CyberWire Daily - SolarWinds through a first principle lens. [CSO Perspectives]

Episode Date: April 11, 2022

Enjoy this sample of CSO Perspectives, a CyberWire Pro podcast. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more. On this episode, host Rick Howard discusses if the ...first principles theories prevent material impact in the real world, such as the latest SolarWinds attack. Previous episodes referenced: S1E6: 11 MAY: Cybersecurity First Principles S1E7: 18 MAY: Cybersecurity first principles: zero trust S1E8: 26 MAY: Cybersecurity first principles: intrusion kill chains. S1E9: 01 JUN: Cybersecurity first principles - resilience S1E11: 15 JUN: Cybersecurity first principles - risk S2E3: 03 AUG: Incident response: a first principle idea. S2E4: 10 AUG: Incident response: around the Hash Table.  S2E7: 31 AUG: Identity Management: a first principle idea. S2E8: 07 SEP: Identity Management: around the Hash Table. Other resources: “A BRIEF HISTORY OF SUPPLY CHAIN ATTACKS,” by Secarma, 1 September 2018. “Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers,” by 365 Defender Research Team and the Threat Intelligence Center (MSTIC), Microsoft, 18 December 2020. “A Timeline Perspective of the SolarStorm Supply-Chain Attack,” by Unit 42, Palo Alto Networks, 23 December 2020. “Cobalt Strike,” by MALPEDIA. “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon,” by Kim Zetter, Published by Crown, 3 June 2014. “Cybersecurity Canon,” by Ohio State University. “FireEye shares jump back to pre-hack levels,” Melissa Lee, CNBC, 23 December 2020. "Implementing Intrusion Kill Chain Strategies by Creating Defensive Campaign Adversary Playbooks," by Rick Howard, Ryan Olson, and Deirdre Beard (Editor), The Cyber Defense Review, Fall 2020. “Orion Platform,” by SolarWinds. “Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers,” by Andy Greenberg, Published by Doubleday, 7 May 2019.  “Solarstorm,” by Unit 42, Palo Alto Networks, 23 December 2020. “The Cybersecurity Canon: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon,” by Rick Howard, The Cybersecurity Canon Project, 28 January 2015. “Using Microsoft 365 Defender to protect against Solorigate,” by the Microsoft 365 Defender Team, 28 December 2020. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the CyberWire Network, powered by N2K. Calling all sellers. Salesforce is hiring account executives to join us on the cutting edge of technology. Here, innovation isn't a buzzword. It's a way of life. You'll be solving customer challenges faster with agents, winning with purpose, and showing the world what AI was meant to be. Let's create the agent-first
Starting point is 00:00:30 future together. Head to salesforce.com slash careers to learn more. Clear your schedule for you time with a handcrafted espresso beverage from Starbucks. Savor the new small and mighty Cortado, cozy up with the familiar flavors of pistachio, or shake up your mood with an iced brown sugar oat shaken
Starting point is 00:00:52 espresso. Whatever you choose, your espresso will be handcrafted with care at Starbucks. Hey everyone, Rick here. Welcome to season four of the CSO Perspectives podcast. We have some interesting things planned for you this season. Of course, we're going to touch on the SolarWinds attack campaign. It will give us a chance to test our first principle theories and strategies. But we're also going to assess those same strategies for each of the big three cloud platforms. The Google Cloud Platform, or GCP, Microsoft Azure, and Amazon Web Services, or AWS. I'm basically learning as I go.
Starting point is 00:01:34 I can spell GCP, AWS, and Azure correctly, you know, three times out of five, but that's as far as it goes. I am one inch deep here. So buckle in and join me as we try to dig a little deeper on all of these topics. My name is Rick Howard. You are listening to CSO Perspectives, my podcast about the ideas, strategies, and technologies that senior security executives wrestle with on a daily basis. For the past year, I've been developing a set of cybersecurity strategy theories based on first principles. The key word in that description is, quote, theories, unquote.
Starting point is 00:02:17 After years of running around in the industry, working as a security executive, or advising the same, I have seen many things tried. Some have worked and some have failed. But that experience has allowed me to build this grand unifying theory about how to do cybersecurity in the future. The question that I've been asking myself this past year is, would it work? Would that set of theories prevent material impact in the real world? Would they have worked against the latest solar winds attack?
Starting point is 00:02:44 Let's find out. material impact in the real world? Would they have worked against the latest solar winds attack? Let's find out. Let's just say I'm the CSO of a medium to large-sized organization. With a nod towards the Iron Man and Avengers movies, let's call the company Stark Enterprises, you know, because I'm a nerd geek of the highest order. For the past year, the Stark Enterprise InfoSec team has pursued such goals as resilience, intrusion kill chain prevention,
Starting point is 00:03:18 zero trust, and risk forecasting. Although many more things remain to be done tactically, the executive team, you know, Tony Stark and Pepper Potts, have been pleased with the overall progress. For the sake of this exercise, assume we've deployed at least 50% for all four strategies, and then the SolarWinds incident hits us. Would those deployed first principle strategies have prevented a material impact to Stark Enterprises. The SolarWinds event has collected a growing list of campaign and adversary group names from various commercial security vendors. Dark Halo, named by Vilexity, SolarStorm, named by my old friends at Unit 42, Soloragate, named by Microsoft, UNC-2452, named by FireEye. For the purposes of this podcast,
Starting point is 00:04:08 I will use 2452 to refer to the adversary group and SolarStorm to refer to the campaign. Unfortunately, there have also been unsubstantiated preliminary reports attributing the attacks to APT-29, you know, Cozy Bear, aka the Russian Foreign Intelligence Service, or SVR. The fact is that the Solar Storm attack sequence matches none of the Cozy Bear known campaigns. As far as I can tell, the only previously known procedure deployed by 2452 was the use of a piece of malware called Cobalt Strike. Now, according to the wiki Malpedia, quote, Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an
Starting point is 00:04:51 agent named Beacon on the victim machine, unquote. Over the years, Cobalt Strike has been used by adversary groups from Russia, Vietnam, China, and Iran. It could be anybody at this point. But according to Recorded Future's John Wetzel, U.S. government officials will release technical evidence soon that will point to Russia. They haven't yet for fear of revealing sources and methods. Now, I understand about protecting sources and methods, but until somebody steps up and makes the evidence public, we just don't know. By the way, there's a way to do this without compromising your sources and methods, and the U.S. government has done it many times in the past.
Starting point is 00:05:29 They pass the technical evidence to the commercial security vendors, specifically the Cyber Threat Alliance. This group of roughly 30 security vendors with some of the best intelligence teams in the world will confirm the intelligence in their own product lines and make attribution assessments while they're doing it. This leads the government out of it and does not reveal their sources and methods. In other words, they point the vendors in the right direction and let them draw their own conclusions. The vendors find the evidence in their own data and the government
Starting point is 00:05:58 doesn't have to reveal how their intelligence groups discovered it. The U.S. government hasn't done that yet and that makes me suspect the validity of the Russian attribution claim. Don't get me wrong, it's probably the Russians. There are only a handful of nation states that have this kind of capability, and it feels like something the Russians have done in the past, you know, like sandworm. But also, so has China. Think OPM as a supply chain attack. But today, we are just not there yet in terms of actual evidence to prove a Russian attribution, at least in the public. The bottom line is that 2452 built the campaign almost entirely from scratch. A zero-day campaign, if you will. This is highly unusual.
Starting point is 00:06:44 For the past 10 years, most adversary groups, even the stealthy ones, haven't created brand new attack campaigns with original components for each phase of the intrusion kill chain. They haven't had to. Usually, they change the section of the attack sequence that doesn't work anymore because the victims have figured out how to block it, or the adversary group has innovated some better way to do it. To invent entirely new
Starting point is 00:07:05 attack campaigns is expensive and time-consuming. In that way, Solar Storm is on the same level of complexity and resource commitment as another famous zero-day campaign, the 2010 Stuxnet campaign. That cyber operation penetrated the Iranian nuclear plant in the Tans for the purpose of degrading the production of nuclear bombs. By creating a zero-day campaign, 2452 nullified a cornerstone pillar in our first principle cybersecurity strategy wall, intrusion kill chain prevention. That strategy leverages the observation that cyber adversaries don't typically do this, and it shifts the InfoSec teams away from blocking technical artifacts in isolation, like malware or zero-day exploits, with no context about what the adversary is trying to accomplish. The idea is that you deploy prevention and detection controls
Starting point is 00:07:56 for every tactic, technique, and procedure across the intrusion kill chain for all known campaigns. In that way, even if the adversary changes a specific TTP of the attack sequence and makes it invisible to threat hunters, the other prevention and detection controls still in place will prevent the success of the operation. You all probably know Ryan Olson. He is a friend and colleague and currently the Palo Alto Networks Unit 42 Intelligence Director. He and I wrote an entire paper on this concept that we published in the Cyber Defense Review this past fall. With a zero-day campaign like Solar Storm, that strategy doesn't work.
