×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

Fending Off a Vicious Attack

Download our in-depth report: The Ultimate Guide to IT Security Vendors

Third shift at the Network Operations center is a quiet time, well suited for the engineertypes who understand and speak the language of machines.

Let's take a look at what could easily happen on any given night at any company, in anyindustry, around the country.

Traffic in the wee hours of the morning is sparse, and the night thus far has passeduneventfully. Administrators joke with each other and share the usual gripes about work.Tonight's concern focuses on a new software vulnerability found in an email program used bythe company's worldwide offices. This means that later the technicians will have toexhaustively test and set another code patch into the system. But for now, all is well andthe skeleton IT crew feels fairly safe.

And for good reason.

The company has invested in IT security heavily. The latest firewalls and intrusiondetection systems are keeping the network's perimeter secure, and IT managers will discussnew threats and the email patch roll-out at Monday's staff meeting. A good plan will have tobe developed to tackle that task. Merely applying an untested patch to the critical emailservers is a risk the IT staff can't afford. They know because they've been burnt too manytimes before.

Normally, these concerns would pass as the shift wore on, but tonight the issue with themessaging servers gnaws at them.

The firewalls were programmed to let all email traffic through and that leaves a wide gap intheir defenses. Email is essential to the company's business and attacking it could, intheory, reach every server in the company.

Just as the IT crew thinks about the email problem and works on their nightly duties, ahacker somewhere in Eastern Europe hits 'Enter' and releases a new worm into the Wild. Themass-mailing worm spreads quickly, doubling the number of infected machines every 10seconds. Unlike Slammer, a worm that simply replicated itself, this worm's payload is muchmore devastating.

A simple, yet elegant, piece of code, the multi-threaded worm is able to execute multipletasks in parallel -- a devastating double threat that first looks for targets to infectwhile, at the same time, examining stored messages on infected machines. This second threatcould identify external email addresses and forward all stored messages from the infectedserver to anyone and everyone.

Nothing is safe.

Sensitive intellectual property could be made public and mailed to competitors; productplans, account information and customer interactions could be exposed; and state and federaldisclosure and securities and privacy statues could be violated. All of the company'sinformation is fair game. It could be culled and mailed anywhere with abandon.

It only takes a few minutes before alerts start to ring out on Operations consoles. Serversacross the network suddenly stop responding, and then blank out completely. Grabbing ontomultiple infected outside email servers with address books referencing the company, infecteddata packets stream in.

Once inside, the worm's first thread starts looking for other machines on the network toinfect. The internal targets are easy prey. The company had invested heavily in perimeterdefenses, but the internal soft center was wide open. Production servers, test servers --all are rapidly compromised.

The second thread rifles through the company's stored messages. It is late at night soemails that users hadn't yet access had been piling up. All sensitive information insidethose messages will soon find itself out in public by first light.

The guys in Operations stand by helplessly while the worm burrows through their network. AsCPU and disk usage in each of the mail servers maxes out, the worm prepares for its finale.After compromising each server and sending all its data out onto the Internet, aself-destruct command within the worm activates, deleting all stored information andmutilating each infected machine as thoroughly as if it had been hit by a grenade.

Protect Yourself

The attack just described is hypothetical, but it easily could be real. The Slammer virus,for instance, could have been much worse with just a little extra code added to it. It was,relatively speaking, a benign beast. We may not be so lucky next time.

Attacks that exploit common technologies, such as web and email servers, won't be stopped byfirewalls. How can a company react to this class of attack?

Monitor, monitor, and monitor. If Operations only finds out about an attack when an emailserver crashes, it's too late. Use real-time monitoring tools to analyze data from IDS andfirewalls in real-time to give the best warning of a new attack.

Secondly, protect your core assets. Consider modifying processes based on the potentialthreat posed by a vulnerability, and make sure that core machines are always at the highestpractical level of protection. That way the potential damage inflicted by an attack thatgets through (and there always will be some attacks that get through) is greatly reduced.

Also remember to isolate infected systems. If the infected system is the Internet instead ofan internal server, figure out when to cut the cord to prevent further damage to theorganization.

And don't throw out your firewall. It can be useful. It's simply not the be all and end allof a secured network. Enable operators to shut down outbound or internal traffic on commonports if that's what it takes.

Another thing to think about is correlating and suppressing alarms. When a massive worm,like the one described in the story above, appears, the operations team could get swampedwith thousands of similar alerts. Real-time correlation and security event managementsystems will link and escalate similar events, creating a few 'master' alerts. This reducesinformation overload during crises and clearly identifies the root cause of the attacks. Anyorganization with more than five to 10 firewalls and IDS should consider a security eventcorrelation solution.

Phil Hollows is vice president of security products for OpenService, a vendor of network security event management products.

Submit a Comment

Loading Comments...