{"id":642,"date":"2017-10-27T14:01:09","date_gmt":"2017-10-27T14:01:09","guid":{"rendered":"https:\/\/securitycurve.com\/?p=642"},"modified":"2017-10-27T14:01:09","modified_gmt":"2017-10-27T14:01:09","slug":"undermining-security-efforts-by-example","status":"publish","type":"post","link":"https:\/\/securitycurve.com\/?p=642","title":{"rendered":"Undermining security efforts (by example)"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignright size-large lazyload\" data-src=\"https:\/\/i.giphy.com\/media\/8r9fN7KGsvFAs\/giphy.webp\" width=\"500\" height=\"690\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 500px; --smush-placeholder-aspect-ratio: 500\/690;\" \/>So FYI that the picture doesn&#8217;t have anything to do with this post.\u00a0 It&#8217;s just getting close to Halloween, so figured I&#8217;d roll with that.\u00a0 There are quite a few things in the news today -and a few stories I wanted to comment on.\u00a0 I was planning on doing a &#8220;flyover&#8221; but then I started noticing a theme and decided to comment on that instead.\u00a0 I&#8217;ll go through the items and let&#8217;s see if you can tell where I&#8217;m going with these as we go through.<\/p>\n<p>First up, the story about the mysteriously-deleted Georgia election server.\u00a0 There&#8217;s a <a href=\"https:\/\/arstechnica.com\/tech-policy\/2017\/10\/days-after-activists-sued-georgias-election-server-was-wiped-clean\/\">pretty good writeup from Ars Technica yesterday<\/a> but the situation might be summarized as:<\/p>\n<ul>\n<li>Voting system server in Georgia has <a href=\"https:\/\/arstechnica.com\/tech-policy\/2017\/06\/georgias-voting-system-is-uniquely-vulnerable-to-election-tampering-hackers\/\">pretty severe security problems<\/a><\/li>\n<li>Lawsuit was filed asking the system to be decommissioned and the results annulled<\/li>\n<li>Four days later, the data was scrubbed from the server<\/li>\n<li>Lawsuit moves to federal court; that same day the backups were degaussed (three times)<\/li>\n<li>Apparently, at some point along the chain, a litigation hold notice was provided per an update from Ars<\/li>\n<\/ul>\n<p>Seems pretty shady right?\u00a0 Like, destroying the data just days after the lawsuit was filed?\u00a0 And then the same day as it escalates, they decide to degauss the backups multiple times?\u00a0 I heard that and, truthfully, I was like &#8220;holy crap, that&#8217;s some Amerikans-level spy shit right there.&#8221;\u00a0 But then I went on to read through the large chunks of the<a href=\"https:\/\/www.documentcloud.org\/documents\/4117644-OCT-FOIA-Clean-Copy-Page-Numbered-2.html#document\/p43\/a384897\"> email thread that came through from a FOIA request<\/a>.\u00a0 It takes a while to read &#8211; but I found some interesting takeaways.<\/p>\n<p>First, I went in thinking something had to be super dirty..\u00a0 Now I&#8217;m not so sure.\u00a0 From the read through, the folks at KSU strike me as a fairly diligent security team.\u00a0 You can get a pretty firm handle on their incident response process, including\u00a0measures they took in response to the initial notification, their correspondence with law enforcement (who seemed less on the ball frankly), and their pretty thorough after-incident reports&#8230;\u00a0 You can get a good flavor for how that (fairly small) team runs just from these emails.\u00a0 \u00a0Likewise, you can see them proactively reaching out to internal counsel about how long to retain records &#8211; before deleting them &#8211; to which they did not get (IMHO) a very germane or applicable reply.\u00a0\u00a0Are they the best security team ever?\u00a0 Well, they&#8217;re small&#8230; and have a lot on their plate.\u00a0 But I&#8217;ve certainly seen much worse.<\/p>\n<p>The second story is about the IOActive report about SATCOM.\u00a0 IOActive <a href=\"http:\/\/blog.ioactive.com\/2017\/10\/amosconnect-maritime-communications.html\">put out a report<\/a> about issues with this system (fairly standard) and in response the <a href=\"https:\/\/threatpost.com\/two-critical-vulnerabilities-found-in-inmarsats-satcom-systems\/128632\/\">vendor issued a patch<\/a>.\u00a0 Nothing to see here, right?\u00a0 Wouldn&#8217;t be&#8230; Except now the <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/inmarsat-disputes-ioactive-reports-of-critical-flaws-in-ship-satcom\/d\/d-id\/1330242\">vendor is pushing back<\/a> saying the research is overblown.\u00a0 The research itself is pretty straightforward: SQLi in the login form and a built-in backdoor account.\u00a0 It happens.\u00a0 Likewise, the report acknowledges that the normative situation would be that these are not &#8220;worst case scenario&#8221; in most production deployments because of network segmentation in use for a field deployment.\u00a0 In fact, the report says directly, <em>&#8220;Vessel networks are typically segmented and isolated from each other, in part for security reasons&#8230;\u00a0While the vulnerabilities discussed in this blog post may only be exploited by an attacker with access to the IT systems network, it\u2019s important to note that within certain vessel configurations some networks might not be segmented, or AmosConnect might be exposed to one or more of these networks.&#8221;\u00a0<\/em><\/p>\n<p>The position of the vendor seems to be: 1) this product is old, so while it is still in deployment, it&#8217;s scheduled for termination.\u00a0 2) It&#8217;s hard to exploit. 3) There are compensating controls.\u00a0 OK.\u00a0 I&#8217;m all about that.\u00a0 But don&#8217;t these same arguments apply in equal measure to something like, for example, SMBv1?\u00a0 Here&#8217;s the deal: I&#8217;ve commented on this before, but if you&#8217;re a product vendor, <a href=\"https:\/\/securitycurve.com\/how-i-learned-to-stop-worrying-and-love-the-vuln\/\">never ever dispute the researcher<\/a>.\u00a0 \u00a0The PR is terrible.\u00a0 Even if you think the research is completely bogus, don&#8217;t fight it.\u00a0 What is particularly upsetting about this one is that the company did the right thing initially: they patched their legacy, soon to be commissioned, likely not that vulnerable product. They already did the right thing.\u00a0 Now, they have undermined those efforts, lost any good PR value, and are going down the &#8220;theoretical vulnerability&#8221; route (they do, in fact, use that parlance.)\u00a0 Oldsters out there will remember the L0pht&#8217;s tagline &#8220;making the theoretical practical&#8230;&#8221;\u00a0 Do you remember why they said that?\u00a0 I do &#8211; and, <a href=\"https:\/\/blog.osvdb.org\/2017\/08\/13\/that-vulnerability-is-theoretical\/\">if you read this<\/a>, you&#8217;ll know too.\u00a0 The moral of the story is that saying it&#8217;s &#8220;theoretical&#8221; is bait &#8211; and most security pros will remember the truly epic &#8220;told you so&#8221; that happened in that case.<\/p>\n<p>In both of these cases, decent security efforts were undermined by something else going on somewhere else.\u00a0 In the case of the election server, the response team took what appear to be reasonable measures.\u00a0 Now though, the optics are legit terrible &#8212; for reasons that I suspect we&#8217;ll find out is no fault of theirs.\u00a0 Likewise, the SATCOM vendor (Inmarset) did the right thing in response to a (probably hard to exploit in a normative case) vulnerability.\u00a0 Now their workmanlike (and responsible) efforts to address the issue have been undermined &#8212; for example, the reason I even know about the story in the first place is they are already taking the bad PR hit in the press.\u00a0 \u00a0The lesson I guess is that it behooves the organization as a whole to make sure security is addressed holistically.\u00a0 Making one specific team accountable is fine (and a good idea), but that doesn&#8217;t mean the rest of the organization can just &#8220;do whatevs&#8221; and expect the outcome to be a hardened enterprise.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So FYI that the picture doesn&#8217;t have anything to do with this post.\u00a0 It&#8217;s just getting close to Halloween, so figured I&#8217;d roll with that.\u00a0 There are quite a few things in the news today -and a few stories I wanted to comment on.\u00a0 I was planning on doing a &#8220;flyover&#8221; but then I started [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-642","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=642"}],"version-history":[{"count":0,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/642\/revisions"}],"wp:attachment":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}