W h it e pa p e r « I T r u s t » ITrust experts found out that, security breaches represent 10 99% of security breaches in the companies Written by ITrust November 2013, according to audit conducted in the last 5 years by the ITrust penetration tests team. Introduction That is not a surprise; many cybercrime facts were reported in the news last year. This crime has now become a major challenge for governments as they are potentially at risk. We remember how the Elysée hacking was highly-publicized [1]. 75% of companies hacked within the last two years according to a Cenzic study [2]. That number rose to 90% on ITrust’s statistics. This was based on what we observed during pentest missions through our customers. Over the past five years, ITrust’s consultants for penetration tests intervened a hundred times to achieve penetration testing to our customers. number of audits These tests are realized both in internal and external environment (to test DMZ customers services or even on websites) Find below the tests distribution. web 12 % internal 50 % external 38 % The year 2013 is only based on the first 4 months AUDITS DISTRIBUTION PER YEAR : Total : 104 audits Kind of audits conducted distribution 2 W h i t e pa p e r Top 10 of vulnerabilities by ITrust We have generated statistics from a data sample we are dealing with to provide an objective view about the relevance of these data. Thus, we provide information concerning the business structure : over 500 (38%) And the field of activity of our customers : Service (19%) less 500 (12%) less 100 (15%) less 20 (35 %) Distribution of our customers by number of employees Industry (15%) Public (4%) Bank (19%) Host (6%) health/agro (25 %) Hotel (4%) Distribution of our customers by field of activity This article gives an overview of the 10 most commonly encountered vulnerabilities during our audits with case studies. It is therefore relatively accurate feedback of the ITrust’s technical teams over the last 5 years. We observed during our audits or incident interventions that 99% of information systems have been compromised by at least one of these 10 breaches. Correcting these 10 main vulnerabilities would heighten the security level of an organisation. 3 W h i t e pa p e r Aerospace (8%) Top 10 of vulnerabilities by ITrust Feedback: Top 10 vulnerabilities encountered 10 Fixed these vulnerabilities would raise the level of security of an organization Too verbose logging : « the network tea room » This vulnerability is not a real one, but is often the first step during penetration Wordy domain controllers tests. Even though this flaw cannot directly compromise a system, it allows useful information to be collected – especially finding out relevant targets. Too wordy domains give attackers critical information to organise their attacks. Through LDAP or Samba connections, they often get relevant information such as In the talkative group, we find the 2 main servers : the domain name, the operating system version (fingerprint) and even more useful for them, the domain users list. DNS Servers DNS is an essential useful service, which insures the good working of application Case study : enumerating users account on a domain. services such as browsing and messaging ones. Most of the time, doors are opened Using rpcclient command under windows : # > rpcclient 192.168.1.1 -p 139 -U% -c enumdomusers session request to 192.168.0.4 failed (Called name not present) user:[Admin] rid:[0x1f4] user:[Guest] rid:[0x1f5] user:[Accounting] rid:[0x476] user:[Commercial] rid:[0x4c3] Using rpcclient to enumerate domain administrator # > rpcclient 192.168.0.4 -p 139 -U% -c ‘querygroupmem 0x200’ session request to 192.168.0.4 failed (Called name not present) rid:[0x1f4] attr:[0x7] on the whole network. Then, hackers use the DNS zone transfer to list all the assets within the domain. Thus, they can quickly find out the interesting targets – by responsibility or department (R&D, Accounts). In the same way, it is possible to obtain at each machine, the user connected. 4 W h i t e pa p e r Top 10 of vulnerabilities by ITrust Access rights management : need to know 8 Need-to-know is one of the most important security concepts used to ensure the protection of confidential data. The management of access rights and permissions often has weaknesses: access restrictions to weak or non-existent permit to obtain a lot of strategic and confidential information. 9 Trust-based relationship : the compromise spread Within an UNIX environment, remote login programs (rlogin et rsh) use a poor authentication system which also allows them to set up a trust based relationship between the machines (via .rhosts or hosts.equiv file). In this way, if a machine is compromised, the hacker has easy access to the whole system of trusted machines. Case study: trusted insider test - trainee example. In the most Active Directory architectures, users are assigned to several groups and shared contents are opened to some groups. A trainee is added to the group of his supervisor(s). The test consists to find which information can be obtained. At the end of the test, the experience highlights that the person at least have obtained confidential data. Moreover, in most cases, information about user accounts that can be used to become a server administrator are found. In most cases, these applications are forbidden with the security policy requirements in favour of more secured tools as SSH. But the experience reveals that bounces are possible because of the lack of private keys protection. The public key related can Employees are the weakest link for the IT security. They often be used on a wide range of servers. That allows the attacker to connect to represent 50% of security risks. « Insiders are the biggest them. threat » Within a Windows environment, it is possible to define trust relationships between Active Directory domains. In that situation, the user directory is replicated between the trusted domains. If an attacker can obtain an account on a « weaker » domain, then he will have the entire access to all the domains within the account. 