Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/30/2006
02:09 PM
Tom Smith
Tom Smith
Commentary
50%
50%

7 Lessons From IT Security Trial

Over the last several weeks, InformationWeek has been covering the trial of a former UBS PaineWebber systems administrator, Roger Duronio, who's accused of writing and setting off a highly destructive logic bomb at his former employer as revenge for not receiving the maximum yearly bonus. The government prosecution contends that Duronio was not only looking to wreak havoc, but also to profit by purchasing securities whose valu

Over the last several weeks, InformationWeek has been covering the trial of a former UBS PaineWebber systems administrator, Roger Duronio, who's accused of writing and setting off a highly destructive logic bomb at his former employer as revenge for not receiving the maximum yearly bonus. The government prosecution contends that Duronio was not only looking to wreak havoc, but also to profit by purchasing securities whose value would rise if the company's stock went down--the theory being that the company's stock would tank as a result of the security problem that prevented traders from doing their work.The trial provides an enlightening perspective on the damage such attacks can cause, as well as other security lessons that all IT organizations must learn if they're going to avoid becoming victims. My top seven:

  • If you want to make it as difficult as humanly possible for hackers--whether employees or outsiders--to ply their trade, your company needs to have bulletproof security policies and practices. That may seem extremely obvious, but in the course of this trial, UBS employees acknowledged that 40 systems administrators in the company's data center used the same password for root--or all-encompassing--access to the company's network. The defense has been aggressively pouncing on this as an indicator of porous security that left the network vulnerable to attack, and it's tough to argue that point. In addition, 20% of the servers affected by the attack had inadequate data backup--not the smartest move for a company whose lifeblood, stock trading, requires data access.

  • Don't underestimate the measures a hacker or person seeking revenge will go to in order to prove their point or carry out their plan. In this case, the sophistication of the logic bomb's author has come into question, but one point is undeniable: The person responsible methodically placed the trigger that set off the logic bomb on every affected server two times to maximize the chances it would wreak havoc. Sophisticated or not, the plan did immense damage, just as the attacker hoped it would.

  • You can't be too wary of disgruntled or otherwise suspicious employees. Sure, we'd all be pissed off if our bonus came up $15,000 to $20,000 short. That's not chump change, even for someone making a base salary of $125,000 per year, as the defendant was. But how many of us would be willing to risk our future, our reputation, the reputation of our families, and a lengthy jail stay over that amount of money? Duronio was prepared to do so, if the prosecution's account is accurate.

  • The effects of a major attack can be far-reaching and long-lasting, even after the forensics pros have gone home and the remediation work is done. By the admission of UBS's own IT pros in trial testimony, on March 4 (the date of the attack), for two or three years later, they took critical servers offline to avoid the affects of any lingering malicious code. Also by UBS's own account, the effects are still felt today, more than four years later.

  • Even a hacker who's successful at damaging systems and impairing business can be susceptible to stupid behavior that points back to him or her. We don't yet know whether Duronio is guilty, but the existence of hard-copy printouts of malicious code in his home is likely to weigh heavily on the jury.

  • When it comes to security--and in fact all IT work--choose your vendors carefully. The defense has been hammering away at UBS's use of @Stake after the attack, in part because it employed well-known hackers. It's entirely possible, even likely, that @Stake is totally on the up and up. Perhaps UBS was fully aware of the hacking backgrounds of some employees and considered those backgrounds when hiring @Stake. Let's hope that was the case.

  • IT security problems--aside from the direct financial damage to a business--can be a public relations nightmare for any company, and even worse for a financial services firm. UBS's PR organization must be eagerly awaiting the day this trial is over and no longer in the news. No matter how well-meaning and even well-run its IT operations may have been, the trial isn't casting that organization in a positive light.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16860
PUBLISHED: 2019-11-19
Code42 app through version 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local machine could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and potentially execute arbitrary code at an ele...
CVE-2019-16861
PUBLISHED: 2019-11-19
Code42 server through 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local server could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and potentially execute arbitrary code at an elevated ...
CVE-2014-5118
PUBLISHED: 2019-11-18
A Security Bypass Vulnerability exists in TBOOT before 1.8.2 in the boot loader module when measuring commandline parameters.
CVE-2019-12422
PUBLISHED: 2019-11-18
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
CVE-2012-4441
PUBLISHED: 2019-11-18
Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the CI game plugin.