home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   ANTI_VIRUS      Anti-Virus Discussion & News      523 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 344 of 523   
   Ben Ritchey to All   
   US-CERT Warning   
   06 Sep 16 21:37:24   
   
   From: "US-CERT"    
   To:    
      
   Subject: TA16-250A: The Increasing Threat to Network Infrastructure Devices   
   and    
   Recommended Mitigations   
      
   Date: Tuesday, September 06, 2016 9:17 PM   
      
   U.S. Department of Homeland Security US-CERT   
      
   National Cyber Awareness System:   
      
       
      
   TA16-250A: The Increasing Threat to Network Infrastructure Devices and    
   Recommended Mitigations [ https://www.us-cert.gov/ncas/alerts/TA16-250A ]    
   09/06/2016 06:29 PM EDT   
   Original release date: September 06, 2016   
      
   Systems Affected   
      
   Network Infrastructure Devices   
       
      
   Overview   
      
   The advancing capabilities of organized hacker groups and cyber adversaries    
   create an increasing global threat to information systems. The rising threat    
   levels place more demands on security personnel and network administrators to    
   protect information systems. Protecting the network infrastructure is critical    
   to preserve the confidentiality, integrity, and availability of communication    
   and services across an enterprise.   
      
   To address threats to network infrastructure devices, this Alert provides    
   information on recent vectors of attack that advanced persistent threat (APT)    
   actors are targeting, along with prevention and mitigation recommendations.   
       
      
   Description   
      
   Network infrastructure consists of interconnected devices designed to   
   transport    
   communications needed for data, applications, services, and multi-media.    
   Routers and firewalls are the focus of this alert; however, many other devices    
   exist in the network, such as switches, load-balancers, intrusion detection    
   systems, etc. Perimeter devices, such as firewalls and intrusion detection    
   systems, have been the traditional technologies used to secure the network,   
   but    
   as threats change, so must security strategies. Organizations can no longer    
   rely on perimeter devices to protect the network from cyber intrusions;    
   organizations must also be able to contain the impact/losses within the    
   internal network and infrastructure.   
      
   For several years now, vulnerable network devices have been the attack-vector    
   of choice and one of the most effective techniques for sophisticated hackers    
   and advanced threat actors. In this environment, there has never been a   
   greater    
   need to improve network infrastructure security. Unlike hosts that receive    
   significant administrative security attention and for which security tools   
   such    
   as anti-malware exist, network devices are often working in the background   
   with    
   little oversight—until network connectivity is broken or diminished. Malicious    
   cyber actors take advantage of this fact and often target network devices.   
   Once    
   on the device, they can remain there undetected for long periods. After an    
   incident, where administrators and security professionals perform forensic    
   analysis and recover control, a malicious cyber actor with persistent access   
   on    
   network devices can reattack the recently cleaned hosts. For this reason,    
   administrators need to ensure proper configuration and control of network    
   devices.   
      
   Proliferation of Threats to Information Systems   
      
   "SYNful Knock"   
      
   In September 2015, an attack known as SYNful Knock was disclosed. SYNful Knock    
   silently changes a router’s operating system image, thus allowing attackers to    
   gain a foothold on a victim’s network. The malware can be customized and    
   updated once embedded. When the modified malicious image is uploaded, it    
   provides a backdoor into the victim’s network. Using a crafted TCP SYN packet,    
   a communication channel is established between the compromised device and the    
   malicious command and control (C2) server. The impact of this infection to a    
   network or device is severe and most likely indicates that there may be    
   additional backdoors or compromised devices on the network. This foothold   
   gives    
   an attacker the ability to maneuver and infect other hosts and access   
   sensitive    
   data.   
      
   The initial infection vector does not leverage a zero-day vulnerability.    
   Attackers either use the default credentials to log into the device or obtain    
   weak credentials from other insecure devices or communications. The implant    
   resides within a modified IOS image and, when loaded, maintains its   
   persistence    
   in the environment, even after a system reboot. Any further modules loaded by    
   the attacker will only exist in the router’s volatile memory and will not be    
   available for use after the device reboots. However, these devices are rarely    
   or never rebooted.   
      
   To prevent the size of the image from changing, the malware overwrites several    
   legitimate IOS functions with its own executable code. The attacker examines    
   the functionality of the router and determines functions that can be    
   overwritten without causing issues on the router. Thus, the overwritten    
   functions will vary upon deployment.   
      
