Vulnerabilities / Threats
3/24/2011
01:35 PM
Connect Directly
RSS
E-Mail
50%
50%

Gmail, Hotmail Pose Government Security Risk

Australian auditor recommends blocking Webmail on government networks to prevent insider and external threats.

How Firesheep Can Hijack Web Sessions
(click image for larger view)
Slideshow: How Firesheep Can Hijack Web Sessions
Government use of Webmail is under fire in Australia, with one government oversight group calling for it to be blocked inside government agencies.

That recommendation comes from the Australian National Audit Office (ANAO), which recently audited four Australian government agencies to assess the effectiveness of their information security framework, network security management, access management, and equipment security.

The audit examined four groups inside the Australian government: the Office of Financial Management, ComSuper (which handles government pensions), Medicare Australia, and the Department of the Prime Minister and Cabinet. They served as a representative cross-sample of agencies and their approach to IT, or ICT (information and communication technologies), as it is often known abroad.

Interestingly, auditors found that government employees were actively using Webmail accounts such as Gmail and Hotmail. According to the ANAO's report, "Webmail accounts were accessible in one of the audited agencies, and logs showed that some staff were using these accounts on a regular basis."

That finding lead the ANAO to recommend that "emails using public Web-based email services should be blocked on agency ICT systems, as these can provide an easily accessible point of entry for an external attack and subject the agency to the potential for intended or unintended information disclosure."

The move would appear designed to help stem Wikleaks-type scandals. But auditors also cited more mundane -- and likely prevalent -- concerns, such as stopping financial cybercrime, as well as simply maintaining service levels. "Vulnerabilities within ICT systems may allow an attacker to gain access to sensitive information, including information about government decision-making, significant financial transactions, and aggregate personal and financial information," according to the report. "Attackers could also potentially cause disruption to agency services, payments, and public information."

From a security and risk standpoint, the audit also identified password practices as a sore point. In fact, auditors were able to compromise roughly 20% of passwords at three different agencies, using brute-force techniques. While this percentage compared favorably with private sector standards, it called on agencies to review their password practices, and especially their administrative password practices, since it successfully cracked multiple administrator passwords as well.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.