Thursday, December 29, 2011
Anonymous Analysis
"When threatened ... powerful, uninformed people make powerfully uninformed decisions"
Saturday, December 24, 2011
A day of rest
This past year was an exciting ride, and is going to get crazier in 2012. Having said all that I need a break, even if it is just a day. It is the day before Christmas. I have tremendous respect for faith. Mine may not take the form of the traditional usual suspects, but provided your faith isn't being forced upon others, I have the utmost respect and will abide by that rule myself. So I will relax in front of a roaring fire in the fireplace with my family and appreciate not only them but my personal and workplace friends, industry associates from whom a learn from on a daily basis, the hacking community who, as ironic as it sounds, makes great, if sometimes unintentional steps in securing our assets further, and all of the actors in the previous paragraph for making life as exciting as they humanly can.
Just don't forget about that human part. Cheers to all.
Friday, November 4, 2011
Infosec Summit Talk
- Espionage is rampant, both nation state and industrial
- China has been given the source code to virtually all of the Windows Operating Systems and associated applications, is actively looking for new, previously unknown vulnerabilities and has not yet contributed one CVE
- Advanced Persistent Threat (APT) is poorly named - the only difference between these newer attacks and any prior is patience, and I wouldn't call that advanced, even though we as a culture have forgotten what patience is (instant gratification through SMS, twitter, facebook, blah)
- Our adversaries are looking to steal our economic competetive advantages above and beyond intellectual property and trade secrets - business models, sales playbooks, project management methodologies and research papers in an effort to close the gap
- The gap is actually our innovation, and our innovation is being silently and patiently stolen
- That innovation theft directly impacts our national economy(ies)
- Low probability/high impact, which is cost prohibitive to protect against, has become fairly common/high impact
- Focus your security dollars on controls closest to your user, closest to the human
- The Human - Security Awareness (REAL security awareness programs, not your SOX compliance checkbox program)
- Next closest to the human - Identity Control Systems
- Systems that can, based on your authentication credentials, dynamically create access control lists throughout the network and enforce policy based on what you should be allowed to access
- And next closest - Host Based Application Whitelisting
- Only allowing the execution of known good applications, thereby mitigating most malware techniques
Your success and/or failure at reducing business impact within your own organization directly affects our nation's economy (no pressure).
Good Night, and Good Luck.
Tuesday, October 25, 2011
Updating Security Strategies
Today, IMHO, it is imperative to secure your business assets as close to the human as possible. And that starts with REAL security awareness programs, not your SOX checkbox "program". I was walking around the campus of my University alma mater this past weekend and was delighted to see and recognize posters from Lance Spitzner's Securing the Human awareness training hanging everywhere. If a private University can proactively invest in a training program to enhance the security awareness of its students, you without blinking should be doing the same for your employees who have business use case access to your intellectual property, methodologies and innovations.
The next closest area away from your employee's brains is identity systems. Systems can now go well beyond the standard authentication/authorization controls. Active, real time inventories of every device connected to your network and profiles of what those devices actually are, device-based authorization (you are allowed access to sensitive areas on your corporate laptop but not on your personal smartphone/pad, etc.), authenticated user policy enforcement through posture assessments and identity tagging at the IP packet layer. How sexy is that?
And finally comes the host-based controls. My preference is application whitelisting, which can be a challenge depending on the sophistication of your data classification and approved applications programs (if they even exist). But assuming that people are going to click links and trust bad people, preventing malicious code from executing on your systems is a no-brainer. If you're not on the list, you can't come in.
Awareness, Identity and Whitelising are the three most critical controls to invest your security dollars into today. Mitigate the urge to click things, understand and control what is connected to your network, who is on those devices, enforce conformity to your standards, prevent unauthorized access to sensitive data and only allow business approved applications to run on your endpoints. Simple.