   The attacker can utilize the secret backdoor password in three different    
   authentication scenarios. In these scenarios the implant first checks to see   
   if    
   the user input is the backdoor password. If so, access is granted. Otherwise,    
   the implanted code will forward the credentials for normal verification of    
   potentially valid credentials. This generally raises the least amount of    
   suspicion. Cisco has provided an alert on this attack vector. For more    
   information, see the Cisco SYNful Knock Security Advisory [    
   http://www.cisco.com/c/en/us/about/security-center/event-respons   
   /synful-knock.    
   html ].   
      
   Other attacks against network infrastructure devices have also been reported,    
   including more complicated persistent malware that silently changes the    
   firmware on the device that is used to load the operating system so that the    
   malware can inject code into the running operating system. For more    
   information, please see Cisco's description of the evolution of attacks on    
   Cisco IOS devices [    
   http://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices ].   
      
   "Cisco Adaptive Security Appliance (ASA)"   
      
   A Cisco ASA device is a network device that provides firewall and Virtual    
   Private Network (VPN) functionality. These devices are often deployed at the    
   edge of a network to protect a site’s network infrastructure, and to give    
   remote users access to protected local resources.   
      
   In June 2016, NCCIC received several reports of compromised Cisco ASA devices    
   that were modified in an unauthorized way. The ASA devices directed users to a    
   location where malicious actors tried to socially engineer the users into    
   divulging their credentials.   
      
   It is suspected that malicious actors leveraged CVE-2014-3393  [    
   https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3393 ]to inject    
   malicious code into the affected devices. The malicious actor would then be    
   able to modify the contents of the Random Access Memory Filing System (RAMFS)    
   cache file system and inject the malicious code into the appliance’s    
   configuration. Refer to the Cisco Security Advisory Multiple Vulnerabilities   
   in    
   Cisco ASA Software  [    
   https://tools.cisco.com/security/center/content/CiscoSecurityAdv   
   sory/cisco-sa-    
   20141008-asa ]for more information and for remediation details.   
      
   In August 2016, a group known as “Shadow Brokers” publicly released a large    
   number of files, including exploitation tools for both old and newly exposed    
   vulnerabilities. Cisco ASA devices were found to be vulnerable to the released    
   exploit code. In response, Cisco released an update to address a newly    
   disclosed Cisco ASA Simple Network Management Protocol (SNMP) remote code    
   execution vulnerability (CVE-2016-6366 [    
   https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6366 ]). In   
   addition,    
   one exploit tool targeted a previously patched Cisco vulnerability    
   (CVE-2016-6367 [ https://web.nvd.nist.gov/view/vuln/detail?vulnI   
   =CVE-2016-6367    
   ]). Although Cisco provided patches [    
   http://blogs.cisco.com/security/shadow-brokers ] to fix this Cisco ASA    
   command-line interface (CLI) remote code execution vulnerability in 2011,    
   devices that remain unpatched are still vulnerable to the described attack.    
   Attackers may target vulnerabilities for months or even years after patches    
   become available.   
      
   Impact   
      
   If the network infrastructure is compromised, malicious hackers or adversaries    
   can gain full control of the network infrastructure enabling further   
   compromise    
   of other types of devices and data and allowing traffic to be redirected,    
   changed, or denied. Possibilities of manipulation include denial-of-service,    
   data theft, or unauthorized changes to the data.   
      
   Intruders with infrastructure privilege and access can impede productivity and    
   severely hinder re-establishing network connectivity. Even if other   
   compromised    
   devices are detected, tracking back to a compromised infrastructure device is    
   often difficult.   
      
   Malicious actors with persistent access to network devices can reattack and    
   move laterally after they have been ejected from previously exploited hosts.   
       
      
   Solution   
      
   1.    Segregate Networks and Functions   
      
   Proper network segmentation is a very effective security mechanism to prevent    
   an intruder from propagating exploits or laterally moving around an internal    
   network. On a poorly segmented network, intruders are able to extend their    
   impact to control critical devices or gain access to sensitive data and    
   intellectual property. Security architects must consider the overall    
   infrastructure layout, segmentation, and segregation. Segregation separates    
   network segments based on role and functionality. A securely segregated   
   network    
   can contain malicious occurrences, reducing the impact from intruders, in the    
   event that they have gained a foothold somewhere inside the network.   
      
   "Physical Separation of Sensitive Information"   
      
   Local Area Network (LAN) segments are separated by traditional network devices    
   such as routers. Routers are placed between networks to create boundaries,    
   increase the number of broadcast domains, and effectively filter users’    
   broadcast traffic. These boundaries can be used to contain security breaches   
   by    
   restricting traffic to separate segments and can even shut down segments of   
   the    
   network during an intrusion, restricting adversary access.   
      
   Recommendations:   
      
     * Implement Principles of Least Privilege and need-to-know when designing    
   network segments.   
     * Separate sensitive information and security requirements into network    
   segments.   
     * Apply security recommendations and secure configurations to all network    
   segments and network layers.   
      
   "Virtual Separation of Sensitive Information        "   
      
   As technologies change, new strategies are developed to improve IT   
   efficiencies    
   and network security controls. Virtual separation is the logical isolation of    
   networks on the same physical network. The same physical segmentation design    
   principles apply to virtual segmentation but no additional hardware is    
   required. Existing technologies can be used to prevent an intruder from    
   breaching other internal network segments.   
      
   Recommendations:   
      
     * Use Private Virtual LANs to isolate a user from the rest of the broadcast    
   domains.   
     * Use Virtual Routing and Forwarding (VRF) technology to segment network    
   traffic over multiple routing tables simultaneously on a single router.   
     * Use VPNs to securely extend a host/network by tunneling through public or    
   private networks.   
      
   2.    Limit Unnecessary Lateral Communications   
      
   Allowing unfiltered workstation-to-workstation communications (as well as   
   other    
   peer-to-peer communications) creates serious vulnerabilities, and can allow a    
   network intruder to easily spread to multiple systems. An intruder can    
   establish an effective “beach head” within the network, and then spread to    
   create backdoors into the network to maintain persistence and make it   
   difficult    
   for defenders to contain and eradicate.   
      
   Recommendations:   
      
     * Restrict communications using host-based firewall rules to deny the flow   
   of    
   packets from other hosts in the network. The firewall rules can be created to    
   filter on a host device, user, program, or IP address to limit access from    
   services and systems.   
     * Implement a VLAN Access Control List (VACL), a filter that controls access    
   to/from VLANs. VACL filters should be created to deny packets the ability to    
   flow to other VLANs.   
     * Logically segregate the network using physical or virtual separation    
   allowing network administrators to isolate critical devices onto network    
   segments.   
       
      
   3.    Harden Network Devices   
      
   A fundamental way to enhance network infrastructure security is to safeguard    
   networking devices with secure configurations. Government agencies,    
   organizations, and vendors supply a wide range of resources to administrators    
   on how to harden network devices. These resources include benchmarks and best    
   practices. These recommendations should be implemented in conjunction with    
   laws, regulations, site security policies, standards, and industry best    
   practices. These guides provide a baseline security configuration for the    
   enterprise that protects the integrity of network infrastructure devices. This    
   guidance supplements the network security best practices supplied by vendors.   
      
   Recommendations:   
      
     * Disable unencrypted remote admin protocols used to manage network    
   infrastructure (e.g., Telnet, FTP).   
     * Disable unnecessary services (e.g. discovery protocols, source routing,    
   HTTP, SNMP, BOOTP).   
     * Use SNMPv3 (or subsequent version) but do not use SNMP community strings.   
     * Secure access to the console, auxiliary, and VTY lines.   
     * Implement robust password policies and use the strongest password    
   encryption available.   
     * Protect router/switch by controlling access lists for remote    
   administration.   
     * Restrict physical access to routers/switches.   
     * Backup configurations and store offline. Use the latest version of the    
   network device operating system and update with all patches.   
     * Periodically test security configurations against security requirements.   
     * Protect configuration files with encryption and/or access controls when    
   sending them electronically and when they are stored and backed up.   
       
      
   4.    Secure Access to Infrastructure Devices   
      
   Administrative privileges on infrastructure devices allow access to resources    
   that are normally unavailable to most users and permit the execution of   
   actions    
   that would otherwise be restricted. When administrator privileges are    
   improperly authorized, granted widely, and/or not closely audited, intruders    
   can exploit them. These compromised privileges can enable adversaries to    
   traverse a network, expanding access and potentially allowing full control of    
   the infrastructure backbone. Unauthorized infrastructure access can be    
   mitigated by properly implementing secure access policies and procedures.   
      
   Recommendations:   
      
     * Implement Multi-Factor Authentication – Authentication is a process to    
   validate a user’s identity. Weak authentication processes are commonly    
   exploited by attackers. Multi-factor authentication uses at least two identity    
   components to authenticate a user’s identity. Identity components include    
   something the user knows (e.g., password); an object the user has possession   
   of    
   (e.g., token); and a trait unique to the specific person (e.g., biometric).   
     * Manage Privileged Access – Use an authorization server to store access    
   information for network device management. This type of server will enable    
   network administrators to assign different privilege levels to users based on    
   the principle of least privilege. When a user tries to execute an unauthorized    
   command, it will be rejected. To increase the strength and robustness of user    
   authentication, implement a hard token authentication server in addition to   
   the    
   AAA server, if possible. Multi-factor authentication increases the difficulty    
   for intruders to steal and reuse credentials to gain access to network   
   devices.    
      
