Malware Devil

Sunday, February 28, 2021

Maldocs: Protection Passwords, (Sun, Feb 28th)

In diary entry “Unprotecting Malicious Documents For Inspection” I explain how to deal with protected malicious Excel documents by removing the protection passwords.

I created a new version of my plugin plugin_biff that attempts to recover protection passwords with a dictionary attack.

Here I use it with Brad’s malicious spreadsheet sample:

It’s not possible to determine if the recovered passwords (piano1 and 1qaz2wsx) are the actual passwords used by the malicious actors, or if they are the result of hash collisions (it’s only a 32-bit hash). But they do work: you can remove the protections by using these passwords.

 

Didier Stevens
Senior handler
Microsoft MVP
blog.DidierStevens.com DidierStevensLabs.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Maldocs: Protection Passwords, (Sun, Feb 28th) appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/maldocs-protection-passwords-sun-feb-28th/?utm_source=rss&utm_medium=rss&utm_campaign=maldocs-protection-passwords-sun-feb-28th

BSides Calgary 2020 – Josh Sokol’s ‘Architecting For Security In The Cloud’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – Josh Sokol’s ‘Architecting For Security In The Cloud’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – Josh Sokol’s ‘Architecting For Security In The Cloud’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/bsides-calgary-2020-josh-sokols-architecting-for-security-in-the-cloud/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-josh-sokols-architecting-for-security-in-the-cloud

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 318’

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics

Permalink

The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 318’ appeared first on Security Boulevard.

Read More

The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 318’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/robert-m-lees-jeff-haas-little-bobby-comics-week-318/?utm_source=rss&utm_medium=rss&utm_campaign=robert-m-lees-jeff-haas-little-bobby-comics-week-318

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

Regardless of how familiar you are with Information Security, you’ve probably come across the term ‘malware’ countless times. From accessing your business-critical resources and sensitive information to halting business operations and services, a malware infection can quickly become an organization’s … (more…)

The post GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce appeared first on Security Boulevard.

Read More

The post GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/guest-essay-everyone-should-grasp-these-facts-about-cyber-threats-that-plague-digital-commerce/?utm_source=rss&utm_medium=rss&utm_campaign=guest-essay-everyone-should-grasp-these-facts-about-cyber-threats-that-plague-digital-commerce

BSides Calgary 2020 – Jason Maynard’s ‘Security Can Do Better: Think Security Architecture’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – Jason Maynard’s ‘Security Can Do Better: Think Security Architecture’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – Jason Maynard’s ‘Security Can Do Better: Think Security Architecture’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/bsides-calgary-2020-jason-maynards-security-can-do-better-think-security-architecture/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-jason-maynards-security-can-do-better-think-security-architecture

Weekly News Roundup — February 21 to February 27

Hello and welcome to Sec Soup, where the weekly newsletter has a collection of infosec links to Tools & Tips, Threat Research, and more! The focus trends toward DFIR and threat intelligence, but general information security and hacking-related topics are included as well. This list is not vetted nor intended to be an exhaustive source. Keeping up with the enormous volume of security-related information is a daunting task, but this is my way of filtering the most useful items and improving the signal to noise ratio. Happy Reading!

Industry Reports, News, and Miscellany

Threat Research 

Tools and Tips

Breaches, Government, and Law Enforcement 

Vulnerabilities and Exploits

Read More

The post Weekly News Roundup — February 21 to February 27 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/weekly-news-roundup-february-21-to-february-27/?utm_source=rss&utm_medium=rss&utm_campaign=weekly-news-roundup-february-21-to-february-27

Identity Defined Security Alliance Partners with National Cyber Security Alliance to Launch First-Ever ‘Identity Management Day’ April 13, 2021

Identity Management Day aims to educate and engage business leaders,  IT decision makers and consumers on the importance of managing and securing digital identities   DENVER, Feb. 23, 2021 — The Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral education and resources to help organizations reduce the risk of a breach by combining..

The post Identity Defined Security Alliance Partners with National Cyber Security Alliance to Launch First-Ever ‘Identity Management Day’ April 13, 2021 appeared first on Security Boulevard.

