Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Wolves in IT Administrators' Clothing?

Enterprises, vendors move to safeguard their systems from rogue systems administrators

Way back in 2002, Roger Duronio didn't get as big an annual bonus as he expected, so he quit his job as a systems administrator at UBS PaineWebber and he went home. Then, Roger got an idea.

Using access codes he retained from his job, an angry Duronio planted a logic bomb in UBS PaineWebber's systems. The bomb hit at 9:30 in the morning, just as the stock market opened for the day. Files were deleted from up to 2,000 servers in both the central data center in Weehawken, N.J., and in branch offices around the country. It cost the company more than $3.1 million to get the system back up and running. (See Security's Biggest Train Wrecks.)

On January 30 of this year, Joseph Patrick Nolan, an IT admin at aviation contractor Pentastar, was told that he would not receive a paycheck for his last two weeks at the company, where he had recently resigned. On February 1, the disgruntled Nolan gained unauthorized access to Pentastar's computer systems and effectively obliterated a drive that contained all of the company's payroll and personnel records, according to court documents. (See Former IT Admin Convicted of Sabotage .)

In between these two major events, there have been numerous studies that illustrate, in some detail, that even non-disgruntled IT administrators frequently abuse their access privileges to access unauthorized files, emails, and even personnel records. In a survey conducted by Dark Reading one year ago, more than a third of administrators admitted to using those privileges to read unauthorized data. (See Security's Rotten Apples.)

Bottom line: If you thought you could trust your IT security team with broad systems access and shared administrative passwords, think again.

"The fact is that most of the security breaches enterprises see come from insiders, and most of those insider breaches come from people who have privileged access to data," says Mark Diodati, senior analyst for identity and privacy strategies at the Burton Group. The U.S. Secret Service last year estimated that approximately 80 percent of all insider incidents were caused by users with privileged access.

Until recently, however, most companies didn't have a process for controlling access to data by IT administrators. "It was usually an Excel spreadsheet or a laminated card that contained all the admin passwords, and the only controls were that you were told not to pass them around," Diodati notes.

Over the last two years, however, with the advent of more scrupulous auditing standards imposed by standards such as SOX, HIPAA, and PCI -- as well as very public breaches such as the one at UBS PaineWebber -- companies have found a very real need to add some controls that limit IT administrators' access to data and prevent the sort of casual abuse of privileges that has been available to IT staffers for decades.

"We've already got 230 customers using our product -- that's more than some of the end-user-oriented identity management tool vendors have," says Adam Bosnian, vice president of product strategy and sales at Cyber-Ark, a company that makes software for monitoring, managing, and distributing privileged administrative passwords. "That tells you that this particular problem is one that is important to compliance, but isn't being addressed by a lot of the [identity management] tools that are out there."

Cyber-Ark is one of a half dozen small vendors that have been grouped together in an emerging security product category -- "privileged access management" -- by Burton Group, Gartner, and others. Although these tools work differently, the general idea is to place all of the administrative passwords in a sort of escrow -- Cyber-Ark calls it a "vault" -- and mete them out only to administrators who have a real need to access the systems in question.

"What we find, post-sale, is that when the administrative passwords are all changed and locked in the vault, people start coming out of the woodwork to ask what happened," Bosnian says. "Where you thought you only had 10 people with administrative access to a particular system, you might find that you actually have 30."

Privileged access management systems also enable enterprises to monitor the use of administrative passwords, creating an audit trail that allows forensics investigators to identify the specific user who abused a shared administrative password.

"The old joke was to ask who accessed the HR database," Diodati says. "The answer: 'root.' It used to be that if the access was made by a root password, you couldn't track it to any one individual." Some enterprises have more than 200 people sharing a single administrative password, Bosnian says.

But while products such as Cyber-Ark's might control access to administrative passwords, they typically don't restrict access to specific functions or datasets once the administrator is inside a system, Diodati observes. Windows and other systems still need a control mechanism analogous to SUDU, a Unix feature that allows organizations to grant administrative access only to specific functions or data.

"We're working on features that will monitor keystrokes and activity, and also more granular authorization to specific parts of a system," Bosnian says. The new capabilities will likely be available in 2008, he says.

But Diodati notes that there is a whole range of administrative passwords built into many scripts and applications that still need to be addressed by access control technologies and practices. "At some point, there's going to be a need to rip embedded passwords out of programs and restrict them," he says. "That will probably come later, after the basic administrative checkout issues are addressed."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...