CISA broke into a US federal agency, and no one noticed for a full 5 months
CISA's red team exercise at a US federal agency exposed critical security flaws, including an unpatched vulnerability in Oracle Solaris. Delays in patching allowed a breach, emphasizing the need for improved security measures.
Read original articleCISA conducted a red team exercise at an unnamed US federal agency, exposing critical security flaws that went undetected for five months. The exercise revealed initial access through an unpatched vulnerability in the agency's Oracle Solaris enclave, leading to a full compromise. Despite notifying the agency of the issue, it took over two weeks to apply the patch, allowing an unknown third party to exploit the vulnerability. The exercise highlighted weaknesses in patching deadlines and password security, ultimately resulting in a full domain compromise with access to highly privileged systems. The agency's reliance on known indicators of compromise and ineffective log collection were also noted. CISA emphasized the importance of defense-in-depth principles, network segmentation, and reducing reliance on known IOCs. The exercise underscored the need for agencies to enhance their security measures and address vulnerabilities promptly to prevent similar incidents.
Related
CVE-2021-4440: A Linux CNA Case Study
The Linux CNA mishandled CVE-2021-4440 in the 5.10 LTS kernel, causing information leakage and KASLR defeats. The issue affected Debian Bullseye and SUSE's 5.3.18 kernel, resolved in version 5.10.218.
Remote Unauthenticated Code Execution in OpenSSH Server
Qualys found regreSSHion, a critical RCE flaw in OpenSSH on glibc-based Linux systems. Over 14 million servers are at risk, with potential root access. Qualys created an exploit but delays release for patching.
Cyber Safety Board Never Probed Causes of SolarWinds Breach
The Cyber Safety Review Board, formed post-SolarWinds breach, sidestepped investigating the incident, focusing on a separate attack. Critics question its effectiveness and independence, urging thorough SolarWinds scrutiny for systemic security improvements.
CISA join ASD to release advisory on PRC State-Sponsored Group, APT 40
CISA and ASD's ACSC warn about APT 40, a Chinese state-sponsored cyber group targeting organizations globally. Urging vigilance, they advise reviewing the advisory to prevent intrusions and enhance software security.
The President Ordered Board to Probe Massive Russian Cyberattack. It Never Did
The Cyber Safety Review Board, formed post-SolarWinds breach, faced criticism for not probing the attack's root cause. It prioritized a different incident and lacked independence, drawing concerns about accountability.
Your typical hands-on-keyboard blue team engineer in federal government is a GS-12 getting paid around $68,000 per year (or $99k in very high cost of living areas like DC). They have expensive health benefits, 13 days of PTO a year, put a huge chunk of their paycheck (almost 5%) into a mandatory pension plan that consistently underperforms the market, and can literally go to jail for making mistakes at work depending on the statutory context they work in.
The best people in these jobs burn out fast and quit or they end up having to abandon IC work for GS-14/15 jobs (max pay is around $190 for those) in order to keep up with cost-of-living and justify their careers.
As a result, you have almost zero genuinely capable principal/senior engineers in government who have the authority to architect complex IT systems for security. Instead you get contractors who charge the taxpayers enormous overhead costs and cut corners wherever possible.
If there's one letter to write your congress person to improve government - my vote would be for civil service reform to attract and retain actual top tech talent. They've done it for doctors and lawyers (both of whom can get paid well above the $190k GS pay ceiling), but engineering is still not treated as a comparably skilled professional trade.
But how to fix ? Most US Gov agencies are underfunded, it is either beef up security or provide services. Really a tough choice, and the outlook looks like they may lose even more funding.
I remember one time Satya said the red teams reported to him which Microsoft services they were currently in. He would then ask the heads of those services if they had detected any breaches. Sometimes there would be services that had been breached for years, undetected. Must have been hard for Satya to keep a straight face.
One phrase that struck with me from their security training: "Assume Breach".
He is so incompetent that I initially thought that we have communication problems (I am French). But no - he simply has absolutely no idea about cybersecurity and the teams he "oversees" from that perspective are losing their minds.
I had no idea that you could work for years in such sensitive US environments and have completely no knowledge.
He is good at saying generalities, though, with complicated words.
It's hard to establish constructive dialogue after that, allot of bad feelings and burnt bridges - and sometimes HR. It's tough because there's generally allot of dynamics at play, but I'm sure the impact of this testing was felt by people within the targeted org.
Did the author mistype Password-Spraying or is there a seperate type of attack known as Password-Praying? Googling doesn't reveal any other hits on this term.
There are many federal agencies. One of them will fuck up.
Same with private companies.
If you have 100 people doing the same thing, at least one of them is going to fuck it up.
Related
CVE-2021-4440: A Linux CNA Case Study
The Linux CNA mishandled CVE-2021-4440 in the 5.10 LTS kernel, causing information leakage and KASLR defeats. The issue affected Debian Bullseye and SUSE's 5.3.18 kernel, resolved in version 5.10.218.
Remote Unauthenticated Code Execution in OpenSSH Server
Qualys found regreSSHion, a critical RCE flaw in OpenSSH on glibc-based Linux systems. Over 14 million servers are at risk, with potential root access. Qualys created an exploit but delays release for patching.
Cyber Safety Board Never Probed Causes of SolarWinds Breach
The Cyber Safety Review Board, formed post-SolarWinds breach, sidestepped investigating the incident, focusing on a separate attack. Critics question its effectiveness and independence, urging thorough SolarWinds scrutiny for systemic security improvements.
CISA join ASD to release advisory on PRC State-Sponsored Group, APT 40
CISA and ASD's ACSC warn about APT 40, a Chinese state-sponsored cyber group targeting organizations globally. Urging vigilance, they advise reviewing the advisory to prevent intrusions and enhance software security.
The President Ordered Board to Probe Massive Russian Cyberattack. It Never Did
The Cyber Safety Review Board, formed post-SolarWinds breach, faced criticism for not probing the attack's root cause. It prioritized a different incident and lacked independence, drawing concerns about accountability.