5 W h i t e pa p e r Top 10 of vulnerabilities by ITrust Administration protocols : 7 devil is in details 6 Database Even in companies where security is considered on users’ posts and servers, some Databases are chosen targets because of the important information they detained. kinds of equipment are regularly forgotten. Whether active network elements When default passwords are changed, database webmasters (who manage lots of such as switches, routers or printers, security is often overlooked. Thus, default servers) often use weak passwords depending on the name of the server. More than administration passwords are rarely changed and if they are, default enabled confidential information they contained, these databases include users lists on which administration protocols remain on that kind of device. you can easily crack the password. Then, these accounts can be used to carry on the network attack. The presence of insecure protocols used to pass unencrypted passwords is a very important source of attacks. For instance: FTP, Telnet… Case study: ERP : a perfect target. Case study : SNMP on a router agency This happened during one of our audit. A VPN router of one of the client agency has a SNMP service activated listening on the Internet. The setup by default allows us to read and write MIB’s information. The setup scenario consisted in redirecting DNS requests to one of our servers and to review the statistics of them. After this convincing first step, the relevant traffic is redirected to our server, as well as the access to the messaging account. Then, we can collect all the forwarded messages. Although the production equipment and printer represent only 1% of security threat, they often are too neglected. 25 % 21% 20 % 20% 13% 15 % 12% 10 % 10% 4% 5 % 3% 1% 1% 6 W h i t e pa p e r eq n rs pr in te ui p m en ts lin es rs gu id of ds SNMP is not the only one open administration protocol. Let’s take the example of an inverter on a client’s production lines. This inverter is on a « factory » configuration. Thus, we just have to log on to the admin web server with the default accounts in order to turn off all the production services. Nowadays, database hacking is 14% of security threats. http://buff.ly/11umuYS Gamigo’s database was pirated in 2012. pr od u ct io s nt e ce ta da st a nd ar ta pu te r da ,co m ts ns or k ne tw tio ta m ob ile ta bl e w or ks la pt op s 0 % Case study: Production stopped For this case, the company used to let salespersons to have a ERP instance on their computer in order to use it when they are on-site contact with customers. As the database service was linked to the network, it was easy to find out obvious passwords. Then, we could get the company clients list and its associated offers. That was a real treasure and that is very profitable for attackers to resell it. Top 10 of vulnerabilities by ITrust 5 Files sharing Many systems may have files sharing. Shares may be managed via various communication protocols (FTP, NFS, SMB…). Generally, restrictions about these shares are weak or non-existent. Whether it is an anonymous FTP access allowed or an access restriction to the company network for the network shares (SMB or NFS), an attacker has the possibility to obtain a lot of confidential information. When an attacker chose to use the scorched earth tactic and to delete all the files (backup, financial data…) the damage that can be cause is extremely high. 4 4 Abandoned servers We found during our audits that a hardware or software inventory is almost never done within the information systems. During an audit, when we discover not maintained and highly vulnerable test servers or abandoned servers, administrators Case study : management’s printer are surprised as they were not even aware of these items on the network. These By default, the latest printers have some shares activated to receipt scans or fax received. In our case, the printers were storing all the documents – so, it was possible to find all the management’s photocopies, scans and fax. servers are easy to exploit and can still detain valid and usable information. Moreover, they are used as relay to attack more relevant targets. http://buff.ly/ZWQ2Mv Some researchers from the Univertsity of Columbia claim that they discovered a new computing security flaw class that could impact millions of companies, consumers and governmental organisms. Printers can be remotely controlled online by computer criminals. 