-
Feature-rich is not always more desirable. Use equipment suitable for
the purpose.
Melissa and The Love Bug exploited the existence of
several features offered by application packages. Some organisations
will have a very specific need for these features. However this is
almost certainly not the case for all infected organisations. One of
the basic cautionary practices that organisations should have is that
if a feature is not required, then either do not install it or if
installation is mandatory, make sure it is turned off. Not all
organisations are able to omit or disable particular features. In
these cases there are options:
-
Use intense content filtering prior to delivery. This is an
attractive option as it can reduce the dependence on user awareness.
Some organisations report that they trap any mail attachments with any
executable code. There is a delay in mail delivery, but it does have
the benefit of helping to prevent, for example, attacks where the user
only needs to read the message (and not actually open the attachment)
for the attack to be successful.
-
Enable a feature on a case by case (e.g. message by message) basis,
with the feature turned off again when not required. Examples include
the Windows Scripting Host and application macros, and web-based
executable content such as Java and Javascript.
-
Generate similar functionality on a platform that is not at risk. For
example, some types of office applications are being developed for an
array of UNIX based operating systems. While there have been some
MIME-based attacks for UNIX platforms, they are rare.
Any option taken will be a function of the organisation's risk
assessment and management.
-
Convenience and ease of use does not equate to lowest Total Cost of
Ownership.
When evaluating IT equipment, the best option can easily appear
clear-cut for many valid tangible reasons. However, once delivery has
been taken of equipment, there are costs associated with maintenance,
and these can be non-trivial. In many cases, particular software and
hardware solutions may seem very cheap during the initial capital
outlay. However the evaluation process should include at least the
following issues:
-
How easy is it to update and configure the operating system, and how
granular is this control?
-
What is the vendor's track record with the emergence of security
issues?
-
How fast are they to respond to these issues?
-
How easy is it to obtain patches and install them?
-
What are the effects on other software on the system? On system
availability?
-
Are there any patches that introduce incompatibilities with other
patches or software?
-
Is the vendor's attitude "fix on fail" or "fix before fail"?
-
The market will get the security it asks for.
Software vendors are natural targets for the anger of victims when
they suffer an incident. AusCERT's experience is that a range of
vendors have at various times been targeted for criticism due to
implementation errors or configuration choices that have led to
security incidents.
In some cases this criticism is justifiable. However, there is
another dimension to this problem.
The software business, both operating system and application, is very
competitive. There are pressures on vendors to be first to market, to
offer feature-rich software that is interoperable with other common
packages, and to ensure maximum convenience for users. Their
performance in these areas feeds into the bottom line and therefore
affects the viability of the vendor's business.
Lost in this complex equation is the demand for security. Many
organisations (rightly) want robust systems that are or can be
installed with a secure configuration by default. However if this
desire isn't expressed by the client organisation to the vendor as a
purchasing criteria, then it is unlikely that the vendor will be
motivated to make any changes that threaten the other purchasing
criteria outlined above.
Anecdotal evidence from years of quietly expressed frustration among
technical staff suggests that the desire for secure default
configurations is a growing sentiment. However this sentiment must be
explicitly expressed as a purchasing criteria by potential purchasers
in a form that the savvy vendor can use as a marketing tool and an
edge in potential sales.
Vendors will always have demands to produce software that is
convenient straight off the shelf. A feature that security conscious
sites may wish to request is a simple installation interface that
allows for different secure levels of default installation. The types
of variables that may be affected by such a feature might be default
accounts, command or feature availability and power, and the
availability of some network services, for example. The choice of
requirement is then thrown to the client site.
-
Not all attacks can be repelled.
Not all attacks can be completely repelled. The DDOS attacks were
based on consumption of resources from an external source. This means
that no matter what steps a potential victim takes to defend itself,
any increase in capacity may be matched by an attacker attacking this
capacity from a domain beyond the control of the victim.
Melissa and The Love Bug were very different. These
tools exploited a configurable feature within the application suite of
the victim machines. The implications here are that the problem could
be completely repelled by the victim organisation within a domain
controlled by it.
-
Preparation for defence against potential attacks is essential.
Organisations should ensure that all software is subject to regular
backups and that maintenance cycles are regular and complete,
including application of patches. It is perhaps even more essential
that data backups are very regular - incremental backups on important
servers may take place hourly, for example. Additionally,
organisations should negotiate with network service providers ahead of
time to ensure that adequate controls can be implemented rapidly in
the event of DOS attacks.
-
A layered defensive strategy is essential.
Technical defensive measures are very important and are often a front
line of defence. Technical defensive measures must be implemented in
layers and making use of diversity, rather than reliance on a single
silver bullet.
-
Over-reactions can cause harm.
Melissa and initial versions of The Love Bug did not
exhibit mutating behaviour. Some reports occasionally confused the
idea of variants with the idea of mutation. This is very important.
A virus or tool with static content is much easier to identify than
one that changes its appearance with propagation. One of the reasons
why NewLove was a potentially more serious problem than the
Love Bug is because it had a mutating function which made it
potentially harder to detect. When organisations evaluate the threat
of a particular attack tool, this is one of the questions that must be
considered.
In an environment of hysteria or misinformation, it is very easy for
suspected behaviour to be "confirmed" without evidence, for threats to
be overemphasised, and for rumours to be regarded as fact. Be wary of
basing threat assessments on information delivered by a non-technical
messenger.
In determining the level of threat and appropriateness of response,
its important that staff who are able to understand the technical
issues are consulted before committing to any course of action.
For example, a number of organisations shut down mail hubs for various
periods of time. While such short-term outages are a reasonable step
while technical measures are implemented, they are an over-reaction if
implemented unnecessarily or on a long-term basis. It can send
negative messages to potential clients and partners.
-
Defensive implementation strategies have trade-offs.
A problem that can occur is that viruses can infect an array of
servers and workstations.
For example, assume that an organisation has been infected by a virus,
and that anti-virus software is installed on each system. The
anti-virus software must be manually updated in each case. During the
manual process of cleansing all machines, it is possible that
re-infection of a server can occur from a naive user using a
still-infected workstation. This makes widespread re-infection of
cleansed machines a distinct possibility.
This simple example demonstrates the trade-off that all organisations
must make - in this case a trade-off between risk and performance.
The organisation in question presumably made the choice to run
anti-virus software on each workstation because of performance reasons
or because of the possibility of introducing the virus through a
non-centralised path (eg an infected floppy disk or unsafe network
client).
There are several ways to attack this problem.
-
If anti-virus software is installed on all systems, there is a painful
manual cleansing and updating process that must take place. During
this time, the only protection against further infection is user
education or system unavailability.
-
A second alternative is to use memory-resident anti-virus software in
a central location, which can introduce performance issues. It may
also not cover non-centralised paths of infection.
-
A third alternative is to introduce a more centralised operating
environment where execution of software can only take place on a
server farm. This introduces capacity issues and a potential
single-point-of-failure.
There is no single correct answer, just the option that best suits
organisational process.
-
Digital signatures can be an important defence strategy.
If your mail recipients understand that all trustworthy mail from your
site is digitally signed and they receive mail from you that hasn't
been signed then this should arouse suspicion. This makes an
assumption that digitally signing a message requires a manual action
on the part of the user (such as entering a passphrase). If this
assumption is valid, then three new guards against these kinds of
attack come into play. First, if a user is requested to sign an
outgoing message that was automatically generated by some kind of
virus, then this should trigger suspicion. Second, if a user receives
a message that may have been generated by another organisation
indiscriminately as a result of this virus, then the absence of a
signature should arouse suspicion. Third, forged messages are also
caught.