Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/17/2014
10:15 AM
Jeff Williams
Jeff Williams
Commentary
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail vvv
100%
0%

The New Target for State-Sponsored Cyber Attacks: Applications

Skilled hackers are now using simple web application vulnerabilities like SQL Injection to take over database servers. Are you prepared to defend against this new type of threat actor?

Historically, state-sponsored hackers have used memory corruption vulnerabilities like buffer overflows to create malware for their attacks, targeting operating systems and appliances written in C/C++. A new set of attacks, allegedly coming from Iran, is using a new strategy. Web applications and services, written in higher-level languages like Java and .NET, are being targeted to establish a foothold in your datacenter and pivot to other internal systems.

Escalating cyber attacks
In 2009, a highly organized attack known as “Operation Aurora” was carried out by hackers with alleged ties to the Chinese military. Aurora targeted executives' computers with Internet Explorer-based malware. Dozens of US corporations, including Adobe, Juniper, Rackspace, Yahoo, Symantec, Northrop Grumman, Morgan Stanley, and Dow Chemical, were targets. These attacks were successful in accessing, and possibly modifying, source code repositories.

Historically, state-sponsored cyber attacks are dominated by these malware-based exploits. Stuxnet, Duqu, and Flame are examples, allegedly orchestrated by the United States and Israel. These seriously harmed Iran’s nuclear program but also sparked Iran to develop its own cyber capability. Attacks against the Dutch certificate authority DigiNotar in 2011 were attributed to Iran. The following year, Shamoon, also attributed to Iran, was launched against gas companies based in Saudi Arabia and Qatar.

Despite what you see from popular television shows such as CSI and Law and Order (and even worse, Scorpion), it’s sometimes very difficult to know for sure where an attack comes from. Moreover, organizations that have been hacked are under tremendous pressure to report details quickly. To minimize accusations and/or public perception of negligence, there’s pressure to state that the attacks are “sophisticated” or “state-sponsored.” So, while the exact origin of these attacks is not always clear, there is little question that cyber attacks are a priority for a variety of countries.

The move to application attacks
Very recently, attacks known as “Operation Cleaver,” attributed to Iran, have been revealed. For the past two years, these attacks have targeted critical infrastructure targets including airports, hospitals, telecommunications providers, chemical companies, and governments. More than 50 targets in 16 countries have been successfully compromised.

What makes Operation Cleaver different is that the attacks do not rely on malware to leverage memory exploits. Instead, they are primarily using SQL Injection to take over database servers through web applications. Once inside, the attackers use the database server to launch additional attacks on internal networks. The scary part is that, while these exploits are just as devastating as malware-based attacks, they are considerably easier to find and exploit.

[Find out more about how, With Operation Cleaver, Iran Emerges As A Cyberthreat.]

The “Operation Cleaver Report” issued by Cylance claims that “Initial compromise techniques include SQL injection, web attacks, and creative deception based attacks – all of which have been implemented in the past by Chinese and Russian hacking teams.”

The attackers sent SQL Injection attacks that were designed to trick the victim’s database software into executing arbitrary commands, using “xp_cmdshell.” Here is an example targeting a ColdFusion server, from the Cylance report:

The attackers would then send commands through the compromised database server to target other backend systems. Here is an example attempting to use FTP, from the Cylance report:

Renowned security expert Charlie Miller gave a great talk a few years ago on how to build a nation-state Red Team on the cheap. He suggested that for $100 million, a country could bring about “Internet Armageddon.” However, he didn’t consider using simple web application vulnerabilities like the ones in use in the Cleaver attacks. Given the ease and pervasiveness of these vulnerabilities, it might be possible to create an application-focused Cyber Army with much less investment.

We are not ready
The unfortunate reality is that most companies and government agencies are only barely prepared for the very lowest level of threat: the auditor. Auditors are always several years behind the state-of-the-art, because they are using regulations or standards that were drafted years ago and only cover a minimal set of interests. With most security efforts focused on compliance, virtually all organizations are totally unprepared for skilled threat actors, like expert individuals or state-sponsored groups. We should be building systems designed to resist the attacks that we expect 10 years from now, not the attacks that occurred two years ago.

My colleagues at Aspect Security review thousands of applications with manual code review and manual penetration testing. On average, they find a stunning 22.4 serious vulnerabilities per application, and their work unearths thousands of vulnerabilities every year. With the threat of state-sponsored hackers targeting these vulnerabilities on the rise, the time is now to stamp out vulnerabilities like SQL Injection from your application portfolio. As Charlie Miller puts it, the “best defense is to eliminate vulnerabilities in software.”

A pioneer in application security, Jeff Williams is the founder and CTO of Contrast Security, a revolutionary application security product that enhances software with the power to defend itself, check itself for vulnerabilities, and join a security command and control ...
View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
12/19/2014 | 10:04:35 AM
Sony -- the most recent example...
I guess we can add the North Korea hack of Sony email to the list of state-supported cyber application attacks...
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17366
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
CVE-2020-9036
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
CVE-2020-15127
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
CVE-2020-15132
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
CVE-2020-7298
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.