7 W h i t e pa p e r Top 10 of vulnerabilities by ITrust 3 Web vulnerability This category could be a whole article as it is a very wide subject. In our case and Phase 2: Operation according to our sample, Web vulnerabilities does not represent the vulnerabilities’ This vulnerabilities category allows on the second hand to operate the information majority encountered. However, very often, especially during websites’ audits, it is collected in phase 1. In this category we find: possible to monitor some vulnerability’s applications. • Sensitive data exposure • Lack of secure configuration If we confront the 10 top web vulnerabilities given by OWASP, this is what we can • Lack of restricted privileges. conclude after our field experience: As soon as an operating vulnerability is identified on the website, if privileges are not We can class vulnerabilities that we face in two categories: rightly managed it can be possible to access the server and obtain all rights. According to the hacker’s nuisance potential, the operation can go to a website break down, to Phase 1: Entry points some data loss (potentially sensible like banking data), to the creation of a zombie and These vulnerabilities allow a first system assess and give information. in the worst case scenario to a data deletion. By frequency order we find: • Not updated systems This vulnerability category is a whole 10 top paragraph • SQL injections • XSS attacks • Sessions management Case study : Unprotected PHP functions Websites offer the possibility to update some contents (like images for instance) and use PHP upload functionalities. If there are not some strict controls of these functionalities, it is possible to upload a web shell and to obtain some information like condensed passwords. This allows to access the server in a back office mode. Case study: working session Hijacked / Video surveillance systems A security company offers to its clients a video surveillance system of their offices with an online access. Session cookies are not protected and allow replays. Thus, all users can guess the cookies format and access another company’s video surveillance system. The issue could be limited to a clients’ disclosure issue if passwords were not that weak. But then, the security system becomes with small resources an efficient tool to set up an office robbery. 8 W h i t e pa p e r Top 10 of vulnerabilities by ITrust 2 1 Passwords Common security risks A default or common password gives an access to confidential resources, observed in That should be the most occasional problem and is paradoxically the easier and the 96% of our customers’ audits. A trainee would be able to reach it. That is an issue for most automated to exploit. Common security vulnerabilities are known and once users in a company whose awareness is the most high – and it is still one of the attack issued the editors give patches. Systems to be protected against risks just need to be vectors the most used and the easier to do so. updated. However, these vulnerabilities are the biggest attacks vector for information systems. The last news concerning the businesses compromise involved systems not FEEDBACK: updated for many years. Top 3 of the most weaknesses passwords encountered - Account without password We remember the hacking of Sony’s PlayStation network. This hacking has been - Same login and password possible through a known vulnerability with an available update. - Generic password from created accounts And let us not forget the user name password, name of his kids or a word from dictionary… Case study : Blackberry server To illustrate this issue, we return on the case of a Windows server with the administrator’s password of the database left by default. With that access we can create a new user within the system and we can see that the BlackBerry server does not delete temporary files. In this way, highly confidential information are obtained. 3 others vulnerabilities In addition to the 10 vulnerabilities can be added to the top 10, increasing the total to 13 vulnerabilities. For instance: An employee gives his password to a fake system administrator via phone or mail. That top 13 shows > Application flaws for us all exploited vulnerabilities of an information system. 9 W h i t e pa p e r > Human Vulnerabilities Top 10 of vulnerabilities by ITrust > Unknown vulnerabilities Conclusion During an audit, we penetrate in an information system more than 9 out of ten We are currently at a turning point in our activity. Attacking technologies prevail times.We do so from a commun security breaches (coming from the top 10), through over defencing ones. The gap between the hackers and engineers is widening. The a simple internet connection. If we can make it, so do the hackers, malicious persons systems are extraordinarily vulnerable and the efficient technologies are rare. or malwares. Similarly to medicine, the current antibiotics are not that efficient. Then, waiting for filling the gap between the sword and the shield (with a behavioural analysis Then, what do we do? technology for instance), we wanted to explain our clients and our CISO, through Itrust, that there is another complementary way to the classical medicine. An We often meet customers who pile on security tools while they could delete these alternative but complementary one based on better practices and a good hygiene. A 10 main breaches that would increase exponentially the security level. That is the kind of “Chinese medicine” that prevents rather than cures. reason why it is necessary to set up permanents controls to check these points. This year, a Verizon report showed that 97% of the data violations could have been Even though all problems could be avoided with very simple controls, each year avoided by easy controls. [4]. more companies are suffering serious incidents related to cyber security. I am a security expert for 15 years. I have been the BNP’s trading room security director. For example, do you know that 98% of the companies we checked use password by I am an ISS cloud expert in the National Assembly. default? I am the CEO of Itrust founded 7 years ago. Our activity is complex. You can find a lot of standards and methods. You can find an You are not facing security problems? Of course : 8 companies out of 10 suffering incalculable number of tools, viruses, methods, schools which use their own process attacks or intrusions and they do not know it. or protocols. 10 It is a young activity, (practised for) only 20 years. You have firewalls and protection systems but you are still suffering from malicious With the new threats, specially the APT and the cloud, our clients remain attacks. We have been told for years that we must protect ourselves, but the expectants. Few of them understand why, still after 20 years, we shall keep analysis remains terrible. Despite all the tools and significant security budgets, basic improving the systems with new methods and new tools. They find with surprise security principles are not respected. We remain as vulnerable as before and it is and incredulity that firewalls and antivirus are no longer efficient enough to protect even easier for an intern to get confidential information on the networks. Or even for them. They realise that many of us lied to them promising the end of their troubles a Korean student to get your ERP rate base or to launch a significant DDOS attack on with new tools. your infrastructure. W h i t e pa p e r Top 10 of vulnerabilities by ITrust To convince you: Most security incidents could have been easily avoided. A story that deserves a conference: Did you know that the largest cyber attack (Stuxnet) could be avoided by changing the default password of Siemens devices? Simple solutions and controlled procedures have mostly avoided major disasters : • BP oilrig: Respecting what is known as healthy security: simple and smart controls. Valve security system was disabled due to the generation of a large amount of false positives. Leading experts and studies confirm what we say. • Société Générale - Kerviel case: The trader was also the designer of the trading tool. B est P ractices « The anti-virus is no more effective in responding to new threats . Maintain a good security policy in real time by avoiding default passwords and overseeing the flaws of security remains the current best practice for SMEs» • Fukushima: Engineers were convinced that the cooling pump was open. • Stuxnet virus: Using the default password of Siemens devices. • Hesel disaster: Hervé Schauer, security consultant expert Due to a lack of controls, too many spectators without tickets, attend the match. Security is something simple. To avoid being sick, you wash your hands, you have good hygiene and eat healthily... You are grateful not to be stuffed with drugs every morning. That is similar for the information system security; but that speech is hard to take as for 20 years we kept on hearing that drugs were the only solution to solve our problems. 11 W h i t e pa p e r Top 10 of vulnerabilities by ITrust Over the last years, other experts go along with us : 10 security vulnerabilities are What does the police do? 99% of encountered vulnerabilities in any kind of company. Often, salvation comes from regulation. That is when these controls will be mandatory that they will be systematically implemented. Top 1 0 f l aw s i n a l l e n t r e p r i s e s So ? Too verbose systems This is a strong trend, more and more recommendations or compliance standards take Weak passwords this step. These include: Rights to know Trust between domains • The Health safety guide from ANSSI (link...) database default password • New constraints related to health data, more and more recommendations DNS servers too wordy for internal domains • The top 20 SANS Bad shares Protocols in clear or misconfigured Development servers, abandoned servers Historical and common vulnerabilities Let’s fix these vulnerabilities first and company’s security level increases exponentially, better than any expensive technology. ITrust has developed its solution, IKare, based on these ideas. IKare continuously checks security vulnerabilities of the information system and suggest the appropriate corrections. w r i t e pa p e r Le Top 10 des vulnérabilités par ITrust Propriété exclusive © ITrust Bibliography [1] http://lexpansion.lexpress.fr/high-tech/ cyberguerre-comment-les-americains-ontpirate-l-elysee_361225.html [2] http://www.cenzic.com/resources/reg-required/whitePapers/Ponemon2011/ [3] https://www.owasp.org/index.php/ Top_10_2013-T10 [4] http://www.wired.com/images_blogs/threatlevel/2012/03/Verizon-Data-Breach-Report-2012.pdf Writers Julien Lavesque is ITrust’s CTO. He is a security consultant, acting as an auditor, expert and trainer for sixty clients. Telecom and security engineer. Jean-Nicolas Piotrowski, Itrust’s CEO. Security expert since fifteen years, former CISO at BNP Arbitrage trading room. He is general secretary and co-founder of Digital Place cluster. Based on a case study by Denis Ducamp, security consultant. ITrust (www.itrust.fr) is a security company since 2007, providing its expertise and product to more than 100 customers in Europe. It develops IKare, a vulneralibity management solution. ITrust is prizewinner of Future investment, «SVC» project, and developed a breakthrough technology for behavioural analysis. ITrust was awarded in 2013 for the price of international digital, given by IEClub and Ubifrance. 55 avenue l’Occitane BP 67303 31 670 Labège Cedex, France Tél : +33 (0)567.346.781 Email : [email protected] www.itrust.fr www.ikare-monitoring.com
© Copyright 2026 Paperzz