Internet Attack Called Broad and Long Lasting by Investigators
SAN FRANCISCO, May 9 - The incident seemed alarming enough: a breach of a Cisco Systems network in which an intruder seized programming instructions for many of the computers that control the flow of the Internet. Now federal officials and computer security investigators have acknowledged that the Cisco break-in last year was only part of a more extensive operation - involving a single intruder or a small band, apparently based in Europe - in which thousands of computer systems were similarly penetrated. .... http://www.nytimes.com/2005/05/10/technology/10cisco.html?hp&ex=1115784000&en=eeb27da2e75ec022&ei=5094&partner=homepage --Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb
This part: "The crucial element in the password thefts that provided access at Cisco and elsewhere was the intruder's use of a corrupted version of a standard software program, SSH. The program is used in many computer research centers for a variety of tasks, ranging from administration of remote computers to data transfer over the Internet." reminds me of the SourceForge attack a few years back http://www.apache.de/info/20010519-hack.html -Jim P. On Mon, 2005-05-09 at 22:37 -0700, Steven M. Bellovin wrote:
SAN FRANCISCO, May 9 - The incident seemed alarming enough: a breach of a Cisco Systems network in which an intruder seized programming instructions for many of the computers that control the flow of the Internet.
Now federal officials and computer security investigators have acknowledged that the Cisco break-in last year was only part of a more extensive operation - involving a single intruder or a small band, apparently based in Europe - in which thousands of computer systems were similarly penetrated.
....
--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb
Eventhough this article wasn't specifically regarding network operations, it does come down to the most fundamental of network operating practices. Create policies and the procedures that enable those policies. Then enforce them VERY strictly. The crucial element in the password thefts that provided access at Cisco and elsewhere was the intruder's use of a corrupted version of a standard software program, SSH. The intruder probed computers for vulnerabilities that allowed the installation of the corrupted program, known as a Trojan horse In the Cisco case, the passwords to Cisco computers were sent from a compromised computer by a legitimate user unaware of the Trojan horse Folks that handle sensitive info (proprietary code, personal info, HIPPA FERPA, SOX, .mil, etc, etc) should be allowed to download software only from company servers where all software has been cleared by folks that're experts in evaluating software packages. Not from the general internet. scott
Closing people's systems down from "any" other software installations isn't necessarily the solution. It can delay progress in many cases, and not everyone has IT staff that may be as up to speed as necessary. The requirement should be more along the lines of software designed to scan the system for things like that and alert/remove it. That kind of requirement at least gives flexibility and a good kick in the butt to implement good assessment tools at the PC or network level. All it takes is one user outside the "norm" to mess up LOTS of work and policies trying to keep things right! Scott -----Original Message----- From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of Scott Weeks Sent: Tuesday, May 10, 2005 2:16 AM To: nanog@nanog.org Subject: Re: Internet Attack Called Broad and Long Lasting by Investigators Eventhough this article wasn't specifically regarding network operations, it does come down to the most fundamental of network operating practices. Create policies and the procedures that enable those policies. Then enforce them VERY strictly. The crucial element in the password thefts that provided access at Cisco and elsewhere was the intruder's use of a corrupted version of a standard software program, SSH. The intruder probed computers for vulnerabilities that allowed the installation of the corrupted program, known as a Trojan horse In the Cisco case, the passwords to Cisco computers were sent from a compromised computer by a legitimate user unaware of the Trojan horse Folks that handle sensitive info (proprietary code, personal info, HIPPA FERPA, SOX, .mil, etc, etc) should be allowed to download software only from company servers where all software has been cleared by folks that're experts in evaluating software packages. Not from the general internet. scott
: Eventhough this article wasn't specifically regarding network operations, it : does come down to the most fundamental of network operating practices. : Create policies and the procedures that enable those policies. Then enforce : them VERY strictly. : Folks that handle sensitive info (proprietary code, personal info, HIPPA : FERPA, SOX, .mil, etc, etc) should be allowed to download software only from : company servers where all software has been cleared by folks that're experts : in evaluating software packages. Not from the general internet. On Tue, 10 May 2005, Scott Morris wrote: : Closing people's systems down from "any" other software installations isn't : necessarily the solution. It can delay progress in many cases, and not : everyone has IT staff that may be as up to speed as necessary. Ok, for smaller companies, yes. You have to trade off productivity and risk. But in a smaller company you will likely know each individual and their level of tech savvy. Red flags should pop up if they have a low level of understanding, have access to machines with sensitive or proprietary info and have the permission level to install software. Also, in this case we're talking Cisco, NASA, .mil networks and research labs. They have the ability to enforce policy and the need to be VERY risk adverse WRT losing sensitive data. In organizations that size, it's the enforement that's hard to pull off. It requires strict policy definition and procedure adherence. Don't give folks that have access to machines that hold sensitive info the ability to download software unless you know they're savvy enough to do so safely. If you do allow the less savvy folks whom have access to sensitive machines to install software, force the packages to be downloaded from a company repository. : The requirement should be more along the lines of software designed to scan : the system for things like that and alert/remove it. That kind of : requirement at least gives flexibility and a good kick in the butt to : implement good assessment tools at the PC or network level. In the article, it was too late by that time. The data was compromised. They didn't trade off risk and productivity well, or didn't enforce policy through procedure, or... : All it takes is one user outside the "norm" to mess up LOTS of work and : policies trying to keep things right! Anyone with access to machines that hold sensitive material should be held to a higher standard than the rest of the organization. You risk losing your treasure through these people. scott
On Tue, 2005-05-10 at 10:24 -1000, Scott Weeks wrote:
Don't give folks that have access to machines that hold sensitive info the ability to download software unless you know they're savvy enough to do so safely.
I don't see that as root of the problem. To me the real problem is in the use and handling of usernames and passwords. Take your typical contractor or SE (i use to be one) they have usernames and passwords for their corporate systems as well as customer systems. OK, so they may be careful who they share those credentials with, but they aren't careful enough with how they use those credentials themselves. I wish I had a nickle for every time I've seen a person assume everything was a-ok since they were using ssh, even though they couldn't have told you who installed ssh (or the remote sshd) on the systems. So, the SE ssh's into *your* corporate systems using ssh on their laptop (probably d/l'ed by googling for PuTTY or SSH and pulling the first available URL) while on a service call to your facility. Or how about the SE who ssh's into *their* corporate network from some rogue contractor box inside your network. Then there are those people who run bleeding edge O/Ses that constantly update from god-only-knows-where servers all over the world... what version of ssh is installed today? And there are those co-workers who "think" they know what they are doing but really don't. Ever dropped a BSOD screensaver on to a co-workers computer, dropping a bogus ssh executable is even easier. Use LDAP? Isn't it nice having one username and password for *all* things? The l33t [ch]4ck3rs love LDAP credentials. Your SSH password is the same as your IMAP/SMTP/POP3/HTTP/RDP password. In short: people need to not only respect their login credentials, they need to only use them from trusted systems and constantly be vigilant about the level of trust they have for those systems. DON'T mix usernames and passwords between differing classifications of systems. -Jim P.
participants (4)
-
Jim Popovitch
-
Scott Morris
-
Scott Weeks
-
Steven M. Bellovin