Read More

The post Identity Defined Security Alliance Partners with National Cyber Security Alliance to Launch First-Ever ‘Identity Management Day’ April 13, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/identity-defined-security-alliance-partners-with-national-cyber-security-alliance-to-launch-first-ever-identity-management-day-april-13-2021-4/?utm_source=rss&utm_medium=rss&utm_campaign=identity-defined-security-alliance-partners-with-national-cyber-security-alliance-to-launch-first-ever-identity-management-day-april-13-2021-4

Why Do Chief Security Officers Leave Jobs So Often?

Is it time to look elsewhere? Everyone knows that cybersecurity is a red-hot career field, and chief security officers (or chief information security officers in many organizations) are the ones leading the online security defense. So how can we explain the current situation where about 24 percent of Fortune 500 CISOs last just one year,..

The post Why Do Chief Security Officers Leave Jobs So Often? appeared first on Security Boulevard.

Read More

The post Why Do Chief Security Officers Leave Jobs So Often? appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/why-do-chief-security-officers-leave-jobs-so-often/?utm_source=rss&utm_medium=rss&utm_campaign=why-do-chief-security-officers-leave-jobs-so-often

Clubhouse App and Your Privacy

Everyone is talking about the Clubhouse app but what should you be concerned about from a privacy perspective? In our February monthly show, Tom and Scott discuss what all the hype is about and what you need to know if you happen to receive a Clubhouse invite! ** Links mentioned on the show ** Join […]

The post Clubhouse App and Your Privacy appeared first on The Shared Security Show.

The post Clubhouse App and Your Privacy appeared first on Security Boulevard.

Read More

The post Clubhouse App and Your Privacy appeared first on Malware Devil.



https://malwaredevil.com/2021/02/27/clubhouse-app-and-your-privacy/?utm_source=rss&utm_medium=rss&utm_campaign=clubhouse-app-and-your-privacy

Saturday, February 27, 2021

BSides Calgary 2020 – James Harrison’s ‘How To Pick A Pocket’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – James Harrison’s ‘How To Pick A Pocket’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – James Harrison’s ‘How To Pick A Pocket’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/27/bsides-calgary-2020-james-harrisons-how-to-pick-a-pocket/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-james-harrisons-how-to-pick-a-pocket

XKCD ‘Post-Pandemic Hat’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Post-Pandemic Hat’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Post-Pandemic Hat’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/27/xkcd-post-pandemic-hat/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-post-pandemic-hat

Friday, February 26, 2021

NSA Releases Guidance on Zero-Trust Architecture

A new document provides guidance for businesses planning to implement a zero-trust system management strategy.

The National Security Agency (NSA) today published a document to explain the zero-trust model and its benefits, challenges involved with implementation, and advice to navigate the process.

As cloud, multicloud, and hybrid network environments become the norm for businesses, the resulting complexity, combined with evolving threats, puts many at risk. Traditional perimeter-based network defenses with layers of security tools are often insufficient. Companies need a better way to protect infrastructure and provide granular access to data, services, and apps.

“The Zero Trust security model eliminates implicit trust in any one element, node, or service and instead requires continuous verification of the operational picture via real-time information fed from multiple sources to determine access and other system responses,” NSA officials wrote.

Zero trust requires strong authentication for both user and device identities. Use of multifactor authentication, which is recommended in this model, can make credential theft more difficult.

The implementation of zero trust takes time and effort, but it doesn’t have to be done all at once. Many businesses may be able to incorporate zero-trust concepts into existing network infrastructure; however, the transition to a mature architecture often requires additional capabilities. Officials advise planning out the integration as a “continually maturing roadmap,” starting with initial preparation and continuing on to basic, intermediate, and advanced stages.

As with all major projects, there are challenges. Officials note potential roadblocks include lack of support from enterprise leadership or users. If leadership isn’t willing to provide the needed resources to sustain a zero-trust architecture, or users are allowed to bypass policies, then zero trust won’t prove beneficial, they say.