Starting point is 00:08:32 Stark Enterprises doesn't have any detection or prevention controls in place to stop the success of the operation because every step in the attack sequence is unknown except for the Cobalt Strike malware. That knowledge might be enough to stop this campaign, but probably not. We have to admit it, at the time of the solar storm attack, our intrusion kill chain prevention strategy most likely didn't prevent material impact
Starting point is 00:08:56 to Stark Enterprises. This leaves us with the other three first principle strategies, zero trust, resilience, and risk assessment, which some combination of those have prevented a material breach? Before we can answer that, we have to understand how the solar storm attack sequence worked. At least the parts we know about. In terms of the intrusion kill chain model, we know that at least one initial entry vector was a backdoor Trojan inserted into the SolarWinds Orion software platform and automatically delivered to roughly 18,000 SolarWinds customers as a software update. According to the SolarWinds website, Orion is an orchestration platform designed to manage the entire IT stack, from network performance to configuration to IP management, and so on. It's similar to security platforms like those offered by Fortinet, Checkpoint, and Palo Alto Networks,
Starting point is 00:09:58 but in this case, SolarWinds Orion, it's for IT orchestration. 2452 used a supply chain attack vector as the initial delivery mechanism. By supply chain, I mean that it didn't attack the victims directly. Instead, 2452 attacked a key software component, in this case Orion, that potential victims were likely to use. 2452 inserted some backdoor code into Orion, rode into the victim's network via the legitimate software update channel, and then used the backdoor to compromise its intended victims. There have been several supply chain attacks over the years, but arguably the two best known are, first, the 2013 Target cybercrime breach,
Starting point is 00:10:40 where the supply chain partner was Fazio Mechanical Services, Target's heating, ventilation, and air conditioning, or HVAC supplier. The second one was the 2017 Ukraine supply chain attack, better known as NotPetya, where the supply chain partner was Intellect Service, the maker of a financial software package called MEDOC, used by many Eastern European companies. The purpose of the supply chain attack was the Russians
Starting point is 00:11:05 conducting continuous low-level cyber conflict and influence operations against Ukraine. The other thing we know is that 2452 leveraged their victims' identity management systems. They managed to steal the secret key from an on-prem single sign-on management server responsible for federated accounts. In this case, where the victim was a
Starting point is 00:11:25 Microsoft customer, 2452 leveraged the Active Directory Federation Services server. Now, if you remember from Season 2, Episode 7 and Season 2, Episode 8, we talked about identity management and the federated model. We learned that you get this kind of transitive property of trust with federation. If the University of Michigan trusts Ohio State University, and Ohio State University trusted CISO Helen Patton, one of our hash table subject matter experts, then the University of Michigan trusts Helen. In other words, they believe it's her when she logs in, but they still authorize her access to U of M's resources locally. She doesn't get carte blanche access just because she's Helen. U of M decides that. 2452, through some process of Microsoft Active Directory privilege escalation,
Starting point is 00:12:13 stole the private key used to sign SAML tokens. SAML stands for Security Assertion Markup Language. Again, from the same two CSO Perspectives episodes, SAML refers to a heavyweight XML variant language that facilitates one computer to perform both authentication and authorization on behalf of other computers. 2452 then used that secret key to forge trusted authentication tokens for cloud resources. In other words, they stole the secret key from an on-prem server to create authorization tokens for virtual systems in the cloud. Now, this SAML technique isn't new. The NSA published an advisory on it back in 2017, noting that it has been used by both nation-state groups and other types of threat actors. Zero trust is the obvious strategy to leverage here. 2452 went after two systems that control key components of the Stark Enterprises network undercarriage, network management with the Orion orchestration platform and the identity management system with Active Directory Federation services.
Starting point is 00:13:24 Since Stark Enterprises is at least 50% complete on deploying the four-pillar first principle strategies, it is likely that the risk assessment strategy identified these two systems as warranting prioritization and special attention. With the zero-trust strategy, we are trying to reduce the Stark Enterprises attack surface by limiting employee access to only the resources they need to do their job and nothing more. It seems reasonable then that the Stark Enterprises InfoSec team would have greatly limited the number of employees who have access to those two systems. They might even have restricted the accounts further to people authorized to commit changes. Additionally, they would have insisted that the accounts used by those employees
Starting point is 00:14:05 weren't the accounts they use when they were doing their daily routines like reading email and surfing the web. And lastly, the Stark Enterprises InfoSec team would have probably established special monitoring for two processes, change to network configuration and creation of authorization tokens.
Starting point is 00:14:23 The monitoring process would ensure that somebody else knew about those operations and could verify that the task was done with the correct procedures. Think of it like the two-person control protocols used by the Air Force and others to control the launching of nuclear missiles. The Stark Enterprises InfoSec team would deploy all of these Zero Trust tweaks in an effort to reduce the probability of privilege escalation. That would have likely stopped the SolarStorm campaign.
