Where Angels Fear to Tread

Where Angels Fear to Tread

The average large enterprise (>2,000 employees) spends $16.7 million annually on security software and salaries of the cybersecurity professionals who maintain it while the global cost of cyber-crime damage continues to climb, with estimates of six trillion dollars by 2021, doubling the three trillion in damages incurred in 2015.

A casual observer might conclude that our current technologies aren't working and that the ability of the cybersecurity profession to protect businesses isn't improving. That observation would be correct, yet we continue to pour money and energy down the same sink hole expecting somehow that we will get a different outcome.

Unless and until we recreate the entire IT infrastructure model into some form of a trustworthy execution environment with embedded native integrity-verification, the outcome will simply continue to get worse.

Recent examples of our porous infrastructure core provide strong evidence in support of that thesis.

Researchers at Fidelis released a framework last week for a covert channel for data exchange using the Transport Layer Security (TLS) protocol – as a proof-of-concept for TLS exploitation techniques. In other words, they just proved that a hacker could use the most widely deployed communications security protocol in use today to create C2 (Command & Control) communication and data exfiltration that would go completely unnoticed by modern network perimeter defense technologies.

TLS has been the predominant and ubiquitous network perimeter protection that provides privacy and data integrity between two communicating applications (like a Web browser and an on-line application) that require data to be securely exchanged over a network (like file transfers, VPN connections, instant messaging and voice over IP) since virtually the beginning of modern Internet commerce.

This covert exploit leverages the TLS handshake when public key certificates are exchanged. The technique doesn’t require nor does it even establish, a TLS session, but instead exchange is executed as the clients are negotiating the handshake using the TLS X.509 (standard) extension. To modern network monitoring and inspection technologies, the exchange looks banal.

The TLS X.509 certificates have many fields where strings can be stored, and the Fidelis team used one of them to hide the data transfer. That field is never discovered because the security technologies that inspect certificates for anomalies would have to be looking specifically for that data, and they don’t. Since the certificate exchange happens before the TLS session is established, it appears on inspection that a data transfer never occurred, when in reality the data was transferred within the certificate exchange itself.

According to Fidelis, they were able to store 60 kilobytes of data in each TLS X.509 exchange, demonstrating that a hacker could establish this channel and perform rapid certificate negotiations enabling the data transfer of large – really large – amounts of data --- like credit card data, social security numbers and scores of other sensitive PII.

So, in essence, the Fidelis team just created and published a framework that demonstrates how the communications security protocol standard (along with Secure Sockets Layer - SSL) that we all use to transmit private communications via the Internet can be easily exploited.

This comes on the heels of the discovery of similar DNS tunneling exploits, the sudden exposure of every computing device on the planet to "Meltdown" and "Spectre" vulnerabilities and the cybersecurity research project at the University of Michigan that demonstrated how a manufacturing line worker could embed a hardware back-door into a chip by adding a single component to the mask during fabrication.

In summary, we have discovered in the past few months that the backbone of all of our Internet communications, both commercial and consumer is flawed and exploitable, the DNS service that we all use for email and web browsing can be tunneled to steal account data and the microchip that every one of our computing devices including our smart phones depend on can easily be compromised at the hardware level to enable malware penetration into everything.

All of this is the digital equivalent of discovering that our roads can no longer safely support automobile or truck traffic, our airports can no longer safely land a plane and our cars, trucks and planes are no longer safe to operate. Yet we continue to drive and fly with abandon.

Next up? IoT and self-driving cars, driver’s licenses on smartphones and wearables linked to our networks through mobile devices, data manipulation instead of theft, extortionware instead of ransomware, fully Internet-dependent autonomous systems, a gold-rush toward the digitalization of businesses, robotics, more smartphones, more data, more network traffic, more complexity – all dependent upon a defenseless non-secure infrastructure with a porous core.

If we keep doing this, it is a certainty that more Equifax-class attacks will continue to happen, at a greater frequently and with increasingly severe consequences. In addition, since our government agencies are not exempt (they of course also use Intel processors, DNS and TLS), we will continue to see increased state-sponsored cyber-attacks at the Federal and State levels as well.

China and many other foreign governments are far along in developing advanced bio-metric, exascale super-computing, and quantum capabilities that are transforming not just their digital infrastructure but their manufacturing, communications and production systems while creating an absolute threat to our national security and positioning our adversaries to undermine the entire U.S. economy at the same time.

It’s as if our definition of sanity is to disregard the chaos that is life and pretend instead that only an infinitesimal segment of it is reality.


Nicholas Blanton

Cyber Security Professional

6 年

I'm just waiting for the first reports of ransomware on peoples personal items... cars, HVACs, refrigerators, toasters, etc. Too many people are too quick to adopt IoT devices without considering the adverse impact they could have.

回复

要查看或添加评论,请登录

Steve King, CISM, CISSP的更多文章

  • Connected Device Security: A Growing Threat

    Connected Device Security: A Growing Threat

    Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And as you have…

    3 条评论
  • China’s Ticking Time-Bomb.

    China’s Ticking Time-Bomb.

    It should now be clear to even the casual observer that China has been spying on us for years and stealing reams of…

    7 条评论
  • Comparing Major Crises To COVID-19: A Teachable Moment

    Comparing Major Crises To COVID-19: A Teachable Moment

    Lessons from past financial crises might prepare us for the long and short-term effects of COVID-19 on the economy and…

  • The Escalating Cyber-Threat From China

    The Escalating Cyber-Threat From China

    A Modern-day Munich Agreement In an article penned back in May of 2015 in a policy brief published by the Harvard…

    1 条评论
  • Cybersecurity: Past, present, future.

    Cybersecurity: Past, present, future.

    We have made a flawed assumption about cybersecurity and based on that assumption we have been investing heavily on…

    15 条评论
  • Three Marketing Tips for Improved Conversion Rates

    Three Marketing Tips for Improved Conversion Rates

    While we are all devastated to one degree or another by this outbreak and with the knowledge that it will likely change…

  • Coronavirus in the Dark.

    Coronavirus in the Dark.

    So, yes. It is now very clear that the outbreak of the COVID-19 virus and the concomitant investor panic leading to a…

    13 条评论
  • Panicky Investors Issue Dire Warning On Coronavirus

    Panicky Investors Issue Dire Warning On Coronavirus

    Sequoia Capital just issued a dire warning to its portfolio companies. “Coronavirus is the black swan of 2020.

    5 条评论
  • AI in Cybersecurity? Closing In.

    AI in Cybersecurity? Closing In.

    "AI Needs to Understand How the World Actually Works" On Wednesday, February 26th, Clearview AI, a startup that…

    8 条评论
  • Do CapitalOne Shareholders Have a Case Against AWS?

    Do CapitalOne Shareholders Have a Case Against AWS?

    An adhesion contract (also called a "standard form contract" or a "boilerplate contract") is a contract drafted by one…

    1 条评论

社区洞察

其他会员也浏览了