Hacking Team Postmortem

Hacking Team is an Italian company that sells intrusion and surveillance tools to governments and law enforcement agencies. Nine months ago, their world was rocked after someone infiltrated nearly 400GB of data form their network, including source code and contracts.

How to respond to ransomware threats:

The irony is that Hacking Team developed tools that enabled hostile governments to do the exact things that were done to them, so many in the security industry experienced no small amount of schadenfreude at their expense. Over the weekend, the person responsible for the Hacking Team data breach, Phineas Fisher, outlined the hack from start to finish.

To be clear, what happened to Hacking Team is a classic example of a targeted attack. Few organizations could outlast an attacker with knowledge, time, and resources. At the same time, the way Hacking Team managed and developed their network did them no favors.

Fisher took the time to reverse engineer some firmware in an embedded device and develop a new exploit. This Zero-Day vulnerability enabled persistent access, because he used it once (and only once) to plant a backdoor into the network.

Ultimately, a poorly configured iSCSI was Hacking Teams downfall, but there were other issues too – such as services deep within the network exposed to less secure subnets, MongoDB instances with no authentication, backups that had passwords stored in plaintext, as well as weak passwords everywhere – including on critical systems.

So what are some takeaways form the post-hack outline? Sarah Clarke, from infospectives.co.uk, shared some of her thoughts on the matter, including the fact that everyone's threat level just went up a bit.

"Despite being almost a decade away from the network coalface, I, without much trouble, and a little help from my friends, could do everything listed. What will stop me is fear of prosecution, ethics, and a strong analytical ability to see short, medium, long-term implications," she said.

If your organisation faced a similar attack, what would common enterprise monitoring tools spot, if configured correctly? What amendments to IDS/IPS, log monitoring, vulnerability scanning, pen test scoping, SIEM alerting, or alert analysis need to be made or augmented?

Andy Settle, head of special investigations for Austin-based Forcepoint, had some additional thoughts, which are below.

"The attack was targeted and had every intention of getting in. This type of threat needs to be addressed by asking 'when?' and not simply 'if?' Once inside the company network, the hacker managed to traverse the company infrastructure with little difficulty," he said.

"Protecting the soft-skinned inner workings of an organizational infrastructure is equally important. Minimizing the services within a company network is just as essential to minimizing those presented to the outside world."

Firewall logs can give advanced warning of these types of attacks. Network mapping, port scanning and enumeration may well be countered by the firewall and Intrusion Prevention Devices (IPS) but to not monitor and assess the data they produce is to lose the Indicators & Warnings (I&Ws) that could indicate that something was likely to happen.

Updates & Patching:
"There should be no surprise that updates and patching are essential. [Phineas Fisher] was able to exploit a known vulnerability within the network management system Nagios. Interestingly, the attacker became aware of the Nagios system only after they "spied" on the sysadmins," Settle explained.

Separation of Networks:
This attack was possible because backup and management networks that should have been segregated were not. Separation of operational and management networks is a useful technique for protecting infrastructure, especially when the management network requires administrative privileges. In this attack, [Phineas Fisher] was able to interrogate and dump the email server backup images.

Watch and Protect the Privileged:
We often say that one of the greatest challenges is monitoring those with privileged accounts. Many organizations, especially government related require security clearances to protect from the insider threat. However, what this incident teaches us that once in, the bad guys make a beeline for the sysadmins to monitor their activities in order to gain greater knowledge and understanding of the company and its infrastructure.

"There is somewhat of a mind-set change here, should we not be monitoring the privileged users and their workstations? Not because we do not trust them, but for their own protection and to ensure they are too are not being watched by network sniffers, key-loggers etc.?" he added.

Egress Monitoring:
"One final observation is that a lot of data was ex-filtrated. Why was this not noticed? This is hardly uncommon in attacks where intellectual property is the target. Implementing a Data Theft or Data Loss Prevention (DTP/DLP) solution and monitoring will lessen the likelihood and potential impact of this type of attack," Settle said.

CSO

« As Pentagon Dawdles, Silicon Valley Sells It’s Hottest Technology Abroad
Ransomware Everywhere: What’s The Technology Behind It? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

Secure India

Secure India

Secure India provides Forensic Solutions that help Government and Business in dealing with prevention and resolution of Cyber related threats.

INCIBE-CERT

INCIBE-CERT

INCIBE-CERT is the reference security incident response center for citizens and private law entities in Spain

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Constella Intelligence

Constella Intelligence

Constella Intelligence provides digital risk protection services to quickly and efficiently disrupt cyber attacks and data breaches before they occur.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

Cybertech Nepal

Cybertech Nepal

Cybertech Nepal is committed to provide high-quality cyber security solutions, including server assessment and hardening, forensics and malware analysis, end-point threat analysis, and VAPT.