Read the full document here for more details.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post NSA Releases Guidance on Zero-Trust Architecture appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/nsa-releases-guidance-on-zero-trust-architecture/?utm_source=rss&utm_medium=rss&utm_campaign=nsa-releases-guidance-on-zero-trust-architecture

Sete práticas de segurança cibernética que toda organização deveria implementar

Os dados são claros: houve um aumento de 25% nos ataques de ransomware no primeiro trimestre de 2020 em comparação com o quarto trimestre de 2019. Outros, como ataques de phishing e ataques de negação de serviço distribuído (DDoS), também …

The post Sete práticas de segurança cibernética que toda organização deveria implementar appeared first on ManageEngine Blog.

The post Sete práticas de segurança cibernética que toda organização deveria implementar appeared first on Security Boulevard.

Read More

The post Sete práticas de segurança cibernética que toda organização deveria implementar appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/sete-praticas-de-seguranca-cibernetica-que-toda-organizacao-deveria-implementar/?utm_source=rss&utm_medium=rss&utm_campaign=sete-praticas-de-seguranca-cibernetica-que-toda-organizacao-deveria-implementar

Evolução da cibersegurança: Uma breve linha do tempo

A evolução da cibersegurança acompanhou o desenvolvimento da tecnologia da comunicação. À medida que progredíamos de telégrafos para os smartphones, o mesmo aconteceu com os ataques cibernéticos, do worm Morris ao Stuxnet e, mais recentemente, Snake ransomware. Percorremos um longo

The post Evolução da cibersegurança: Uma breve linha do tempo appeared first on ManageEngine Blog.

The post Evolução da cibersegurança: Uma breve linha do tempo appeared first on Security Boulevard.

Read More

The post Evolução da cibersegurança: Uma breve linha do tempo appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/evolucao-da-ciberseguranca-uma-breve-linha-do-tempo/?utm_source=rss&utm_medium=rss&utm_campaign=evolucao-da-ciberseguranca-uma-breve-linha-do-tempo

Um dia na vida de um analista SOC

Um analista de centro de operações de segurança (SOC) é parte integrante de uma equipe responsável por mantera empresa protegida contra crimes cibernéticos. O analista SOC é um profissional de segurança que lida com as coisas boas e ruins, detectando …

The post Um dia na vida de um analista SOC appeared first on ManageEngine Blog.

The post Um dia na vida de um analista SOC appeared first on Security Boulevard.

Read More

The post Um dia na vida de um analista SOC appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/um-dia-na-vida-de-um-analista-soc/?utm_source=rss&utm_medium=rss&utm_campaign=um-dia-na-vida-de-um-analista-soc

Google to Underwrite Contributors to Linux Security

Linux security XDR open source security

Google and the Linux Foundation announced this week they will underwrite two full-time maintainers for Linux kernel security development. Gustavo Silva is currently working full time on eliminating several classes of buffer overflows by transforming all instances of zero-length and one-element arrays into flexible-array members, which is the preferred and least error-prone mechanism to declare..

The post Google to Underwrite Contributors to Linux Security appeared first on Security Boulevard.

Read More

The post Google to Underwrite Contributors to Linux Security appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/google-to-underwrite-contributors-to-linux-security/?utm_source=rss&utm_medium=rss&utm_campaign=google-to-underwrite-contributors-to-linux-security

‘Nerd’ Humor

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


The post ‘Nerd’ Humor appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/nerd-humor/?utm_source=rss&utm_medium=rss&utm_campaign=nerd-humor

The Edge Pro Tip: Fasten Your Seatbelts

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


2/26/2021
02:50 PM
image

image

An unprecedented 2020 has shaken up security leaders’ usual list of must-have technologies for 2021. Where do they plan to spend next?

Read more about security leaders’ spending priorities here.

The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Cartoon Caption Winner: Be Careful Who You Trust

The post The Edge Pro Tip: Fasten Your Seatbelts appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/the-edge-pro-tip-fasten-your-seatbelts-2/?utm_source=rss&utm_medium=rss&utm_campaign=the-edge-pro-tip-fasten-your-seatbelts-2

Securing Super Bowl LV

A peek at open XDR technology, and defense that held up better than the Kansas City Chiefs.
(image by detakstudio, via Adobe Stock)

(image by detakstudio, via Adobe Stock)

Protecting the Super Bowl from cyberattackers is no small task. In fact, it’s a sprawling, messy mass of challenges converging on a day when (almost) 100 million people are watching.

