[BreachExchange] Postmortem on U.S. Census Hack Exposes Cybersecurity Failures
Sophia Kingsbury
sophia.kingsbury at riskbasedsecurity.com
Thu Aug 19 11:27:11 EDT 2021
https://threatpost.com/postmortem-on-u-s-census-hack-exposes-cybersecurity-failures/168814/
Threat actors exploited an unpatched Citrix flaw to breach the network of
the U.S. Census Bureau in January in an attack that was ultimately halted
before a backdoor could be installed or sensitive data could be stolen,
according to a report by a government watchdog organization.
However, investigators found that officials were informed of the flaw in
its servers and had at least two opportunities to fix it before the attack,
mainly due to lack of coordination between teams responsible for different
security tasks, according to the report, published Tuesday by the U.S.
Department of Commerce Office of Inspector General. The bureau also lagged
in its discovery and reporting of the attack after it happened.
The report details and reviews the incident that occurred on Jan. 11, 2020,
when attackers used the publicly available exploit for a critical flaw to
target remote-access servers operated by the bureau.
Citrix released a public notice about the zero-day flaw—tracked as
CVE-2019-19781–in December. In January, a representative from the bureau’s
Computer Incident Response Team (CIRT_ attended two meetings in which the
flaw was discussed and attendees even received a link to steps to use fixes
which had already been issued by Citrix.
“Despite the publicly available notices released in December and attending
two meetings on the issue in January, the bureau CIRT did not coordinate
with the team responsible for implementing these mitigation steps until
after the servers had been attacked,” according to the report. Doing so
could have prevented the attack, investigators noted.
‘Partially Successful’ Attack
The Citrix products affected by the flaw–discovered by Mikhail Klyuchnikov,
a researcher at Positive Technologies—are used for application-aware
traffic management and secure remote access, respectively. At least 80,000
organizations in 158 countries—about 38 percent in the U.S.—use these
products, formerly called NetScaler ADC and Gateway.
The initial compromise at the Census Bureau was on servers used to provide
the bureau’s enterprise staff with remote-access capabilities to
production, development and lab networks. The servers did not provide
access to 2020 decennial census networks, officials told investigators.
“The exploit was partially successful, in that the attacker modified user
account data on the systems to prepare for remote code execution,”
according to the report. “However, the attacker’s attempts to maintain
access to the system by creating a backdoor into the affected servers were
unsuccessful.”
Attackers were able to make unauthorized changes to the remote-access
servers, including the creation of new user accounts, investigators
reported. However, the bureau’s firewalls blocked the attacker’s attempts
to establish a backdoor to communicate with the attacker’s external command
and control infrastructure.
Other Mistakes
Another security misstep the bureau took that could have mitigated the
attack before it even happened was that it was not conducting vulnerability
scanning of the remote-access servers as per federal standards and Commerce
Department policy, according to the OIG.
“We found that the bureau vulnerability scanning team maintained a list of
devices to be scanned,” investigators wrote. “However, the remote-access
servers were not included on the list, and were therefore not scanned. This
occurred because the system and vulnerability scanning teams had not
coordinated the transfer of system credentials required for credentialed
scanning.”
The bureau also made mistakes after the attack by not discovering nor
reporting the incident in a timely manner, the OIG found.
IT administrators were not aware that servers were compromised until Jan.
28, more than two weeks after the attack, because the bureau was not using
a security information and event management tool (SIEM) to proactively
alert incident responders of suspicious network traffic, investigators
found.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20210819/1f728b58/attachment.html>
More information about the BreachExchange
mailing list