Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Deconstructing The Sony Hack: What I Know From Inside The Military
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Jeff.schilling
50%
50%
Jeff.schilling,
User Rank: Author
1/8/2015 | 3:23:31 PM
Re: REGIN
@Ryan,

I probably did sound contradictary in the comments you highlighted.  Great catch.  I did not do a good job in defining where I am talking about threat and where i am talking about data/applications.  

In the first reference, I was referring to Data and Applications.  In other words, you cannot protect all of your data and applications, you should aggressively segement and control access to your company crown jewels.  

In the second reference, I am referring to threat.  I am trying to coach CISO's and business owners to assume you are a target.  Too many companies, like CodeSpaces, probably believe they are not a target because they do not have something of value to criminals (i.e. Credit card data, Electronic Health Records).  Even in this case, these companies should still NOT try to protect their whole environment, especially if it is very complex or dynamic.  They should still identify the company crown jewels and aggressively segement.   In the use case of CodeSpaces, they might have been saved by 2 factor auth for their admin access to their cloud envrionment.   

Hopefully that clears up the confusion, thanks for asking for clarification.

 

  
Jeff.schilling
50%
50%
Jeff.schilling,
User Rank: Author
1/8/2015 | 11:33:55 AM
Re: Ransomware and backups
As I mention in my article, the government could have some forms of intelligence that they can not share with the general public.  I am not going to speculate, but I have a good idea based on my experience of what it takes to truly get attribution.  It is kind of like triangluating your position on a map from reference points.  The more reference points you have, the greater accuracy you can plot your position.  

Bottom line, the more reference points in intelligence collection you have, the greater the accuracy you can predict attibution.  I will say that what has been released, to include the additional information that Director Comey release does not make that case to me.  But as he says, "If you could see what I see..." there maybe other forms of intel that does make the case.  The whole point of my article is to get security folks focused on the important facts and leave the attribution to the government and Sony.

 

 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/8/2015 | 9:58:15 AM
Re: REGIN
@Jeff.

Could you elaborate on the following two statements; one was made in the article and the other was made in a post from you. The two seem to contradict each other.

 

Post- " I think some of the big companies should start changing their strategy from trying to protect everything, to protecting what is important and assuming everything else is potentially compromised."

 

Article-"Too much of the security industry is still focused on the data that you "have to protect" instead of protecting the entire organization. In today's cyberrisk environment, you cannot predict who the ransom actors will go after."


The only discrepancy I could find was that one elaborates to big organizations but the other is ambiguous to use case. Thanks!
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
1/8/2015 | 9:36:29 AM
Re: Ransomware and backups
@Jeff, I wonder what your thougts are about the FBI comments that "Sloppy' North Korean backers gave themselves away...

 

 

Jeff.schilling
50%
50%
Jeff.schilling,
User Rank: Author
1/7/2015 | 2:05:45 PM
Re: Ransomware and backups
Terry B,

For the CodeSpaces incident, the threat actors owned their corp network.  They sent ransome threats.  As the victim tried to clean up their infected network, the threat actors captured their log on creds for their customer environment, hosted by a cloud provider.  Once they had those log on creds, they locked the victim out of their own hosted cloud environment.  Sent another ransome threat.  When the company could not pay, the threat actors deleted their customer data (because they had admin creds), to include backups, in the hosted cloud environment.  

Root cause, No Multifactor auth for admin access by the victim to control their hosted environment, no security controls in their hosted environment, no way to recover deleted data and walk back what the threat actors had done.  

The real lesson here is you get what you pay for in security when you host in a cloud provider.  You have to secure that environment as vigiously as you would secure any of your data.  Most cloud companies make security an add on feature.  At FireHost, we are a secure cloud, our customers can't opt out of our security protection.
TerryB
50%
50%
TerryB,
User Rank: Ninja
1/7/2015 | 1:36:38 PM
Ransomware and backups
Jeff, how did that ransomware attack put that hosted company out of business? Surely people are still making backup copies of their (hopefully) virtual servers and more timely copies of the data itself? I could see this causing a loss of some data, like from last backup. But to take them out of business completely? How is that possible?