This year, much of the job fell to ReliaQuest, the official cybersecurity partner for both the Tampa Bay Buccaneers and the NFL Super Bowl LV Host Committee. ReliaQuest CEO Brian Murphy and CTO Joe Partlow lay out the tasks:

Protecting the stadium’s wireless access points and payment systems. Defending the scoreboard from vandalism and sad fans hoping to change the score. Locking down the volunteer staff’s background checks and COVID screening info. Securing coaches’ tablets and comms so their playbooks and play-calling are kept confidential. Making sure injury reports, starting lineups, and other valuable data aren’t leaked to the competition and the gambling public early. The list goes on. It means monitoring threat intelligence reports, scraping social media, shifting defense to respond to shifting threats.

(And, hopefully, doing so as effectively as the Buccaneers’ defense was against the Kansas City Chiefs’ attacks in the Bucs’ 31-9 victory that night.)

It would be a big undertaking in any year, for sure, but in 2021 the pandemic created new challenges, Murphy and Partlow explain.

Attendance in the stadium at Super Bowl LX was slashed from 62,000 to 22,000, but the bigger change affecting infosec was in the viewership outside of the stadium.

“‘Watch parties weren’t happening,” Murphy explains.

Usually, he says, people gather to watch the game, at restaurants, bars, and friends’ houses with big-screen TVs. This year, instead, people were watching alone, at home, on a variety of devices.

The result: Although the overall viewership ratings were the lowest for a Super Bowl since 2006, live-streaming viewership rocketed up by 65%, according to CBS.

Expecting the bump in online viewers, ReliaQuest also expected an accompanying bump in overall security events leading up to and during the game. The company hypothesized that its overall customer base might experience more attacks during the 2021 Super Bowl than in 2020.

They were right: In fact, ReliaQuest detected a 20.2% increase in total security events, year over year. There were upticks in phishing and ransomware attacks. The most noteworthy change was the increase in malicious streaming services, luring victims with promises like, “Watch the Super Bowl for free! Just download here.”

Defending against the wide variety of threats related to the event requires an array of intelligence, detection, and response tools – security information and event management (SIEM), endpoint detection and response (EDR), and threat intelligence, for starters, and in in this case, pulled together by an extended detection and response product (XDR). Partlow and Murphy explain that their company’s XDR offering is an “open XDR” technology. By “open,” they mean the XDR is vendor-agnostic. It integrates security tools from a variety of security companies – some Carbon Black here, some Tenable there, etc.

This approach can also, for example, simplify a merger or acquisition, Partlow explains.

“Each company probably chose their security tools for a good reason,” he says, “As that [merged] enterprise, I don’t have to rip-and-replace and make it all one logo.”

Although bruised-up Chiefs quarterback Patrick Mahomes might disagree, attacks on Super Bowl Sunday were handled without major incident – “aside from the streaker,” says Partlow. But that, he notes,”was a physical security breakdown.”

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Securing Super Bowl LV appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/securing-super-bowl-lv-2/?utm_source=rss&utm_medium=rss&utm_campaign=securing-super-bowl-lv-2

Lazarus Targets Defense Companies with ThreatNeedle Malware

A spear-phishing campaigned linked to a North Korean APT uses “NukeSped” malware in cyberespionage attacks against defense companies.
Read More

The post Lazarus Targets Defense Companies with ThreatNeedle Malware appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/lazarus-targets-defense-companies-with-threatneedle-malware/?utm_source=rss&utm_medium=rss&utm_campaign=lazarus-targets-defense-companies-with-threatneedle-malware

The Edge Pro Tip: Fasten Your Seatbelts

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


2/26/2021
02:50 PM
image

image

An unprecedented 2020 has shaken up security leaders’ usual list of must-have technologies for 2021. Where do they plan to spend next?

Read more about security leaders’ spending priorities here.

