Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/14/2011
02:38 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

LulzSec, Recent Hacks Show Government Agencies Unprepared

The U.S. Senate became the latest victim in a string of hacks into government and high-profile groups like the IMF and Lockheed Martin. Here's what security experts say the Feds must do better.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
LulzSec breached and released internal data from a U.S. Senate Web server Monday in the latest in a series of well-publicized attacks on high-profile government and government-related targets over the past several months that has also seen the compromise of the International Monetary Fund, Lockheed Martin, the Oak Ridge National Laboratory, the Group of 20, FBI partner InfraGard, Gmail accounts of government officials, and RSA's SecurID authentication, which is used heavily in government.

While disparate actors, from so-called "hacktivist" groups like LulzSec and Anonymous out to exact revenge or embarrassment to well-organized nation states looking for government, economic, and military secrets, are likely behind the attacks, many of the attacks share in the fact that they have likely resulted from targeted spear phishing--carefully crafted emails and other messages designed to con unwilling recipients into installing malicious code. Experts say that no one cure fits all, and advocate a comprehensive defense. Government is making a big cyber push, but the repeated success of these attacks shows that government and organizations aren't yet up to the challenge.

Symantec recently reported that targeted attacks are at a two-year high, but spear phishing is not a new tactic. Perhaps counter-intuitively, the fact that these attacks have become known may indicate that the government and other victims are at least getting better at uncovering and responding to the attacks, said Jim Lewis, senior fellow at the Center for Strategic and International Studies.

The federal government has made a major push for more than a year to overhaul agency use of the Federal Information Security Management Act, which regulates federal cybersecurity compliance. The government is moving FISMA from being a check-the-box auditing tool to an agent for the adoption of "continuous monitoring" of systems, vulnerabilities, threats, and attacks. New technologies like the Einstein intrusion detection and prevention systems are being installed across the government, and the administration's latest FISMA reporting guidance focuses heavily on continuous monitoring.

And yet attacks are still getting through. "Most sophisticated organizations, their front end is hardened," said Tom Kellerman, CTO of mobile security company AirPatrol and a member of the Obama administration's cybersecurity commission who has done cybersecurity work for both the IMF and World Bank. "However, if you can compromise the credentials of the user, you can access all the things you want to access."

SANS Institute director Alan Paller characterized continuous monitoring as only a sliver of the solution. There's more work to be done, he said, in getting agencies to actually take action on the things they see as part of their monitoring, in tracking outgoing traffic from government computer networks, and especially in training and hiring talented security pros from a limited talent pool.

Kellerman said that there are a number of places where organizations are broadly failing in their defenses to targeted attacks, including a lack of two- and three-factor authentication that goes beyond just a password and something you know (like your mother's maiden name), a failure of policy (like giving users system administrator privileges or allowing people to click links without checking their email headers for inconsistencies), and a lack of white listing certain email and browser behaviors (like failing to prohibit the download and install of unknown executables), especially on laptops and mobile devices.

"Apps should only be able to do and access certain things, only certain apps should be allowed to run, and you really need to have the capacity to limit the device when it's doing sensitive things," he said. "You need to be able to control, to be able to contextually manage the functionality of the device so you can't exfiltrate data." He said that the need was especially strong in the case of mobile devices and laptops that remotely access enterprise networks through VPNs.

Virtualization is another possibly powerful preventative prescription. Security firm Invincea's software, for example, isolates the Web browser in a virtual environment that's instrumented to monitor for unexpected changes to the environment without needing to resort to a signature-based defense that's often ineffective in today's atmosphere of zero-day attacks.

Furthermore, some sort of liability should be imposed on employees who click on spoofed links or download poisoned files, Kellerman said. However, the defense will likely require more than just training. "We're not going to train our way out of the problem," said Anup Ghosh, CEO of cybersecurity firm Invincea and former cybersecurity researcher with the Defense Advanced Research Projects Agency.

Ghosh also recommends agencies and organizations place network breaks into their systems. "There's no reason for the accounting subnet to be connected to the research and development subnet," he said.

The highly publicized attacks may help force the hand of Congress, which has been pumping out cybersecurity bills but has thus far failed to get anything significant to the President's desk. Many of those bills would require additional safeguards of government computers and those of critical infrastructure providers, which would likely include the likes of InfraGard, RSA, Lockheed, and Google.

"Incidents like this only reinforce the opportunity to do something," Lewis said. "How many more of these do we need to see before we say as a country that we're going to be serious on cybersecurity?" Lewis noted that while the Senate is beginning to move rapidly on cybersecurity, the House of Representatives is still bottled up with organizing and coordinating numerous "pieces of bills" that it has introduced.

What industry can teach government about IT innovation and efficiency. Also in the new, all-digital issue of InformationWeek Government: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Download it now. (Free registration required.)

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5604
PUBLISHED: 2020-07-09
Android App 'Mercari' (Japan version) prior to version 3.52.0 allows arbitrary method execution of a Java object by a remoto attacker via a Man-In-The-Middle attack by using Java Reflection API of JavaScript code on WebView.
CVE-2020-5974
PUBLISHED: 2020-07-08
NVIDIA JetPack SDK, version 4.2 and 4.3, contains a vulnerability in its installation scripts in which permissions are incorrectly set on certain directories, which can lead to escalation of privileges.
CVE-2020-15072
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An error-based SQL Injection vulnerability exists via the Import Administrators section.
CVE-2020-15073
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An XSS vulnerability occurs within the Import Administrators section via upload of an edited text document. This also affects the Subscriber Lists section.
CVE-2020-2034
PUBLISHED: 2020-07-08
An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect...