{"id":2728,"date":"2022-03-19T18:48:58","date_gmt":"2022-03-20T00:48:58","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/?p=2728"},"modified":"2022-03-19T18:49:01","modified_gmt":"2022-03-20T00:49:01","slug":"another-russian-cyber-attack","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/03\/19\/another-russian-cyber-attack\/","title":{"rendered":"Another Russian Cyber Attack!"},"content":{"rendered":"\n<figure class=\"wp-block-image is-style-default\"><img decoding=\"async\" src=\"http:\/\/prod-upp-image-read.ft.com\/c9803416-e923-11e9-aefb-a946d2463e4b\" alt=\"\" \/><figcaption>(7)<\/figcaption><\/figure>\n\n\n\n<p>While it is true that this attack was carried out while being funded by the Russian government, it was an attack that occurred back in May 2021 while only just recently being reported on so it would have little to do with the recent political conflicts involving Russia. The FBI and the CISA (Cybersecurity and Infrastructure Security Agency) have released information that this attack essentially used flawed MFA (Multifactor Authentication) settings as an entry point where they then utilized an already known vulnerability <em>PrintNightmare<\/em> (1).\u00a0 The victim of this crime is an undisclosed non government organization and it is unclear exactly what information has been exfiltrated, but it is clear that the attackers had access to cloud documents and email accounts.<\/p>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">What is <em>PrintNightmare<\/em>?<\/h4>\n\n\n\n<p>Microsoft put out a report that covered the severity and details of this vulnerability on July 1st 2021. The vulnerability employs the Windows Print Spooler program which when acting as intended, is used to manage all print jobs as they are received by the computer. When this program is exploited, the program improperly performs privileged file operations which grants attackers the opportunity to execute arbitrary code. RCE or remote code executions is a serious issue when it comes to vulnerabilities as it essentially grants bad actors system privileges which would allow free reign to view data, delete data or even install programs which they would not have been able to otherwise (2). It is because of this issue that Microsoft had rated this exploit a 8.8\/10 in the common vulnerability scoring system (CVSS)(3).<\/p>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">How was the attack done?<\/h4>\n\n\n\n<p><\/p>\n\n\n\n<p>Usually MFA is an important part of making sure that intruders stay out of accounts they are not supposed to access. This attack on the other hand made use of Cisco\u2019s Duo MFA system which had a default configuration allowing inactive accounts to be reactivated without the need of being authenticated (4). Because of this oversight, all that the attackers had to do was (5):<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Find an inactive account that has a poor password.<\/li><li>Brute force the weak password, then reactivate the account (skipping having the account verified).<\/li><li>Implement the <em>PrintNightmare <\/em>exploit to escalate their permissions.<\/li><li>Use these system permissions to completely disable MFA for all the accounts<\/li><\/ul>\n\n\n\n<p>At this point the attackers were well inside the network and could continue to create accounts to snoop on data stored on the cloud server and within the other users\u2019 emails.<\/p>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">Takeaways<\/h4>\n\n\n\n<p>It is clear that there were many flaws that went wrong for this attack to had been carried out; from the faulty default settings of Duo MFA, the NGO\u2019s failure to understand the settings related to their own network\u2019s security, or even Microsoft for having been relatively slow when implementing a fix for the known exploit. But the simplest flaw, and one that any of us could be responsible for, is creating a weak password. Without finding an account that had a relatively simple password that the attackers could guess, there would not have been an entry point for the attack (5). Making a complex password that is hard to crack is not only beneficial for your own security but as this example showed, when all else fails, having a good password is also beneficial for everyone on the shared network.\u00a0<\/p>\n\n\n\n<p>Here is a video that goes over some things to consider when making a good password:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-embed-handler wp-block-embed-embed-handler wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"How to pick a proper password\" width=\"640\" height=\"360\" data-src=\"https:\/\/www.youtube.com\/embed\/pMPhBEoVulQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe>\n<\/div><figcaption>(6)<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">Sources:<\/h4>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1\">(1) <a rel=\"noreferrer noopener\" href=\"https:\/\/thehackernews.com\/2022\/03\/fbi-cisa-warn-of-russian-hackers.html\" target=\"_blank\">https:\/\/thehackernews.com\/2022\/03\/fbi-cisa-warn-of-russian-hackers.html<\/a><\/p>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1\">(2) <a href=\"https:\/\/nakedsecurity.sophos.com\/2021\/06\/30\/printnightmare-the-zero-day-hole-in-windows-heres-what-to-do\/\">https:\/\/nakedsecurity.sophos.com\/2021\/06\/30\/printnightmare-the-zero-day-hole-in-windows-heres-what-to-do\/<\/a><\/p>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1\">(3) <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527<\/a><\/p>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1\">(4) <a rel=\"noreferrer noopener\" href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-074a\" target=\"_blank\">https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-074a<\/a><\/p>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1\">(5) <a href=\"https:\/\/nakedsecurity.sophos.com\/2022\/03\/16\/russian-actors-bypass-2fa-story-what-happened-and-how-to-avoid-it\/\">https:\/\/nakedsecurity.sophos.com\/2022\/03\/16\/russian-actors-bypass-2fa-story-what-happened-and-how-to-avoid-it\/<\/a><\/p>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1\">(6) <a href=\"https:\/\/www.youtube.com\/watch?v=pMPhBEoVulQ&amp;t=102s\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=pMPhBEoVulQ&amp;t=102s<\/a><\/p>\n\n\n\n<p>(7) <a href=\"https:\/\/www.ft.com\/content\/0aa7a6e0-ca52-11e9-af46-b09e8bfe60c0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ft.com\/content\/0aa7a6e0-ca52-11e9-af46-b09e8bfe60c0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While it is true that this attack was carried out while being funded by the Russian government, it was an attack that occurred back in May 2021 while only just recently being reported on so it would have little to do with the recent political conflicts involving Russia. The FBI and the CISA (Cybersecurity and &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/03\/19\/another-russian-cyber-attack\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Another Russian Cyber Attack!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":300,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-2728","post","type-post","status-publish","format-standard","hentry","category-cpsc-329-602-w22","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"David Escarcia Rodriguez","author_link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/author\/david-escarcia-rodriguez\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/2728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/users\/300"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/comments?post=2728"}],"version-history":[{"count":6,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/2728\/revisions"}],"predecessor-version":[{"id":2737,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/2728\/revisions\/2737"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/media?parent=2728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/categories?post=2728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/tags?post=2728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}