The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Cartoon Caption Winner: Be Careful Who You Trust

The post The Edge Pro Tip: Fasten Your Seatbelts appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/the-edge-pro-tip-fasten-your-seatbelts/?utm_source=rss&utm_medium=rss&utm_campaign=the-edge-pro-tip-fasten-your-seatbelts

Event ID 7039 – out…pid a pid

This event is not very well explained on the internet, so I took a liberty of describing it below:

The event message is as follows:

A service process other than the one launched by the Service Control Manager connected when starting the [SERVICE_NAME] service. The Service Control Manager launched process [PID1] and process [PID2] connected instead.

Note that if this service is configured to start under a debugger, this behavior is expected.

The message kinda tells us what happened – two different processes talk to SCM instead of one. It doesn’t really tell us WHY this happens.

Example from a case I looked at in response to a query on Twitter:

In this particular case the c:windowssysmon.exe was registered as a program that service process starts from. I believe this file was later manually replaced with a newer version of sysmon.exe. The little-known fact about distributable version of Sysmon (sysmon.exe from the sysinternals page) is that it is built as a 32-bit executable with an embedded 64-bit executable inside its resources. When launched on a 64-bit system the 32-bit version extracts and spawns that 64-bit version executable (note the PIDs and compare them against the Event Log):

Looking at it in general terms: when you register a service its configuration in Registry points to an executable file. This executable is then used to launch a service. Some services are not designed in a very good way. Once such programs are launched as a service, they spawn other processes, sometimes even batch files that may as well launch other programs. If one of these spawn programs talks to SCM the latter immediately recognizes that it’s not the same executable as the service process the service configuration points to. Such design is in general poor and could be a subject to possible privilege escalation (in a lolbinish way). And since this is a security concern the event 7039 is being logged.

And this leads me to the key reason I wanted to write an article. The Event 7309 tells you two things:

  • Whoever designed the service didn’t do the best job, OR, more importantly,
  • A bad guy may be using a badly designed service to escalate privileges.

Hence, you should be looking at these.

And last, but not least – does it mean Sysmon is designed badly? Nope. It’s designed in a clever way to use a single portable executable for 32-bit and 64-bit systems. The problem arises from a corner case in a way it was manually upgraded, instead of using the “-u” switch.

Read More

The post Event ID 7039 – out…pid a pid appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/event-id-7039-outpid-a-pid/?utm_source=rss&utm_medium=rss&utm_campaign=event-id-7039-outpid-a-pid

Infrastructure Hygiene: Fixing Vulnerabilities

Posted under: Research and Analysis

As discussed in the first post in the Infrastructure Hygiene series, the most basic advice we can give on security is to do the fundamentals well. That doesn’t insulate you from determined and well-funded adversaries or space alien cyber attacks, but it will eliminate the path of least resistance that most attackers take.

The blurring of infrastructure as more tech stack components become a mix of on-prem, cloud-based, and managed services further complicate matters. How do you block and tackle well when you have to worry about three different fields and multiple teams playing on each field? Maybe that’s enough of the football analogies.

As if that wasn’t enough, now you have no margin for error because attackers have automated the recon for many attacks. So if you leave something exposed, they will find it. They being the bots and scripts always searching the Intertubes for weak links.

Although you aren’t reading this to keep hearing about the challenges of doing security, are you? So let’s focus on how to fix these issues.

Fix It Fast and Completely

It may be surprising, but the infrastructure vendors typically issue updates when discovering vulnerabilities in their products. Customers of those products then patch the devices to keep them up to date. We’ve been patching as an industry for a long time. And we at Securosis have been researching patching for almost as long. Feel free to jump in the time machine and check out our seminal work on patching in the original Project Quant.

The picture above shows the detailed patching process we defined back in the day. You need to have a reliable, consistent process to patch the infrastructure effectively. We’ll point specifically to the importance of the test and approve step due to the severity of the downside of deploying a patch that takes down an infrastructure component.

Yet going through a robust patching process can take anywhere from a couple of days to a month. Many larger enterprises look to have their patches deployed within a month of release. But in reality, a few weeks may be far too long for a high-profile patch/issue. As such, you’ll need a high priority patching process, which applies to patches addressing very high-risk vulnerabilities. Part of this process is to establish criteria for triggering the high-priority patching process and which parts of the long process you won’t do.

