TESTIMONIALS

โ€œReceived the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.โ€

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
News Archive

Infosec Lessons

by Msecadm4921

In the aftermath of the DigiNotar, Comodo and RSA breaches – what have we learned? asks Gregory Webb, Director of Marketing, Venafi.

When a company prides itself in providing the most advanced and sophisticated network security solutionsโ€”and that companyโ€™s own network is hackedโ€”brand insult is added to data injury. Not only must the company compensate customers for their losses, but the breach of information incurs an unquantified cost to its reputation. No one wants to call on the services of the Fire Brigade whose own buildings burned down, and customers will invariably ask how a companyโ€™s security solutions can protect them if they couldnโ€™t protect the company itself.
In 2011 the world has witnessed several cases in which network security companies โ€“ RSA, Comodo and StartSSLโ€”themselves fell victim to hacking at a severe cost to their reputation. With DigiNotar recently joining the ranks of as a trusted third-party security organisation successfully compromised by hackers, enterprises need to move past the shock and begin formulating their own compromise recovery and business continuity plans.
All enterprises need to look at their highest-value assetsโ€”servers and applications where sensitive and regulated data flows, and that are protected by certificates. Plans must be in place to recover anytime the trust provider is compromised. This article details how those breaches occurred and the lessons that the victims learned from them.

RSA Breach
RSA, the Security Division of storage vendor EMC, forms a pillar of the security industry. Its name is so synonymous with security that the RSA Conference, considered one of the premier security conferences, bears its name (though there is no longer any official tie). And yet, in mid-March, RSA was hit by a breach that compromised the two-factor authentication product SecurID used by thousands of its customers.
RSA described the breach as an โ€œadvanced persistent threatโ€ (APT), implying that a group with vast resources had targeted RSA over a long period of time. (However, some critics contend that RSA is saving face with a too liberal use of the term – security analyst Scott Crawford called the scheme โ€œplain old phishing.โ€)
According to RSA, the attackers used โ€œsocial engineeringโ€ tools to glean information on a group of RSA employees by searching social networking sites. The perpetrators fashioned โ€œspear phishing e-mailsโ€ containing personal information that would entice the targets to open the messages. Clicking on the attached Excel file, โ€œ2011 Recruitment plan.xls,โ€ unleashed a zero-day exploit that installed a backdoor in victimsโ€™ computers through an Adobe Flash vulnerability, since patched. Once in, the hacker was able to sniff around, seeking accounts with higher access privileges than the person originally duped. These privileged accounts allowed the attacker to extract the SecurID credentials from the network, RSA said.
While RSA Executive Chairman Art Coviello blogged that RSA does not believe the items exposed could be used to steal from a customer, โ€œthis information could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack.โ€ Presumably, hackers obtained information that allows them to calculate the passwords generated by a given SecurID product at a given time, thus removing one factor in the authentication, leaving the userโ€™s password to stand on its own.
Sure enough, in late May, news outlets reported an attack on defense contractor Lockheed Martinโ€™s network by hackers who reportedly used duplicate SecurID electronic keys pilfered in the RSA attack. Even though the attack failed, RSA has since offered to replace the SecurID tokens for any customer who wants them.