Friday, October 14, 2011
Post DerbyCon
- HD Moore
- Johnny Long (Hackers for Charity)
- Mitnick/Kennedy
- Nickerson
- Joe Schorr
- Carlos Perez
- Boris Sverdlik (Your Perimeter Sucks)
- Chris Roberts (terrifying)
- Jayson Street
Replacing FUD
And you can't beat the acronym.
Wednesday, September 28, 2011
DHS says that's not a bug, that's a feature re: ICS
Given that other vulnerability management systems such as the CVE DB, Secunia and the like all create vulnerability announcements on design flaws such as clear text transmission, why should the DHS act any differently? Perhaps there are so many inherent design flaws in business critical ICSs that they are worried the resulting alerts would scare the kittens out of people in the light of the enhanced press coverage of so many high profile intrusions within the last 8 months.
Or ICS vendor lobbyists. Could go either way.
Wednesday, September 21, 2011
Richard Clarke joins Bit9 board
"To the loved ones of the victims of 9/11, to them who are here in this room, to those who are watching on television, your government failed you. Those entrusted with protecting you failed you. And I failed you. We tried hard, but that doesn't matter because we failed. And for that failure, I would ask, once all the facts are out, for your understanding and for your forgiveness."
Post Iraq II invasion, Richard Clarke became (probably in frustration combined with intel and foresight) the "Cyber-Security Czar", focused on the cyber threat to the American government, military and industry/commerce sectors. His book "Against All Enemies" (2004) is his momoir/account of the events leadings up to 9/11. His book "CyberWar" (2010) is a fairly accurate look at many of the internet-based threats to the U.S. as well as the world as a whole, although some statements contained in the book are disputed within the security industry.
It was announced today that Richard Clarke has joined the board of Bit9. Those who know me know that I have, since the demise of the Cisco Security Agent (CSA), been singing the praises of Bit9's application whitelisting solution Parity, after months of solution research for a true endpoint security solution. I will be very interested to see what impact Mr. Clarke has, if any, on the company and its business goals and direction. Regardless, I am of the opinion that his backing of this organization isn't just fluff and showbiz. The technology is sound and his experience in thirty years of intel, counter-terrorism and cyber-security gets that.
Personally, I hope my optimism isn't disappointed.
Wednesday, September 7, 2011
DNS and SSL attacks - further evidence that the internet should not be used for critical applications
- The lack of network segmentation
- Unpatched applications
- SQL Injection
- Poor password management
- Out of date Anti-Virus
Oh, and a bunch of monkeys in charge of internet critical systems asleep at the wheel (well, tire ring, anyways).
Security is most effective when the data owners understand the concept of accountability, so when there are no regulations/standards to enforce organizations who provide security critical systems such as Certificate Authorities and DNS services what do we expect? These are systems we inherently trust (another issues of the "human element") yet they are dropping like flies due to the same issues we "experts" have been screaming about for at least the past decade.
Either regulate with accountability the security critical services on the internet or stop using the internet for critical applications. It's that simple. You know, aside from the whole unregulatable aspect of the internet we all know and love. Which ergo means stop using the internet for critical applications.
<kudos to Brian Honan for succinctly summarizing some of this in a recent SANS post>
Friday, August 26, 2011
Krypt3ia - From China, With Love ... Thank you
Go F-Secure - Researcher finds the RSA email in VirusTotal haystack
- Data loss needs to be publicized much further so the general public (and press) has a better understanding of the scale of what is going on in the cybercriminal and nation-state espionage worlds
- REAL Security Awareness programs. Lance Spitzner's work on Securing the Human is excellent and take his SANS course, it's great.
- Application Whitelisting. If you are only allowing business approved applications to run on your hosts, you have thwarted the ability to run malicious code.
- Identity based profiling, authorization and access controls. Identity at the packet layer and the ability to tie that back to an authorization directory and create dynamic rules on the fly of what that packet (person) can access. You now have an inventory of everything that is authorized to connect to your network, where they are and what they can do. That almost sounds too good to be true, and, yes, I'm specifcally refering to Cisco's ISE. Just wait until they add NAC posturing to it.