Is there something about ransomware and backups I'm not understanding? What you describe would be major pain in rear end here while we rebuilt services and data. But knocking us out of business, I don't think so.

Actually I know so since our primary business server is an IBM i5 server which is not addressable from internet and can't be infected by someone clicking on rogue attachment/web page.

It is our infatuation with Windows type computers which run script and allow easy o/s corruption, combined with connecting directly to Internet for "customer services" which has put us all here. Anyone got stories of IBM mainframes being pawned like these Windows/Linux servers are? Besides an inside attack, of course. No system can survive that if the good guy decides to become a bad guy. You can only hope to stop them sooner rather than later in that case.
SgS125
50%
50%
SgS125,
User Rank: Ninja
1/7/2015 | 12:14:28 PM
Re: REGIN
I suspect that since the Sony situation has overtaken the media and completly obfuscated the REGIN discovery we will not hear much more about it.  There were several fine technical analysis of the code and it's methods.  A seriously long read for anyone who cares to speculate on the methods and uses of this type of malware.

 

Let's hope that we and our networks we protect don't have anything interesting enough for the players that play to ruin our day.

 

Don't forget to hide your backups!  They can't encrypt or erase what they can't find.

 

 
Jeff.schilling
0%
100%
Jeff.schilling,
User Rank: Author
1/7/2015 | 12:06:17 PM
Re: REGIN
Re: REGIN, no clear attribution has been assigned to this framework.  I doubt that it ever will be clearly attributed.  There are lots of sophisticated nation-state threat actors, I would not jump to any conclusions on who is holding the strings on that framework.

In the US, we have US Code Title 50 congressional legislation that limits foreign intelligence collection on US soil by the US Intelligence Community.  Any exceptions to this are adjudicated by the FISA court when the Intelligence Community can show that the data they want to collect on US soil is critical to putting the pieces together on other global collection efforts.  There have been some well-publicized cases where some folks believe the FISA court got the decision wrong, I am inclined to agree in some cases with those skeptics that the collection was an over reach.  However, I will offer that there is no other cyber super power that has this kind of oversight that keeps their intelligence collection limited to foreign collection only.  They might not get it right every time, but there is no systemic abuse that we should worry about.  I do not lose any sleep over this at all.

To clarify what keeps me up at night, threat actors had for the most part focused on Computer Network Exploitation.  Now they are more increasingly getting kinetic and destroying IT infrastructure, having a serious business impact.  Most large multinational organizations like Sony and many others have a very large surface area of attack due to the massive complexity associated with managing a global enterprise.  I think some of the big companies should start changing their strategy from trying to protect everything, to protecting what is important and assuming everything else is potentially compromised.

Thank you for your comments.  This is great dialogue.  

 
SgS125
100%
0%
SgS125,
User Rank: Ninja
1/7/2015 | 11:07:04 AM
REGIN
Should we also wait to hear from the Government on what they had intended to do woth the REGIN attacks?

I agree that the "media" who ever you consider them to be, has it wrong, will always have it wrong, and can't understand enough of the situation to ever report anything other than what they are told to repeat.

If you are sleepless over this then you have already lost your battle.  It's always the next unknown threat that gets us, no point in worrying over it or asking for more money to protect you from things you don't know about or can't plan for.  

We can only hope that all the exploits that our "freinds" in Government hold secret will not be used against us.

 

 

 

 
Jeff.schilling
100%
0%
Jeff.schilling,
User Rank: Author
1/7/2015 | 10:04:38 AM
Re: Commentary
That is an interesting theory and very plausable.  That would be what I would do as well to cause more confusion.
Page 1 / 2   >   >>


Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.