Comodo Breach
Comodo also operates in the security space as, among other things, a Public Key Infrastructure (PKI) Certificate Authority (CA). As a CA, Comodo issues certificates to other entities, attesting that those entities truly represent who they claim to represent. For example, when a browser attempts to establish a Secure Socket Layer (SSL) connection to a Web site, the site presents its CA-signed certificates to authenticate itself as legitimate. If hackers can trick a CA into signing their fraudulent certificate requests, they can pose as Google, Yahoo or, worse, a bank. They can then freely download malware, for instance, to usersโ€™ computers or trick users into exposing their financial account credentials.
Comodo discovered in March that it had inadvertently granted certificates to an Iranian hacker who called himself โ€œComodo Hackerโ€ in a blog post. Somewhat like RSA, Comodo has attempted to present the attack as a vast, state-sponsored affair. Comodoโ€™s CEO and founder, Melih Abdulhayoglu, blogged that Comodo interpreted the breach as โ€œโ€˜state driven/fundedโ€™ attacks โ€ฆ from Iran.โ€™โ€
However, Comodo Hacker challenged this interpretation. Although supportive of the Iranian regime, Comodo Hacker acted alone. He wrote, โ€œI’m not a group. I’m [a] single hacker with [the] experience of 1,000 hackers. I’m [a] single programmer with [the] experience of 1,000 programmers.โ€
News reports stated that the digital certificates were obtained from an affiliate of Comodo by someone who used a valid username and password. Comodo acted quickly by revoking the fraudulent certificates through an update to popular browsers like Internet Explorer, Firefox and Chrome. Comodo further assured its customers that it had suspended the two affiliated businesses that were supposed to vet certificate applications.
But analysts note serious flaws in Comodoโ€™s processes. That the requester had an Iranian IP address should have raised eyebrows, as well as the fact that the requests were for well-known sites such as Google, Yahoo, Mozilla and Skype. Some security experts content that cleaning up the fraudulently obtained Comodo certificates only deals with the known attack; to combat unknown risks, someone should cross-check the work of all CAs โ€“ besides Comodo, the leading ones are VeriSign and GoDaddy โ€” to catch mistakes like these.

Lessons
The biggest lesson learned is that virtually any company โ€” security vendor or otherwise โ€” is vulnerable, such is the insecure nature of the Internet. Comodo, DigiNotar and RSA showed the world that despite, for lack of a better description, โ€œrock-solid security,โ€ the inevitable can happen. Despite the irony of these successful attacks against two of the worldโ€™s preeminent security companies, these vendors found themselves as vulnerable as any to attacks that targeted employees and practices rather than specific technologies and security systems. Companies that havenโ€™t yet suffered a breach, or who are unaware if they have, should be grateful that RSA, Comodo and now DigiNotar are now shining light on how to improve the situation.
For example, the Comodo and DigiNotar breaches illuminate the key role that humans play in all security efforts. As third-party trust providers, both certificate authorities learned the necessity of counteracting human error with well-documented policies and built in dual controls for issuing and managing certificates.
RSAโ€™s breach followed a slightly different pattern, but the company learned a similar lesson in the importance of confronting security risksโ€”not merely with new technologiesโ€”but with better practices. Uri Rivner, Head of New Technologies and Consumer Identity Protection at RSA, blogged that RSA is building a whole new โ€œdefense doctrineโ€ to respond to the attacks.
In the same way, with advanced and improved defense practices and management, enterprises can continue to send data more securely across the Internet despite new and increasing attacks. Placing particular emphasis on the human element in the latest attacks, Rivner wrote: โ€œItโ€™s time to respond as an industry, define and execute a new defense doctrine based on information sharing, deep analytics and advanced threat management.โ€
Further, few organisations have a management platform in place that gives them the power to replace compromised certificates quickly. Otherwise, the replacement of known, compromised certificates is largely a manual effort. This forces organisations to continue operations in a compromised conditionโ€”possibly for many monthsโ€”while the thousands of compromised certificates are manually replaced. In some cases that may not even be an option and entire systems may have to be shut down until remediated.
With hackers operating on the inside, attempting to extract data by leveraging legitimate usersโ€™ access, enterprises must respond with better processes for managing and auditing all means of access to critical dataโ€”whether user accounts or the asymmetric encryption keys that are used as credentials by applications and servers. Better access and audit controls will enable companies to contain breaches and to discover them more quickly. And by shoring up this element in defenseโ€”the neglect of which can cause embarrassing data breaches in the most security-technology-driven of companiesโ€”enterprises reduce the risk of becoming 2011โ€™s next high-profile victim.

About the author

Gregory Webb, Director of Marketing, Venafi – has worked in the high tech and enterprise software industry for nearly a decade and oversees marketing at Venafi. Webb joined the company in 2008. Prior to Venafi, Webb worked at Novell where he promoted the company’s Identity and Workgroup solutions and oversaw the launch of several products. Mr. Webb holds a masters degree from Brigham Young University and a doctorate from the University of California, Los Angeles.