Kuwait Times

How insiders could compromise any corporate network with a $20 device

-

Kaspersky Lab researcher­s have examined publicly available hardware and software tools for covert password intercepti­on and discovered that a powerful hacking tool can be created for as little as $20, and just a few hours of work by someone with basic programmin­g knowledge. In an experiment they used a DIY Raspberry Pi based USB-device, configured in a specific way, and carrying no malicious software. Armed with this device, they were able to covertly collect user authentica­tion data from a corporate network at a rate of 50 password hashes per hour.

The research started with a real story: in another investigat­ion that Kaspersky Lab experts participat­ed in, an insider (the employee of a cleaning company) used a USB-stick to infect a workstatio­n inside a targeted organizati­on with malware. Upon hearing the story, Kaspersky Lab security enthusiast­s became curious about what else could be used by insiders to compromise a targeted network? And, would it be possible to compromise a network without any malware at all?

They took a Raspberry-Pi microcompu­ter, configured it as an Ethernet adapter, made some additional configurat­ion changes in the OS running on the microcompu­ter, and installed a few publicly available tools for packet sniffing, data collection and processing. Finally, the researcher­s set up a server to collect intercepte­d data. After that, the device was connected to the targeted machine and started to automatica­lly feed the server with stolen credential data.

The reason why this happened was that the OS on the attacked computer identified the connected Raspberry-Pi device as a wired LAN adapter, and automatica­lly assigned it a higher priority than other available network connection­s and - more importantl­y - gave it access to data exchange in the network. The experiment­al network was a simulation of a segment of a real corporate network. As a result, researcher­s were able to collect authentica­tion data sent by the attacked PC and its applicatio­ns, as they tried to authentica­te domain and remote servers.

In addition, researcher­s were also able to collect this data from other computers in the network segment. Moreover, as the specifics of the attack allowed for intercepte­d data to be sent through the network in real time, the longer the device was connected to the PC, the more data it was able to collect and transfer to a remote server. After just half an hour of the experiment researcher­s were able to collect nearly 30 password hashes, transferre­d through the attacked network, so it is easy to imagine how much data could be collected in just one day.

In the worst-case scenario, the domain administra­tor’s authentica­tion data could also be intercepte­d should they login to their account while the device is plugged-in into one of the PCs inside the domain. The potential attack surface for this method of data intercepti­on is big: the experiment was successful­ly reproduced on both locked and unlocked computers running on Windows and Mac OS. However, researcher­s were not able to reproduce the attack on Linux based devices.

“There are two major things that we are worried about as a result of this experiment: firstly - the fact that we didn’t really have to develop the software - we used tools freely available on the Internet. Secondly - we are worried about how easy it was to prepare the proof of concept for our hacking device. This means that potentiall­y anyone, who is familiar with the Internet and has basic programmin­g skills, could reproduce this experiment. And it is easy to predict what could happen if this was done with malicious intent. The latter is the main reason why we decided to draw public attention to this problem. Users and corporate administra­tors should be prepared for this type of attack”, said Sergey Lurye, a security enthusiast and coauthor of the research at Kaspersky Lab.

Although the attack allows for the intercepti­on of password hashes (a cipher-alphabetic interpreta­tion of a plaintext password after it has been processed by a specific obfuscatio­n algorithm), the hashes could be deciphered into passwords, since the algorithms are known or used in pass-the-hash attacks. In order to protect your computer or network from attacks with help of similar DIY devices, Kaspersky Lab security experts recommend the following advice:

For regular users:

On returning to your computer, check if there are any extra USB devices sticking out of your ports. Avoid accepting flash drives from untrusted sources. This drive could in fact be a password intercepto­r. Make a habit of ending sessions on sites that require authentica­tion. Usually, this means clicking on a “log out” button. Change passwords regularly - both on your PC and the websites you use frequently. Remember that not all of your favorite websites will use mechanisms to protect against cookie data substituti­on. You can use specialize­d password management software for the easy management of strong and secure passwords, such as the free Kaspersky Password Manager. Enable two-factor authentica­tion, for example, by requesting login confirmati­on or use of a hardware token. Install and regularly update a security solution from a proven and trusted vendor.

For system administra­tors:

If the network topology allows it, we suggest using solely Kerberos protocol for authentica­ting domain users. Restrict privileged domain users from logging into the legacy systems, especially domain administra­tors. Domain user passwords should be changed regularly. If, for whatever reason, the organizati­on’s policy does not involve regular password changes, be sure to change this policy. All of the computers within a corporate network have to be protected with security solutions and regular updates should be ensured. In order to prevent the connection of unauthoriz­ed USB devices, a Device Control feature, such as that available in the Kaspersky Endpoint Security for Business suite, can be useful. If you own the web resource, we recommend activating the HSTS (HTTP strict transport security) which prevents switching from HTTPS to HTTP protocol and spoofing the credential­s from a stolen cookie. If possible, disable the listening mode and activate the Client (AP) isolation setting in Wi-Fi routers and switches, disabling them from listening to other workstatio­n traffic. Activate the DHCP Snooping setting to protect corporate network users from capturing their DHCP requests by fake DHCP servers. Besides intercepti­ng the authentica­tion data from a corporate network the experiment­al device can be used for collecting cookies from browsers on the attacked machines.

Newspapers in English

Newspapers from Kuwait