Alternatively, you could look at a virtual patch=, which is an alternative approach to use (typically) a network security device to block traffic to the vulnerable component based on the attack’s signature. This requires that the attack has an identifiable pattern to build the signature. On the positive, a virtual patch is rapid to deploy and reasonably reliable for attacks with a definite traffic pattern.

One of the downsides of this approach is that all traffic destined for the vulnerable component would need to run through the inspection point. If traffic can get directly to the component, the virtual patch is useless. For instance, if a virtual patch was deployed on a perimeter security device to protect a database, an insider with direct access to the database could use the exploit successfully since the patch hasn’t been applied. In this context, insider could also mean an adversary with control of a device within the perimeter.

For high-priority vulnerabilities, where you cannot patch either because the patch isn’t available or due to downtime or other maintenance challenges, a virtual patch provides a good short-term alternative. But we’ll make the point again that you aren’t fixing the component, rather hiding it. And with 30 years of experience under our belts, we can definitively tell you that security by obscurity is not a path to success.

We don’t believe that these solutions are mutually exclusive. The most secure way to handle infrastructure hygiene is to use both techniques. Virtual patching can happen almost instantaneously, and when dealing with a new attack with a weaponized exploit already in circulation, time is critical.

But given the ease with which the adversary can change a network signature and the reality that it’s increasingly hard to ensure that all traffic goes through an inspection point, deploying a vendor patch is the preferred long-term solution—and speaking of long-term solutions.

Abuse the Shared Responsibilities Model

One of the things about the cloud revolution that is so compelling is the idea of replacing some infrastructure components with platform services (PaaS). We alluded to this in the first post, so let’s dig a bit deeper into how the shared responsibility model can favorably impact your infrastructure hygiene. Firstly, the shared responsibility model is a foundational part of cloud computing and defines that the cloud provider has specific responsibilities. The cloud consumer (you) would also have security responsibilities. Ergo, it’s a shared responsibility situation.

Divvying up the division of responsibilities depends on the service and the delivery model (SaaS or PaaS), but suffice it to say that embracing a PaaS service for an infrastructure component gets you out of the operations business. You don’t need to worry about scaling or maintenance, and that includes security patches. I’m sure you’ll miss the long nights and weekends away from your family running hotfixes on load balancers and databases.

Ultimately moving some of the responsibility to a service provider reduces both your attack and your operational surfaces, and that’s a good thing. Long term, strategically using PaaS services will be one of the better ways to reduce your technology stack risk. Though let’s be very clear using PaaS doesn’t shift accountability. Your PaaS provider may feel bad if they mess something up and will likely refund some of your fees if they violate their service level agreement. But they won’t be presenting to your board explaining how the situation got screwed up – that would be you.

The Supply Chain

If there is anything we’ve learned from the recent Solarwinds and the Target attack from years ago (both mentioned in the first post of the series), it’s that your hygiene responsibilities don’t end at the boundaries of your environment. Far from it. As mentioned above, you may not be responsible for maintaining the infrastructure components of your providers and partners, but you are accountable for how weaknesses there can potentially impact your environment.

Wait, what? Let’s clarify a bit. If an external business partner gets owned and the attacker moves into your environment and starts wreaking havoc, guess what? You are accountable for that, but you can make the case that the partner was responsible for protecting their environment and failed. That fact won’t help you when you are in front of your organization’s audit committee explaining why your third-party risk program wasn’t good enough.

Just as we want to abuse the shared responsibilities model to get some operational help and reduce the attack surface, you need to spend additional resources on risk management. On a positive note, you’ve very likely already been doing this, and it’s a minor extension of your program to scrutinize the infrastructure components underlying your tech stack.

Infrastructure hygiene is straightforward in concept, but it’s much harder to do consistently. At scale, so we’ll wrap up the blog series with a discussion of the processes required to do it well, which will include far more than just an admin running patches all day.

– Mike Rothman
(0) Comments
Subscribe to our daily email digest

The post Infrastructure Hygiene: Fixing Vulnerabilities appeared first on Security Boulevard.

Read More

The post Infrastructure Hygiene: Fixing Vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/infrastructure-hygiene-fixing-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=infrastructure-hygiene-fixing-vulnerabilities

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...