Starting point is 00:14:49 On the other hand, I realize that this zero-trust plan has a lot of bureaucratic pieces to it. When the boss is breathing down your neck to get something done, most of us don't have time for that kind of nonsense. Before SolarStorm, as the CSO of Stark Enterprises, I might have assessed the probability of a zero-day campaign impacting the business as being pretty small. Supply chain attacks had happened before, for sure, but they weren't common. And with my intrusion kill train prevention strategy deployed at 50%, I might have been feeling pretty good about my chances. The epiphany for me,
Starting point is 00:15:22 though, is remembering the atomic cybersecurity force principle, the overriding essential element that drives the four pillar strategies. As the Stark Enterprise's CSO, I am trying to reduce the probability of material impact due to a cyber event. For any adversary trying to cause Stark Enterprise's harm, the crown jewels, so to speak, includes the identity system. If I don't lock that down, I open Stark Enterprises up to all kinds of trouble. By reducing the attack surface of network configuration changes and authorization token creation, I might prophylactically prevent many future known and unknown campaigns from being successful. And that way, establishing these bureaucratic zero-trust
Starting point is 00:16:02 procedures might be the very first thing I do. FireEye was the first commercial company that publicly admitted being a victim of the solar storm campaign. In season two, episode three and four, we talked about incident response and the executive decision about when to go public with breach information. There are basically two choices. You can announce early to get in front of the story, but risk public disfavor when additional information comes out later that might contradict your initial assessment. Or you can announce later when the information is almost perfect,
Starting point is 00:16:38 but risk public disfavor by being accused of withholding important information. The FireEye CEO, Kevin Mandia, decided to announce early. On 8 December, he told the world, and the company's stock price dropped from $15.51 to $13.54. Not a huge plunge, but it's still significant. But because of the way Mandia handled the announcement with complete transparency about how the company discovered the attack, how 2452 conducted their attack campaign against FireEye, and the sharing of the indicators of compromise that others could use to hunt for 2452 in their own environments,
Starting point is 00:17:14 the stock dip was a minor setback. And just before Christmas, the stock price rebounded to $24.84. So, FireEye lost about two bucks on the stock price immediately after the announcement, but gained just over nine dollars over the price before the announcement in just a couple of weeks. Now, the stock market is a crazy thing, and I defy anyone to explain how it really works. You know, in my last company, I remember we were all getting ready to go on Christmas break. This was a few years ago. The stock price was set at a certain value, and then everybody went on holiday. New Year's came and went. No work had been done in the interim, no major announcements or scandals or anything. But when the opening bell rang in the start of the new year,
Starting point is 00:17:54 the stock price plunged by like $25. Explain that. I think the most you can say about the FireEye stock price is that the way that FireEye managed the breach announcement at least contributed to this favorable response. There are other metrics that we might use to measure material impact that aren't public right now, like customer retention down the road and hitting their quarterly numbers at the next analyst call. For now, though, the way FireEye handled the announcement has been favorably received by the investment community, and the SolarStorm campaign hasn't had a material impact on the business. By executing a well-thought-out incident response plan, Kevin Mandia and his team made FireEye more resilient.
Starting point is 00:18:33 Microsoft followed the same playbook and got similar results. They lost about $6 on the stock price immediately after the announcement, but gained just over $9 over the price before the announcement. And it's interesting to note that there are potentially 18,000 other organizations that have decided to delay their breach announcement, including SolarWinds. The SolarWinds stock price has been slowly degrading since the announcement and has shown no signs of rising. As I'm saying this, their stock price has dropped about $9. Of the 11 commercial firms we know were touched by the
Starting point is 00:19:04 campaign, only FireEye and Microsoft made their public announcements early. Of the 11 commercial firms we know were touched by the campaign, only FireEye and Microsoft made their public announcements early. Down the road, we will see which strategy worked for these other solar storm victims. I think it will be years before we know the full extent of the attack sequence executed by 2452. We knew some of the sequence details for sure, mostly because they are so unusual.
Starting point is 00:19:27 But we by no means know the entire story of how the adversary group penetrated potentially 18,000 victims, nor what 2452 exfiltrated if they were successful. Going through the Stark Enterprises exercise, though, proved to me that our four-pillar cybersecurity first principle strategies are fundamentally sound. It also proved to me that you can't focus on one and not the other three. One of them, two of them, or even three of them are unlikely to be sufficient.
Starting point is 00:19:54 You have to do all four in order to protect Stark Enterprises. And that's a wrap. If you agree or disagree with anything I've said, hit me up on LinkedIn or Twitter, and we can continue the conversation there. Next week, I've invited the CyberWire's pool of experts to the hash table to discuss what they think about the SolarWinds incident and what strategies they recommend
Starting point is 00:20:20 that will defend Stark Enterprises in the future. You don't want to miss that. The CyberWire CSO Perspectives is edited by John Petrick and executive produced by Peter Kilby. Our theme song is by Blue Dot Sessions, remixed by the insanely talented Elliot Peltzman, who also does the show's mixing, sound design, and original score. And I am Rick Howard. Thanks for listening.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.