Risk
6/14/2011
02:38 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

LulzSec, Recent Hacks Show Government Agencies Unprepared

The U.S. Senate became the latest victim in a string of hacks into government and high-profile groups like the IMF and Lockheed Martin. Here's what security experts say the Feds must do better.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
LulzSec breached and released internal data from a U.S. Senate Web server Monday in the latest in a series of well-publicized attacks on high-profile government and government-related targets over the past several months that has also seen the compromise of the International Monetary Fund, Lockheed Martin, the Oak Ridge National Laboratory, the Group of 20, FBI partner InfraGard, Gmail accounts of government officials, and RSA's SecurID authentication, which is used heavily in government.

While disparate actors, from so-called "hacktivist" groups like LulzSec and Anonymous out to exact revenge or embarrassment to well-organized nation states looking for government, economic, and military secrets, are likely behind the attacks, many of the attacks share in the fact that they have likely resulted from targeted spear phishing--carefully crafted emails and other messages designed to con unwilling recipients into installing malicious code. Experts say that no one cure fits all, and advocate a comprehensive defense. Government is making a big cyber push, but the repeated success of these attacks shows that government and organizations aren't yet up to the challenge.

Symantec recently reported that targeted attacks are at a two-year high, but spear phishing is not a new tactic. Perhaps counter-intuitively, the fact that these attacks have become known may indicate that the government and other victims are at least getting better at uncovering and responding to the attacks, said Jim Lewis, senior fellow at the Center for Strategic and International Studies.

The federal government has made a major push for more than a year to overhaul agency use of the Federal Information Security Management Act, which regulates federal cybersecurity compliance. The government is moving FISMA from being a check-the-box auditing tool to an agent for the adoption of "continuous monitoring" of systems, vulnerabilities, threats, and attacks. New technologies like the Einstein intrusion detection and prevention systems are being installed across the government, and the administration's latest FISMA reporting guidance focuses heavily on continuous monitoring.

And yet attacks are still getting through. "Most sophisticated organizations, their front end is hardened," said Tom Kellerman, CTO of mobile security company AirPatrol and a member of the Obama administration's cybersecurity commission who has done cybersecurity work for both the IMF and World Bank. "However, if you can compromise the credentials of the user, you can access all the things you want to access."

SANS Institute director Alan Paller characterized continuous monitoring as only a sliver of the solution. There's more work to be done, he said, in getting agencies to actually take action on the things they see as part of their monitoring, in tracking outgoing traffic from government computer networks, and especially in training and hiring talented security pros from a limited talent pool.

Kellerman said that there are a number of places where organizations are broadly failing in their defenses to targeted attacks, including a lack of two- and three-factor authentication that goes beyond just a password and something you know (like your mother's maiden name), a failure of policy (like giving users system administrator privileges or allowing people to click links without checking their email headers for inconsistencies), and a lack of white listing certain email and browser behaviors (like failing to prohibit the download and install of unknown executables), especially on laptops and mobile devices.

"Apps should only be able to do and access certain things, only certain apps should be allowed to run, and you really need to have the capacity to limit the device when it's doing sensitive things," he said. "You need to be able to control, to be able to contextually manage the functionality of the device so you can't exfiltrate data." He said that the need was especially strong in the case of mobile devices and laptops that remotely access enterprise networks through VPNs.

Virtualization is another possibly powerful preventative prescription. Security firm Invincea's software, for example, isolates the Web browser in a virtual environment that's instrumented to monitor for unexpected changes to the environment without needing to resort to a signature-based defense that's often ineffective in today's atmosphere of zero-day attacks.

Furthermore, some sort of liability should be imposed on employees who click on spoofed links or download poisoned files, Kellerman said. However, the defense will likely require more than just training. "We're not going to train our way out of the problem," said Anup Ghosh, CEO of cybersecurity firm Invincea and former cybersecurity researcher with the Defense Advanced Research Projects Agency.

Ghosh also recommends agencies and organizations place network breaks into their systems. "There's no reason for the accounting subnet to be connected to the research and development subnet," he said.

The highly publicized attacks may help force the hand of Congress, which has been pumping out cybersecurity bills but has thus far failed to get anything significant to the President's desk. Many of those bills would require additional safeguards of government computers and those of critical infrastructure providers, which would likely include the likes of InfraGard, RSA, Lockheed, and Google.

"Incidents like this only reinforce the opportunity to do something," Lewis said. "How many more of these do we need to see before we say as a country that we're going to be serious on cybersecurity?" Lewis noted that while the Senate is beginning to move rapidly on cybersecurity, the House of Representatives is still bottled up with organizing and coordinating numerous "pieces of bills" that it has introduced.

What industry can teach government about IT innovation and efficiency. Also in the new, all-digital issue of InformationWeek Government: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0640
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote authenticated users to bypass intended restrictions on resource access via unspecified vectors.

CVE-2014-0641
Published: 2014-08-20
Cross-site request forgery (CSRF) vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to hijack the authentication of arbitrary users.

CVE-2014-2505
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to trigger the download of arbitrary code, and consequently change the product's functionality, via unspecified vectors.

CVE-2014-2511
Published: 2014-08-20
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter.

CVE-2014-2515
Published: 2014-08-20
EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.