     * Manage Administrative Credentials – Although multi-factor authentication   
   is    
   highly recommended and a best practice, systems that cannot meet this    
   requirement can at least improve their security level by changing default    
   passwords and enforcing complex password policies. Network accounts must    
   contain complex passwords of at least 14 characters from multiple character    
   domains including lowercase, uppercase, numbers, and special characters.    
   Enforce password expiration and reuse policies. If passwords are stored for    
   emergency access, keep these in a protected off-network location, such as a    
   safe.   
       
      
   5.    Perform Out-of-Band Management   
      
   Out-of-Band (OoB) management uses alternate communication paths to remotely    
   manage network infrastructure devices. These dedicated paths can vary in    
   configuration to include anything from virtual tunneling to physical    
   separation. Using OoB access to manage the network infrastructure will    
   strengthen security by limiting access and separating user traffic from   
   network    
   management traffic. OoB management provides security monitoring and can    
   implement corrective actions without allowing the adversary who may have    
   already compromised a portion of the network to observe these changes.   
      
   OoB management can be implemented physically or virtually, or through a hybrid    
   of the two. Building additional physical network infrastructure is the most    
   secure option for the network managers, although it can be very expensive to    
   implement and maintain. Virtual implementation is less costly, but still    
   requires significant configuration changes and administration. In some    
   situations, such as access to remote locations, virtual encrypted tunnels may    
   be the only viable option.   
      
   Recommendations:   
      
     * Segregate standard network traffic from management traffic.   
     * Enforce that management traffic on devices only comes from the OoB.   
     * Apply encryption to all management channels.   
     * Encrypt all remote access to infrastructure devices such as terminal or    
   dial-in servers.   
     * Manage all administrative functions from a dedicated host (fully patched)    
   over a secure channel, preferably on the OoB.   
     * Harden network management devices by testing patches, turning off    
   unnecessary services on routers and switches, and enforcing strong password    
   policies. Monitor the network and review logs Implement access controls that    
   only permit required administrative or management services (SNMP, NTP SSH,   
   FTP,    
   TFTP).   
       
      
   6.    Validate Integrity of Hardware and Software   
      
   Products purchased through unauthorized channels are often known as    
   “counterfeit,” “secondary,” or “grey market” devices. There have been numerous    
   reports in the press regarding grey market hardware and software being    
   introduced into the marketplace. Grey market products have not been thoroughly    
   tested to meet quality standards and can introduce risks to the network. Lack    
   of awareness or validation of the legitimacy of hardware and software presents    
   a serious risk to users’ information and the overall integrity of the network    
   environment. Products purchased from the secondary market run the risk of    
   having the supply chain breached, which can result in the introduction of    
   counterfeit, stolen, or second-hand devices. This could affect network    
   performance and compromise the confidentiality, integrity, or availability of    
   network assets. Furthermore, breaches in the supply chain provide an    
   opportunity for malicious software or hardware to be installed on the    
   equipment. In addition, unauthorized or malicious software can be loaded onto   
   a    
   device after it is in operational use, so integrity checking of software   
   should    
   be done on a regular basis.   
      
   Recommendations:   
      
     * Maintain strict control of the supply chain; purchase only from authorized    
   resellers.   
     * Require resellers to implement a supply chain integrity check to validate    
   hardware and software authenticity.   
     * Inspect the device for signs of tampering.   
     * Validate serial numbers from multiple sources.   
     * Download software, updates, patches, and upgrades from validated sources.   
     * Perform hash verification and compare values against the vendor’s database    
   to detect unauthorized modification to the firmware.   
     * Monitor and log devices, verifying network configurations of devices on a    
   regular schedule.   
     * Train network owners, administrators, and procurement personnel to   
   increase    
   awareness of grey market devices.   
      
       
      
   *Shadow Broker Exploits* *Vendor* *CVE* *Exploit Name* *Vulnerability*   
   Fortinet    
   CVE-2016-6909 [ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6909    
   ]    EGREGIOUSBLUNDER Authentication cookie overflow WatchGuard       
   CVE-2016-7089 [ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7089    
   ] ESCALATEPLOWMAN Command line injection via ipconfig Cisco CVE-2016-6366 [    
   https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6366 ] EXTRABACON    
   SNMP remote code execution Cisco CVE-2016-6367 [    
   https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6367 ] EPICBANANA    
   Command line injection remote code execution Cisco N/A    
   BENIGNCERTAIN/PIXPOCKET    Information/memory leak TOPSEC N/A ELIGIBLEBACHELOR    
   Attack vector unknown, but has an XML-like payload   
   beginning with 

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca