More than a byte

More than a Byte

How hackers get privileged access to IT systems

More than a byteCybercrime is on the rise, and sensitive, corporate information is one of the top targets of external and internal attacks. Most organizations are prepared to protect their data with firewalls, IPS, IDS, DLP, IAM, SIEM and other systems, but they are not prepared for advanced, persistent threats.

It is no coincidence that several compliance regulations, such as PCI-DSS, specify rules for monitoring the activities of employees, especially those having privileged rights. The most costly and dangerous cyber- attacks are made by using privileged accounts, as these accounts have access to all sensitive information. No wonder privileged identities have emerged as the primary target for cyber-attacks and have been exploited to perpetrate the most destructive data breaches in recent years.

For this reason, BalaBit IT Security hosted a hacker competition last summer with the most-popular Hungarian IT security blog, Buhera Blog, and the professional, ethical hacking company, Silent Signal. The aim was to provide a framework, “Ghost in the Shell Control Box: The Ultimate Hacker Playground,” where anyone, such as university students or security professionals, could try to get privileged access to a sample IT system. The most successful players were awarded.

All the hackers’ activities were tracked by Shell Control Box, a privileged access monitoring appliance. This transparent device records activities in movie-like audit trails that can be searched and replayed. With Shell Control Box, it is possible to monitor what is happening in the IT system and prevent malicious user activities in real-time, either external or internal, and even those initiated by users with the highest privileges.

Our analysis is based on more than 17,000 high-quality, tamper-proof and confidential audit trail files (6.6 GB), recorded by Shell Control Box during the one-week competition. The audit trails can be used as evidence in cases of troubleshooting or forensics investigations.

The Ultimate Hacker Playground

The hackers’ playground, based on an existing, global, financial institution’s IT system, where exactly one server of a local subsidiary was copied with all IT services and security tools, consisted of four levels. The task was to get root access to the server on each level. The server ran a content management system, a project management system and a web management interface of a backend database, serving the CMS and PMS. A firewall was implemented with stricter restrictions than generally used, and the server was able to filter the most widespread, automated, offensive tools so that some basic intrusion prevention system and intrusion detection system functionalities were covered.

The Mission: Get Privileged Access

Organizers of the hacker competition tracked each user’s activities, and thanks to Shell Control Box, it is now possible to model the whole process of getting privileged rights from first entry to root access.

Nearly 400 hackers including engineering students, IT and IT security professionals, and employees of IT security vendors took part in the competition. Only a small percent used TOR anonymity networks, even though they knew their activities were tracked.

Nine percent of the hacker players were able to complete at least the first level and get privileged access to the target server. Six percent of the players were able to complete all four levels. Half of those who completed all four levels did so within 24 hours; the fastest player finished within 7 hours.

Methods for Breaking into the IT System

Compared to log-based forensics, the visualizing capability of Shell Control Box significantly reduced the time required to reconstruct the event. It can be seen that:

  • There were two possible ways to complete the first level of the hackers’ playground. Forty-five percent of the hackers were able to discover the vulnerability of the project management software. Sixty-two percent could upload files to the server through this vulnerability, and 7 percent could bypass the restrictions. (PHP files were not allowed to upload).
  • Another possible option was to get root access through the content management system. Nearly 25 percent of the hackers were able to notice a backup configuration file that was left behind in the system. Most wasted time trying to break the password database, although it was possible to add new users.
  • Another 32 percent used SQL injection to get information, preferring to use automated tools and web scanners. The most popular tools were SQLmap, SQL Power Injector and bsqlb.
  • In many cases, PHP shells were downloaded from untrusted sources, which meant that approximately 2 percent of the hackers used shells that “call home” and open a door for the creator of the shell. Using one of these untrusted shells, a Turkish robot could get into the IT system and upload the main page of their website[u1].

Although the vulnerabilities of the example company were immediately patched after being discovered, the fact is that it was copied from a real IT system. There was a time when such vulnerabilities existed in that IT system, and this gives us a reason to focus more on the security.

Lesson Learned

From the results of the hacker competition, you can see how easy it could be to get privileged access. This highlights the importance of monitoring the privileged users’ activities through the commonly-used, administrative protocols (SSH, RDP, HTTP, Citrix, VNC, Telnet) and differentiating the usual behavior from the unusual in real-time.

Although monitoring the actions of privileged users has become a key part of enterprise risk management, it is a challenging exercise. The following best practices can give a helping hand to mitigate the risks related to super users. To gain real benefits from a Privileged Activity Monitoring (PAM) solution:

Adopt the least-privilege principle. Give a user account only those privileges that are essential to that user’s work.

Use unlimited access only in emergency situations. Generally, system administrators do not need unlimited access to the systems they manage. Lock your super user accounts (root, admin, system, and so on), and use them only if absolutely needed.

Personalize every single account. Make personal accountability possible among privileged users. The first step is to minimize the number of shared accounts. The second rule is that sharedaccount passwords must not be shared. Then, go on with the elaboration of functional areas, detecting incompatibilities and segregating duties.

Limit the number of systems in scope for each person’s privileged accounts. System administrators should have super user privileges only on the systems that are needed, those consistent with business and operational needs. This is a common audit recommendation.

Build a central user monitoring infrastructure. Log management or SIEM solutions do not capture all the necessary information. The easiest way to eliminate these blind spots is to use a PAM solution that augments the existing logs by showing precisely what the user did as opposed to the technical results of what he did.

Implement an independent and transparent activity monitoring device. Implement an independent PAM tool that operates transparently and extracts the audit information directly from the communication between the client and the server. This prevents anyone from modifying the audited information—not even the administrator of the device can tamper with the encrypted audit trails.

Use strong authentication and authorization for privileged accounts. Where super user privileges are assigned to personal accounts, protect those accounts with strong authentication methods. To avoid accidental misconfiguration and other human error, certain PAMs support the 4-eyes authorization principle. This is achieved by requiring an “authorizer” to track administrator actions on the server.

Control remote access in detail. The most secure way is to control who can access what and when based on the protocol being used. With the right PAM solution, it is possible to control filetransfers and other unusual traffic. For example, protocol channels, such as disk sharing, port-forwards or file-transfers, can be allowed or denied based on the group-membership of the user or the time of day.

Prevent malicious actions in real-time. Advanced PAM solutions can monitor the traffic of remote connections in real time, and execute various actions if a certain pattern (for example, a suspicious command or text) appears in the command line or on the screen.

In case of risky user action, the device can send an email alert or immediately terminate the connection. For example, the connection can be blocked before a harmful administrator command, such as “delete,” is executed on the server.

Improve forensics with movie-like playback and fast search. Advanced PAM tools can replay recorded sessions just like a movie, and all actions of the users can be seen exactly as they appeared on the monitor. These tools enable fast forwarding during replays, searching for events via typed commands or pressing “Enter” and texts seen by the user. In case of any problems like database manipulation, unexpected shutdown, etc., the circumstances of the event are available in the audit trails; thus, the cause of the incident can be easily identified.

This article originally appeared in the December 2013 issue of Security Today.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3