- Information classification programs and policies. KNOW what you are protecting and its business criticality.
- Peer groups. Executive periodic peer group discussions to review trends, methods, controls and metrics.
Wednesday, August 24, 2011
China's PLA video - accidental or a strategic showing of their hand?
Thursday, August 11, 2011
EMV coming to America
The U.S. has largely ignored implementing these better controls because of the costs to every company that swipes cards to replace their existing Point of Sale equipment with new gear that supports the EMV cards. So as an incentive to retailers, Visa will waive much of the costs of PCI-DSS compliance validation if companies have at least 3/4ths of their POS systems EMV capable. It seems entirely feasible that if EMV cards provide end to end encryption from card to processor, PCI-DSS scope may drastically change with most businesses like gas stations, convenient stores and restaurants that never store card data now not having to even think about whether or not their systems and networks are secure enough to meet today's PCI-DSS requirements, and therefore expensive remediation controls. Keep an eye on this one.
Wednesday, August 3, 2011
Shady RAT and national economies
Here is my 2 cents. The game has changed. There is something about your organization that sets you apart from your own competition, makes you stand out among the crowd. Whether it is your sales processes, your business model, your innovative ideas or your project management frameworks. Let alone your legal documents and email archives. All of these are being targeted in an effort to gain international competitive advantage and results in the further lack of economic growth in the countries they have been exfiltrated from. In the U.S., as well as most other nations, national economic security is reliant on the security of every organization and company that contributes to it. And every organization and company that contributes to it is responsible for securing their own business critical assets. I've posted my own views on this before. Security is subjective and there are no effective standards that everyone must conform to regarding the protection of their own methodologies, secrets and intellectual property. There may never be such standards, which means a heightened awareness must be developed and cultured. Peer groups encouraged to discuss methods, controls and metrics. Data loss needs to be publicized so the general public begins to realize the scope of what is happening. And for the love of whatever you may find holy, people, stop allowing weak passwords. I've been in this industry almost 20 years now and weak passwords and policies are STILL one of the top mechanisms of compromising systems. If we can't improve on that one in 20 years how can we have faith that all the companies that today support our nation's economy are able to defend themselves against the latest zero-day vulnerability that was spear-phished to a member of their executive council?
Monday, July 25, 2011
Wednesday, July 20, 2011
Shackleford and InfoSec IDGAF
Oh, who am I kidding? IDGAF.
Tuesday, May 31, 2011
InsecurID? RSA/Lockheed - Another example of media jumping on blog speculation
Note my use of the phase "may or may not be". That might be reported tomorrow by Reuters as true.
Monday, May 23, 2011
Facebook introduces 1-1/2 factor authentication
Tuesday, April 12, 2011
Real world costs of APT to American Taxpayers
Friday, April 1, 2011
DLP vendors and the top three threat vectors (OUTSOURCE!)
Thursday, March 31, 2011
The best APT definition yet
"Much of the speculation about the attacks on RSA so far has invoked the term "advanced persistent threat", or APT, which is security industry shorthand for "We're pretty sure it came from China.""
You can read the whole article here.
Wednesday, March 23, 2011
Stolen RSA SecurID data. That's data, as in Data Loss Prevention
Friday, February 4, 2011
The death of HIDS and HIPS vs. the smartest men in the network syndrome: Part Two
I ended part one with a number of questions around Cisco, the death of CSA and what is the general direction of security. It would be fair to next focus on the many possible reasons CSA was canned. For starters, it was a bitch. It took myself many years knee deep in CSA to eventually develop a solid, repeatable and efficient deployment methodology. Virtually every installation had massive administrative overhead on the front end, primarily due to the very high level of application behavior tuning, and typically a constant low to mid level administrative overhead to monitor, maintain and improve. It was an amazingly complex application itself, which, when implemented properly, worked like a champ. Implementing it properly, however, ended up being a huge challenge for both Cisco VARs and clients alike. And this challenge left many a Cisco customer with a fierce dislike of the product.
