www.darkreading.com
Open in
urlscan Pro
2606:4700::6810:ddab
Public Scan
URL:
https://www.darkreading.com/vulnerabilities-threats/cisa-takedown-ivanti-systems-is-wake-up-call
Submission: On July 10 via manual from CA — Scanned from CA
Submission: On July 10 via manual from CA — Scanned from CA
Form analysis
0 forms found in the DOMText Content
Dark Reading is part of the Informa Tech Division of Informa PLC Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726. Black Hat NewsOmdia Cybersecurity Newsletter Sign-Up Newsletter Sign-Up Cybersecurity Topics RELATED TOPICS * Application Security * Cybersecurity Careers * Cloud Security * Cyber Risk * Cyberattacks & Data Breaches * Cybersecurity Analytics * Cybersecurity Operations * Data Privacy * Endpoint Security * ICS/OT Security * Identity & Access Mgmt Security * Insider Threats * IoT * Mobile Security * Perimeter * Physical Security * Remote Workforce * Threat Intelligence * Vulnerabilities & Threats World RELATED TOPICS * DR Global * Middle East & Africa See All The Edge DR Technology Events RELATED TOPICS * Upcoming Events * Podcasts * Webinars SEE ALL Resources RELATED TOPICS * Library * Newsletters * Podcasts * Reports * Videos * Webinars * Whitepapers * * * * * Partner Perspectives: * > Microsoft SEE ALL * Vulnerabilities & Threats * Cyberattacks & Data Breaches CISA TAKEDOWN OF IVANTI SYSTEMS IS A WAKE-UP CALLCISA TAKEDOWN OF IVANTI SYSTEMS IS A WAKE-UP CALL The exploitation of vulnerabilities in Ivanti's software underscores the need for robust cybersecurity measures and proactive response strategies to mitigate risks and protect critical assets. Charles Herder, Co-Founder, Badge Inc. July 9, 2024 4 Min Read Source: Simon Dannhauer via Alamy Stock Photo COMMENTARY In the wake of the attack on Ivanti's asset management software, which prompted decisive action from the Cybersecurity and Infrastructure Security Agency (CISA), what can we learn? This incident raises new questions about exploit techniques, organizational response to security breaches, and the skyrocketing cost of downtime. First, let's break down what happened. From what's been disclosed, the vulnerabilities in Ivanti's system, particularly its VPN gateway, enabled threat actors to bypass authentication and gain unauthorized access. By sending maliciously crafted packets to the VPN gateway, attackers had a free pass to infiltrate the system without needing to steal credentials. Once inside, they could export user credentials — including domain administrator credentials. Attackers also exploited a second vulnerability to inject malicious code into the Ivanti appliance, allowing them access to the VPN persistently (e.g., maintaining malicious control despite reboot or patch). An attacker's persistent access to a VPN gateway is especially dangerous because the attacker can now move laterally within the VPN, using the gateway’s trusted position to gain access to critical credentials and data. The bottom line: An attack compromising the VPN is bad, but here, the attack enabled the takeover of stored privileged administrative account credentials, which is much worse. In response, CISA intervened to let organizations know they should assume the theft of critical credentials given the nature of the breach. The bigger concern was Ivanti's apparent failure to detect the compromise, leaving attackers free to operate within a trusted zone, bypassing zero-trust principles, and posing heightened risks to sensitive data. Prompted by the severity of the vulnerabilities and potential for widespread exploitation, CISA took further action by taking two of Ivanti's systems offline. This is an unusual safeguard that was made after careful assessment of the damage and risk. CISA correctly concluded that the risk of theft of privileged administrative credentials stored in trusted enclaves was much greater than the downside of complete shutdown. The calculus was that safeguarding the system's crown jewels, the most powerful credentials, required immediate action to minimize the blast radius of the breach, since they could not be sure they could operate the system securely. As it turns out, Ivanti later clarified that patches could have been deployed discreetly, which would have prevented the need for an entire system downtime. This miscommunication highlights the importance of having clear open channels during a crisis. Mixed messages cause unnecessary chaos. MEASURING HARD AND SOFT COST Entire system level downtime is costly. The IT resources required to securely and smoothly administer shutdown and recovery often are compounded by the losses incurred from complete outages of services, user downtime, and downstream effects (such as customers or dependent organizations that experience service outages). Not to mention the reputational and service level agreement considerations. In Ivanti's case, we may never really know the exact cost. At the high end, assuming a VPN is mission critical for a portion of the workforce, downtime is a stop-work scenario for that user population and is therefore very expensive. Downstream customers, businesses, and users are also affected. This should be a warning to those of us addressing the aftermath of an attack in terms of weighing the risk "wake" that is likely to result in downtime costs. CISA’s downtime to risk calculation was founded on assessing the "blast radius" of the attack. In this case, lateral movement from the VPN gateway was relatively easier because of the gateway's naturally trusted position, and the ability of the attacker to export stored credentials — including for privileged accounts. The blast radius of this breach was especially large because attackers were able to steal stored credentials and use them to move laterally. Minimizing blast radius of attacks is achieved by building systems using the principle of least privilege (e.g., zero trust). However, a service that stores credentials is inherently one of the — if not the — most trusted service in any given system. It is therefore not surprising that CISA made the call to shut it down, rather than risk further compromise. So, what's the takeaway? The exploitation of vulnerabilities in Ivanti's software is a reminder of the threat facing organizations in the digital age. It underscores the need for robust cybersecurity measures and proactive infrastructure design and response strategies to mitigate risks and protect critical assets. Reducing the number of high value targets in IT infrastructure is an important step that minimizes the blast radius of attacks and can therefore reduce the need for broad shutdowns when attacks do happen. Privileged account credentials and stored keys are among the highest value targets, and IT leaders should accelerate adoption of strategies and technologies that minimize or eliminate such targets. As organizations navigate the aftermath of this incident, collaboration, clear communication, and continuous vigilance is essential in safeguarding against future threats. ABOUT THE AUTHOR(S) Charles Herder Co-Founder, Badge Inc. Dr. Charles Herder is a recognized and published thought-leader in cryptography and embedded systems, and has been an invited speaker at the Global Cyber Innovation Summit, the De Vinci Innovation Center, the Advanced Cyber Security Center, TU Automotive, and MIT. An expert in cryptography, systems security, and AI and quantum computing, Dr. Herder has four degrees from the MIT, including a Ph.D. in Electrical Engineering and Computer Science. Dr. Herder has worked on embedded systems security at Texas Instruments, launched a cybersecurity company that was acquired by a public company leader in network assurance, and most recently is the Co-Founder of Badge Inc., the award-winning privacy company enabling Identity without Secrets™. See more from Charles Herder Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe You May Also Like -------------------------------------------------------------------------------- Vulnerabilities & Threats Are You Affected by the Backdoor in XZ Utils? Vulnerabilities & Threats We're at a Pivotal Moment for AI and Cybersecurity Vulnerabilities & Threats PoC Exploits Heighten Risks Around Critical New Jenkins Vuln Vulnerabilities & Threats Critical Bluetooth Flaw Exposes Android, Apple & Linux Devices to Takeover More Insights Events * Black Hat USA - Aug 3-8 - The Premier Technical Cybersecurity Conference - Learn More August 3, 2024 * Black Hat Europe - December 9-12 - Learn More December 10, 2024 * SecTor - Canada's IT Security Conference Oct 22-24 - Learn More October 22, 2024 More Events EDITOR'S CHOICE Chinese flag with lines of computer code superimposed on top Vulnerabilities & Threats Patch Now: Cisco Zero-Day Under Fire From Chinese APTPatch Now: Cisco Zero-Day Under Fire From Chinese APT byElizabeth Montalbano, Contributing Writer Jul 2, 2024 5 Min Read Key surrounded by various security icons, dark blue digital background Сloud Security Passkey Redaction Attacks Subvert GitHub, Microsoft AuthenticationPasskey Redaction Attacks Subvert GitHub, Microsoft Authentication byTara Seals, Managing Editor, News, Dark Reading Jul 2, 2024 8 Min Read Intel Core desktop processor with Alder Lake architecture Endpoint Security Intel CPUs Face Spectre-Like 'Indirector' Attack That Leaks DataIntel CPUs Face Spectre-Like 'Indirector' Attack That Leaks Data byJai Vijayan, Contributing Writer Jul 3, 2024 4 Min Read Reports * 2024 InformationWeek US IT Salary Report * Elastic named a Leader in The Forrester Wave™: Security Analytics Platforms, Q4 2022 * 2023 Global Threat Report * EMA: AI at your fingertips: How Elastic AI Assistant simplifies cybersecurity * Zero Trust and the Power of Isolation for Threat Prevention More Reports White Papers * Continuous Asset Discovery Do and Don'ts * 2024 InformationWeek US IT Salary Report * Leveling Up Cyber-Threat Intelligence Maturity for More Value and Better Insights * Cisco Panoptica for Simplified Cloud-Native Application Security * ESG E-Book: Taking a Holistic Approach to Securing Cloud-Native Application Development More Whitepapers Events * Black Hat USA - Aug 3-8 - The Premier Technical Cybersecurity Conference - Learn More August 3, 2024 * Black Hat Europe - December 9-12 - Learn More December 10, 2024 * SecTor - Canada's IT Security Conference Oct 22-24 - Learn More October 22, 2024 More Events DISCOVER MORE WITH INFORMA TECH Black HatOmdia WORKING WITH US About UsAdvertiseReprints JOIN US Newsletter Sign-Up FOLLOW US Copyright © 2024 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. Home|Cookie Policy|Privacy|Terms of Use Cookies Button ABOUT COOKIES ON THIS SITE We and our partners use cookies to enhance your website experience, learn how our site is used, offer personalised features, measure the effectiveness of our services, and tailor content and ads to your interests while you navigate on the web or interact with us across devices. By clicking "Continue" or continuing to browse our site you are agreeing to our and our partners use of cookies. For more information seePrivacy Policy CONTINUE COOKIE POLICY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices