashley Madison as "the original extramarital affairs site" (see Ashley Madison Seeks Security Reboot).
ALM - now Ruby - has agreed to comply with an extensive set of conditions and deadlines laid out by regulators. The government agencies could take the company to court if it fails to meet those conditions.
For example, by May 31, 2017, the company must implement a policy to delete deactivated or inactive accounts after an "appropriate period," according to the terms, signed by James Millership, president of ALM/Ruby.
Prior to the data breach, ALM had charged users $19 for a "full delete" to scrub their personal data from its systems - an unheard of fee for a web service. But based on data leaked by the Impact Team, it appeared that the company not only didn't scrub any personal data, but also didn't fully delete users' accounts after they paid $19. The company eventually dropped the fee.
If the company chooses to continue to require users to submit an email address, it will have to take steps to ensure the accuracy of that information, regulators say.
For starters, all staff and contractors with network access to ALM will be required to have security training. The regulators found 75 percent of the company's staff had not received general privacy and security training. Ironically, ALM was in the process of developing written security policies and procedures when the breach occurred.
The company is also required to put in an information security management framework, along with process and policies, which will be verified by a third party. A report on the effort is due by July 2017.
Regulators Detail Lackluster Defenses
While ALM had some breach detection and monitoring capabilities in place, those tools were more focused on site performance issues and monitoring employees' access to customer data, regulators say.
"ALM had not implemented an intrusion detection system or prevention system and did not have a security information and event management system in place or data loss prevention monitoring," the agencies say.
The attackers stole account credentials for an employee, then used those credentials to gain access to the corporate network and compromise other accounts. After several months of lurking inside the company's network, the attackers appeared to have mapped ALM's network topography and exfiltrated customer data.
The hackers took some care to mask their activity. The regulators say that the infiltrators used a VPN, allowing them to sport IP addresses that made them appear to be located in Toronto. Once inside the system, the attacker deleted log files, which made it harder to trace the intrusions.
ALM provided regulators with other evidence of its poor security practices. For example, plaintext passwords were found in emails and other text files on the network. Encryption keys were also stored as plaintext. One server had an SSH [secure shell] key that was not password protected, which allowed an attacker to connect to other servers.
ALM employees used a VPN service to log into the network. But a shared secret for the VPN service was stored on Google's Drive service. The regulators noted that "anyone with access to any ALM employee's drive on any computer, anywhere, could have potentially discovered the shared secret."
Site Still Running
Perhaps the most startling aspect of the Ashley Madison incident is that the site is still running. After the breach, researchers combed through the user data and came to the conclusion that most customers were male.
An analysis by Gizmodo - based on source code and internal emails - pointed to ALM propping up activity on the site by using an army of chat bots that presented themselves as female. The bots - referred to as "hosts," "engagers" or "fembots" - would chat up male site visitors, making it appear women were highly active on the site.
Even if Ashley Madison was more fantasy than it let on, the dating site was immensely lucrative. ALM told regulators it brought in $100 million in revenue in 2014. According to Reuters, ALM says its 2015 revenue was $109 million, with a profit margin of 49 percent.
- Details
- Category: Security News
Breach Notification , Breach Response , Data Breach
Vulnerability in vBulletin Forum Software Exploited
Epic Games has temporarily shut down some of its user forums for maintenance after data on about 808,000 accounts was stolen, marking the second data breach of the game maker in 13 months.
See Also: A Smarter Approach to Third-Party Vendor Risk: A Case Study
The compromise involved several forums maintained by Epic Games, based in Cary, N.C., that center on games and developer tools.
The most affected forums are Infinity Blade, UDK, Gears of War archives and those for previous Unreal Tournament games. Email addresses, hashed and salted passwords and data entered into forums were leaked.
Passwords that are hashed have been run through a one-way algorithm to create mathematical representations of passwords. In theory, the hashed value should not be able to be reversed into the original plaintext password. But it is possible for a password to be recovered if a weak hashing algorithm was used (see We're So Stupid About Passwords: Ashley Madison Edition).
"If you have been active on these forums since July 2015, we recommend you change your password on any site where you use the same password," Epic Games says in a statement.
Password hashes that have "salt" added are harder to reverse. Salt is other data added to a password hash that's intended to make it more difficult to crack.
Also affected were the Unreal Engine and Unreal Tournament forums. Email addresses and data entered into forums were leaked, but not password-related data. Those forums remain online, and users do not need to reset passwords.
The Paragon, Fortnite, Shadow Complex and SpyJinx forums are not affected.
"We apologize for the inconvenience this causes everyone and we'll provide updates as we learn more," Epic Games says.
The new breach alert follows the company warning in July 2015 that usernames, email addresses, passwords and dates of birth might have been compromised after a breach, according to the gaming publication Kotaku. That cyberattack affected UDK, Infinity Blade, Gears of War and Bulletstorm as well as prior Unreal Tournament games.
SQL Injection Attack
After the latest breach, the Epic Games data first appeared on LeakedSource, a website that sells subscriptions to a repository of data breaches that are obtained through opaque sourcing. The number of Epic Games accounts affected is about 808,000, Leaked Source tells Information Security Media Group.
When asked how the service obtained the Epic Games data, a LeakedSource representative says that hackers "know that we don't resell or trade data for any reason, and some of them 'just want to watch the world burn,' which means exposure to data sets and people panicking" (see LeakedSource: 'Assume Every Website Has Been Hacked').
The hacker who stole the data exploited a SQL injection vulnerability in the popular vBulletin forum software, the LeakedSource representative said. "SQLi" is a common type of web attack where a back-end database fails to filter malicious requests and returns data.
Of the 20 most recent batches of breached data that LeakedSource has acquired, 16 of them have been via a vulnerability in vBulletin, the representative says.
New vulnerabilities get regularly disclosed by vBulletin, says Troy Hunt, a data breach expert who runs the Have I Been Pwned? data breach notification service (see Troy Hunt: The Delicate Balance in Data Breach Reporting).
Web Forums: Endless TLC Required
While vBulletin regularly issues related patches to fix the problems, many administrators choose to host their own vBulletin software and never get around to applying the fixes, Hunt says. And that creates a "perfect storm of software with holes in it that people don't maintain," he says.
The Epic Games forums were breached on Aug. 11. Although it's unclear which vulnerability was exploited in that breach, vBulletin recently issued patches for a problem that could allow an attachment to exploit a system for vBulletin versions 3.8.7 and up.
For better security, an improved approach for vBulletin users would be to pay vBulletin Solutions to host the software, Hunt says, which would ensure the software gets promptly patched.
"Having your own web application running on any platform is like having a child," Hunt says. "You need to give it TLC for the rest of its life. It's worse than having a child. Children grow up and leave home. You've got to continue to look after this [web application]."
- Details
- Category: Security News
×Close
Request to Republish Content
More Articles …
Page 3488 of 3546