Some of the reasons there was such a large knowledge gap with both vendors and clients are pretty obvious in hindsight, and not at all limited to Cisco as an organization. The product was from an acquisition and most Cisco Account Managers I encountered really did not know the extent of its capabilities and therefore how to sell it effectively. Cisco is a hardware company and the software sale wasn't at the time the norm, especially security software. The result was a number of companies hearing lofty sales pitches about the product, purchasing it and trying to implement it themselves with no real concept of how complex the application actually was and never getting past any initial test or audit-mode pilots. On the VAR side, a similar lack of experience with the product was the typical cause of project failure. Like any policy based application, you need to have the policies and standards in place before you can effectively and tactically enforce said policies. At least in a perfect world. In the real world, what percentage of all companies actually have well defined policies for such areas as data classification, role/responsibility/access or even application white and blacklists?
The resulting mayhem no doubt resulted in negative reviews, comments and opinions around the product which most likely directly lead to poor numbers - one of the reasons Cisco supposedly killed the product. But there were also a smaller population of clients and VARs who completely understood and loved the product and its capabilities in all of its complexity. It died nonetheless, and there was nothing on the market to replace all of the functionality CSA provided on an apples to apples basis, leaving many dedicated CSA customers left with a daunting task of finding a number of individual tools to replace all that CSA provided them.
Another probable reason Cisco dumped CSA was the increasing cost to develop a host client on an ever increasing number of platforms, especially now as the the tablets, pads and phones have become the next generation of corporate data access. Cisco was having trouble keeping up with and supporting Windows releases, let alone getting to the "supported" linux and solaris versions. Mac? Not a chance. Then the onslaught of mobile devices ensued with iphones, blackberries, ipads, androids, etc., and the future indeed was dim for CSA support on all of these disparate systems. But the collective brain trust at Cisco felt they were prepared for this with a very strong, industry supported strategy - the cloud.
Why concentrate on protecting all of the various endpoint operating systems when you can, as the 800 pound network gorilla, move everyone into the cloud. It is the industry direction at this point in time. And once everyone is in the cloud, a large percentage of the malicious activities that HIPS is supposed to prevent can be addressed in transit before it gets to the endpoint. Cisco's Ironport reputation technology and Sensorbase is perfect for that scenario and in fact does a spectacular job. And it should come as no surprise that after Cisco's acquisition of Ironport that Ironport founder and CEO Scott Weiss became VP of Cisco's Security Technology business unit, and the writing was on the wall for CSA.
So the theory was that CSA was being replaced with the Ironport technology for both cloud and in transit intrusion prevention. And that indeed was the message occasionally coming out of Cisco when pressed. Which is an absolutely sound solution if everything is already in the cloud. Which clearly isn't the case. In fact, for all intents and purposes we are several years away from that suspected reality, which again means CSA die hards have a tough road ahead of them. And when pressed further about this now major hole in host based protection, clients were told that they could migrate to Trend AV. Really? Static AV signature protection and the inherent flaws of those systems were some of the primary reasons people wanted CSA in the first place.
Here is where I feel Cisco really sucker punched a dedicated clientbase with the following executive decisions, hence earning the title "Smartest Men in the Network":
- Zero client communication on why CSA had been killed
- Very little client communication on preparing for the death of CSA
- No viable replacement path (Trend AV - whatever)
- Not selling the technology to someone else (yeah, right)
- Trying to convince people that the Ironport technology could replace CSA's functionality in transit
- User/group access controls for file, registry and network resources
- System state controls to determine and enforce policy (e.g. I am not connected to my corporate wireless SSID, I better enforce VPN connectivity back to my firewall)
- Removable media controls to prevent data leakage and theft
- "Long Tail" threat protection (I've posted on this before, read ReL1K's article here.