Lessons Learned From The Sony Pictures Hack
Bruce Schneier reminded me of an old but very relevant concept in IT Security. There are two types of attacks: opportunistic and targeted. And then you can characterize attackers on two axis: skill and focus.
For example, script kiddies using point-and-click hacking tools are low-skill and low-focus. They grab what they can if the low-hanging fruit is available. On the other side of the spectrum are highly skilled nation-state hackers with a single focus, and Sony Pictures is a good example. A large Democratic People's Republic of (North) Korea (DPRK) hacking team went in and shut down Sony, their job made easy by Sony's third-rate security. As the DPRK specializes in unconventional (asymmetric) warfare, this type of attack may have been a great practice run for them.
In the middle between these two sit the opportunist high-skill, but low-focus attacks that we read about in the paper regularly: Target, Home Depot, JP Morgan Chase and now news breaks that Staples lost a million cards. I'm getting breach-fatigue, how about you?
So, what are the lessons learned?
- If you are the target of a high-skilled, high focus attack you can count on them getting inside. You need to focus on defending the crown jewels and make sure they do not get exfiltrated. The fact Sony did not notice terabytes of data leaving the network is an epic fail. Lesson learned: use encryption and breach detection tools.
- If you handle a lot of credit cards, Russian cybercrime has you in their crosshairs but so are a million others. If Home Depot would have upgraded their POS systems in time from XP to Win7, they would not have been hacked. So, good security makes the attacker's job a lot harder, more expensive and more risky. This type of bad guy is in it for the cash and their time is money -- they will move to a weaker target. Lesson learned: create enough IT security budget to give the InfoSec team the time and tools to implement best practices.
- The time to start is before the attack and be prepared. Get a professional pentester and see how they penetrate your network, the good ones always get in. Remember that IT security is really three things: protection, detection and response. Lesson learned, and I'm quoting Schneier here: "You need prevention to defend against low-focus attacks and to make targeted attacks harder. You need detection to spot the attackers who inevitably get through. And you need response to minimize the damage, restore security and manage the fallout."
Taking a possible inside-job or help from the inside off the table for a moment, as the Sony attackers came from across the planet, there are only three ways they could have gotten in:
1) Mis-configured servers that allowed unauthorized access;
2) Software vulnerabilities, either known holes or unknown zero-days;
3) Social engineering untrained employees that simply allow the bad guys in by clicking on a spear-phishing link.
At least you can do something about the last one right away. The brand new, updated Kevin Mitnick Security Awareness Training 2015. We have now sent over 2 million simulated phishing emails across 35,000 campaign runs! Find out how affordable this is for your organization:
https://info.knowbe4.com/kmsat_get_a_quote_now
Malware Used To Wipe Sony's Drives Was Quick And Dirty
It's still not clear (and it may never be discovered) how the Democratic People's Republic of (North) Korea (DPRK) hackers came in, perhaps they used all available threat vectors since Sony's security was so lax: mis-configured servers, software vulnerabilities and social engineering spear-phishing emails to employees.
But CERT said: "Cyber threat actors are using an SMB worm to conduct cyber exploitation activities. This tool contains five components – a listening implant, lightweight backdoor, proxy tool, destructive hard drive tool, and destructive target cleaning tool."
Quick And Dirty
However, an analysis by security researchers at Cisco of a malware sample that matches the MD5 hash signature showed that the code was full of bugs and anything but sophisticated. They compared it to the software equivalent of a crude pipe bomb.
Put next to other state-sponsored malware, "It's a night-and-day difference in quality," said Craig Williams, senior technical leader for Cisco’s Security Group, in an interview with Ars Technica, "The code is simplistic, not very complex, and not very obfuscated."
Heck, it does not take a lot to wipe a disk. Remember the old "Format C:" command? Here are the CERT details. Alert (TA14-353A) Targeted Destructive Malware:
https://www.us-cert.gov/ncas/alerts/TA14-353A
Here Is A Video Holiday Wish From All Of Us At KnowBe4
Here is the link to our blog where the video will play. Enjoy!!
https://blog.knowbe4.com/here-is-a-video-holiday-wish-from-all-of-us-here-at-knowbe4
The 5 Biggest Cybersecurity Myths, Debunked
WIRED wrote: “A domain for the nerds.” That is how the Internet used to be viewed back in the early 1990s, until all the rest of us began to use and depend on it. But this quote is from a White House official earlier this year describing how cybersecurity is too often viewed today. And therein lies the problem, and the needed solution.
"Each of us, in whatever role we play in life, makes decisions about cybersecurity that will shape the future well beyond the world of computers. But by looking at this issue as only for the IT Crowd, we too often do so without the proper tools. Basic terms and essential concepts that define what is possible and proper are being missed, or even worse, distorted. Some threats are overblown and overreacted to, while others are ignored." See the 5 myths here:
https://www.wired.com/2014/07/debunking-5-major-cyber-security-myths/
Warm Regards,
Stu Sjouwerman
Quotes of the Week:
"A smart person will give you smart answers, but a wise person will ask you smart questions." - seen on the Web -
"The most difficult thing is the decision to act, the rest is merely tenacity. The fears are paper tigers. You can do anything you decide to do." - Amelia Earhart
"Success is not final, failure is not fatal: it is the courage to continue that counts." - Winston Churchill
Train Your Employees About Mobile Device Security
BYOD is the number one headache for InfoSec pros at the moment. We can help. Our new 20-minute, refreshed for 2015, Mobile Device Security module of the Kevin Mitnick Security Awareness Training series specializes in making sure your employees understand the importance of staying safe online while using a mobile device.
They will learn the risks of their exposure to mobile security threats and are able to apply this knowledge in their day-to-day job. Learn more and request a quote:
https://info.knowbe4.com/mobile-security-module-14-12-23
InfoSec World Conference & Expo March 23-25 2015 Orlando, FL
InfoSec World 2015 returns to Disney’s Contemporary Resort with a lineup of conference sessions, workshops and summits that address the most pressing matters in information security today. With a selection of top-rated returning speakers and a roster of highly-regarded new-to-InfoSec World speakers, you’ll find content that is compelling, actionable and applicable to the current challenges you face at your job. Join your peers this March for 90+ sessions, 11 in-depth workshops, 3 co-located summits, a packed exhibit hall and a host of memorable networking events. Disney's Contemporary Resort
www.misti.com/infosecworld
Malware Incident At Mental Health Nonprofit: $150K Fine
As cyberattacks targeting the healthcare industry continue to escalate, the U.S. Department of Health and Human Services Office for Civil Rights (OCR) has published its first-ever resolution agreement stemming from an incident involving malware, highlighting the importance of reviewing systems for unpatched and unsupported software that can leave patient information susceptible to malware and other risks. More at:
https://www.jdsupra.com/legalnews/malware-incident-at-mental-health-nonpro-25161/
Nine Data Breaches That Cost Someone Their Job
This is actually a good article to send to your managers in your everlasting battle for IT Security budget.
Tis’ the season for data breaches. Following last year’s big announcement of not just Target’s data breach but executive job loss, CSO lays out 9 data breaches resulting in job loss, comparing Target alongside other breaches that have fallen under the radar:
http://www.csoonline.com/article/2859485/data-breach/9-data-breaches-that-cost-someone-their-job.html
Staples: 6-Month Malware Breach, 1.16 Million Cards
Office supply chain Staples Inc. finally acknowledged that a malware intrusion this year at some of its stores resulted in a credit card breach. The company now says some 119 stores were impacted between April and September 2014, and that as many as 1.16 million customer credit and debit cards may have been stolen as a result.
KrebsOnSecurity first reported the suspected breach on Oct. 20, 2014, after hearing from multiple banks that had identified a pattern of credit and debit card fraud suggesting that several Staples office supply locations in the Northeastern United States were dealing with a data breach. At the time, Staples would say only that it was investigating “a potential issue” and had contacted law enforcement.
In a statement, Staples released a list of stores hit with the card-stealing malware, and the stores are not limited to the Northeastern United States. Russian Cybercrime at its best, after Target, Home Depot and JP Morgan Chase. That Was Easy! (could not help myself)
https://krebsonsecurity.com/2014/12/staples-6-month-breach-1-16-million-cards/
About Time: Obama Signs 5 Cybersecurity Bills
This is the first time in dozen years that major CyberSec bills actually become law. Without ceremony, President Obama on Dec. 18 signed five cybersecurity-related bills, including legislation to update the Federal Information Security Management Act, the law that governs federal government IT security.
It's the first time in 12 years that significant cybersecurity legislation has become law. The last major piece of cybersecurity law to be passed by Congress and signed by a president was the E-Government Act of 2002, which included FISMA.
The five cybersecurity measures, among 48 bills the White House announced the president had signed, include the:
- Federal Information Security Modernization Act;
- Homeland Security Workforce Assessment Act;
- Cybersecurity Workforce Assessment Act;
- National Cybersecurity Protection Act;
- Cybersecurity Enhancement Act.
More about these at the GovInfoSecurity site:
https://www.govinfosecurity.com/obama-signs-5-cybersecurity-bills-a-7697
This Week's Links We Like. Tips, Hints And Fun Stuff.
Here is the best (comedy) rendition of "White Christmas" evah!:
https://www.youtube.com/watch?v=u7iLc7XhU8E
A "must-listen"... this TED talk by Mikko Hypponen from F-Secure:
https://www.youtube.com/watch?v=QKe-aO44R7k#t=1115
Last but not least, I simply could not resist this vanity license plate!
https://blog.knowbe4.com/i-simply-could-not-resist-this-vanity-plate