IT. SECURITY. OPEN SOURCE.

Author: jason

russia putin

Russian Hackers Targeting US and UK Critical Infrastructure

Over the last few weeks, Russian hackers have coordinated attacks against personal, government, corporations, and Internet Service Providers. These attacks are currently being directed toward IoT devices, home based modems, and corporate routers, switches and firewalls. This is in an attempt to create an organized attack against the US and UK and potentially bring down critical infrastructure.

There are a couple of reasons why these attacks are occurring against these two countries. First, the exile of diplomats from Russian embassy’s after a Russian spy was poisoned in the UK. Second, in early April, hackers went after Russian network equipment using a known Cisco configuration tool that was exposed to the public Internet. Once hackers had access to the network equipment, they were able to not only delete the configurations, but the hackers also left behind a message saying, “Don’t mess with our elections” and a picture of the American flag.

There are simple changes that you can make to your company infrastructure, even your home equipment, to safeguard assets that you own.

  • Change default passwords – The default username and password on most Cisco equipment is cisco/cisco. This credential provides administrative access to the router or switch and must be changed prior to placing the device into production. Changing the default password on all equipment should be the very first thing you do.
  • Maintain system level updates – Ensure that you are patching your network equipment at least quarterly if not sooner depending on the types of known vulnerabilities. The Cisco configuration tool that was used to hack into the Russian routers, had a known vulnerability.
  • Place access lists on management interfaces – There is no reason to have a way to log into a piece of equipment from anywhere in the world. There are ways of placing firewall rules on network equipment to only allow authentication attempts from known trusted networks.
  • Replace end of life/end of support equipment – High end network equipment can cost hundreds of thousands of dollars. Ensure that your organization is budgeting for replacement of aging devices so that you can continue to apply patches to your network and security equipment. A breach of information, or a complete network outage, could have significantly higher costs to fix the issues due to downtime than it would have if you purchased newer equipment with support and maintenance.
  • Stop using clear text protocols – Most legacy equipment only support Telnet or clear text web traffic. This equipment should either be pulled out of production and placed into a lab, or discarded altogether. It is a requirement nowadays to use encryption for all remote administration and even network monitoring protocols such as SNMP. If you cannot remove the equipment out of production, it is recommended that a project plan is in place to replace older legacy equipment. If replacement cannot be performed in a timely manner, the use of compensating controls such as authenticating from known trusted networks to creating an out-of-band management network is advisable.

There are definitely some quick wins that you can put in place to better protect your network equipment from being attacked, whereas others may take a while to implement due to budget constraints. In either case, these tips will help create a heightened layer of security for your overall network equipment.

The Clarifying Lawful Overseas Use of Data (CLOUD) Act

On March 23, 2018 President Trump signed a $1.3 Trillion dollar spending bill to keep the US government from shutting down. In that spending bill, congress snuck in The Clarifying Lawful Overseas Use of Data (CLOUD) Act. The premise of the CLOUD Act is widely overreaching in that it allows the US Government to access data which resides in foreign countries. According to the Electronic Freedom Foundation the act will allow:

“…the CLOUD Act is a far-reaching, privacy-upending piece of legislation that will:

* Enable foreign police to collect and wiretap people’s communications from U.S. companies, without obtaining a U.S. warrant.

* Allow foreign nations to demand personal data stored in the United States, without prior review by a judge.

* Allow the U.S. president to enter “executive agreements” that empower police in foreign nations that have weaker privacy laws than the United States to seize data in the United States while ignoring U.S. privacy laws.

* Allow foreign police to collect someone’s data without notifying them about it.

* Empower U.S. police to grab any data, regardless if it’s a U.S. person’s or not, no matter where it is stored.”

As you can see, this not only allows the US government to obtain information stored in foreign countries, it also allows foreign countries to also request information on US citizens. The fact that this can be done without a warrant, obviously violates an American citizens 4th amendment rights for reasonable search.

Though many privacy advocates in have been outspoken against the bill, Microsoft, who has been battling against US Justice Department for years is in favor of the bill. They have been battling the DOJ against releasing information in their Office 365 OneDrive service which is stored in a data center in Ireland. Due to the privacy regulations in the European Union, Microsoft was stuck in releasing such information.

The United States is already very weak in privacy laws, the fact that there is no federal law or amendment to the Constitution which protects the privacy of the American citizens; this further weakens privacy. It will be interesting to see how the CLOUD Act plays out not only in the courts in the years to come. It will also be interesting to see how this will play into the EU’s new General Data Protection Regulation (GDPR) which is meant to strengthen the privacy rights of EU citizens from countries which have weak privacy laws like those in the US.

Read more on the EFF’s websiteResponsibility Deflected, the CLOUD Act Passes

Page 3 of 3

Powered by WordPress & Theme by Anders Norén