Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

3/12/2019
05:55 PM
50%
50%

Citrix Breach Underscores Password Perils

Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.

The recent cyberattack on enterprise technology provider Citrix Systems using a technique known as password spraying highlights a major problem that passwords pose for companies: Users who select weak passwords or reuse their login credentials on different sites expose their organizations to compromise.

On March 8, Citrix posted a statement confirming that the company's internal network had been breached by hackers who had used password spraying, successfully using a short list of passwords on a wide swath of systems to eventually find a digital key that worked. The company began investigating after being contacted by the FBI on March 6, confirming that the attackers appeared to have downloaded business documents. 

Password spraying and credential stuffing have become increasingly popular, so companies must focus more on defending against these types of attacks, according to Daniel Smith, head of threat research at Radware.

"Actors will use password spraying [instead of] brute force attacks to avoid being timed out and possibly alerting admins," Smith said in a statement. "Once the user is compromised the actors will then employ advanced techniques to deploy and spread malware to gain persistence in the network."

While brute-force attacks against a single system are easy to detect, password spraying spreads the attack out over many systems and over time. By spreading the attempts, the brute-force password attack can escape notice if companies don't connect related security events across the network. 

Authentication Attacks

Attacks based on authentication have become a top concern for companies. In its recent report, security firm Rapid7 found that four of the top five security events detected in its clients' networks in 2018 involved authentication. Often the attacker is only caught because they are attempting to log in from a computer not related to the company.

While password spraying typically uses a list of common passwords, in many cases, attackers will use passwords leaked from other breaches, hoping that employee reuse their passwords at work. A list of the top-1,000 passwords is effective 75% of the time, according to the U.K.'s National Cyber Security Centre

The agency recommends that companies deploy technologies that have proven effective against password-spraying attacks, use multi-factor authentication, and regularly audit employees' passwords against a list of the top-1000 or 10,000 most popular passwords.

For companies that base their security on workers' credentials, detecting an attacker is difficult because the rogue user has successfully logged in.

"It is a non-trivial problem," says Troy Hunt, an independent expert on cyber- and password security. "We are asking companies to detect a legitimate username-password credential as an attack."

Because Citrix provides a variety of services to companies, including a popular remote access service, the attackers could use it as a step into other companies, Radware's Smith said.

"Nation states actors typically target MSP (managed service providers) and companies like Citrix due to their client base and intellectual property," he said. "Other than espionage or financial profit, MSPs can also be targeted and leveraged in supply chain attacks that are used as a staging point to distribute additional malware."

Citrix has committed to updating its customers on the breach. In addition to its forensics investigation in conjunction with a third-party firm, the company further secured its internal network and is cooperating with the FBI, Citrix's Black said in his post last week.

Resecurity emerges with details

Citrix and the FBI are not the only two organizations that appear to have details on the breach. Boutique security firm Resecurity claims that the attack against Citrix began on October 15, 2018, used a list of nearly 32,000 user accounts, and is connected to Iranian interests. 

"The incident has been identified as a part of a sophisticated cyber-espionage campaign supported by nation-state (sic) due to strong targeting on government, military-industrial complex, energy companies, financial institutions and large enterprises involved in critical areas of economy," the company stated in an analysis posted on March 8, the same day as Citrix's statement. 

"Based our recent analysis, the threat actors leveraged a combination of tools, techniques and procedures (TTPs) allowing them to conduct targeted network intrusion to access at least 6 terabytes of sensitive data stored in the Citrix enterprise network, including e-mail correspondence, files in network shares and other services used for project management and procurement," the firm stated.

Resecurity claimed that its researchers notified Citrix of the breach in December, linking the attack to a known Iranian operator IRIDIUM. Citrix, however, declined to comment further on its investigation into breach or whether it was contacted by Resecurity.

"We are focused on the comprehensive forensic investigation into the incident that we are conducting with leading third-party experts and have no comment on Resecurity’s report or claims," a company spokesperson said. 

While claiming to be trusted by Amazon, Microsoft, Eurosport, and JP Morgan, among others, Resecurity has apparently only recently emerged from stealth. The Los Angeles, Calif., startup only has two analyses posted, including the Citrix breach, with press releases dating back only to September 2018. The company has not returned a request for comment from Dark Reading.

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Governance Guru
50%
50%
The Governance Guru,
User Rank: Strategist
3/12/2019 | 10:47:27 PM
Great synopsis of a complex yet commonplace issue
Great summary of the issue. Password spraying is definitely the new way of bypassing the defences built to protect against brute-force attacks. The sophistication of this attack shows how far malicious actors are willing to go to get to their goal. 
How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12551
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, improper validation of arguments in the internal implementation of the Memcpy function (provided by the scripting engine) allows an attacker to overwrite arbitrary memory, which could lead to code execution.
CVE-2019-12552
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, an integer overflow during the initialization of variables could allow an attacker to cause a denial of service.
CVE-2019-3414
PUBLISHED: 2019-07-22
All versions up to V1.19.20.02 of ZTE OTCP product are impacted by XSS vulnerability. Due to XSS, when an attacker invokes the security management to obtain the resources of the specified operation code owned by a user, the malicious script code could be transmitted in the parameter. If the front en...
CVE-2019-10102
PUBLISHED: 2019-07-22
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". Th...
CVE-2019-10102
PUBLISHED: 2019-07-22
aubio 0.4.8 and earlier is affected by: null pointer. The impact is: crash. The component is: filterbank. The attack vector is: pass invalid arguments to new_aubio_filterbank. The fixed version is: after commit eda95c9c22b4f0b466ae94c4708765eaae6e709e.