• @[email protected]
    link
    fedilink
    English
    248 hours ago

    Did people think that not connecting to a network was a magic technique that prevented infections from being spread on USB drives if you move them back and forth?

    • @[email protected]
      link
      fedilink
      English
      27
      edit-2
      7 hours ago

      It’s weird for the title to focus on the tools, and not the attack itself.

      Two attacks on production air-gapped networks, with different tools, from the same group, is pretty damn impressive. Especially for a group not backed by a nation-state.

      Edit: it sounds like this was a multi-stage attack…compromising a production non-airgapped internal system and using that to create the USB payload and later exfiltration. That’s pretty cool. The mule who brought the infected USB into the air-gapped space was likely none the wiser…the media had been written by them, to their own USB, and probably even hardware encrypted at rest (something like an Apricorn).

    • @[email protected]
      link
      fedilink
      English
      47 hours ago

      No but it’s a good start. The problem is that literally everyone would do it, from directors to the lowest paid people on the job. EVERYBODY does it. We detected and blocked, so then they started hardwire connecting to switches that they saw in offices. We had blocked those, so they started trying to connect to industrial switches out in the factories.

      It was maddening.

      • RubberDuck
        link
        English
        24 hours ago

        But switches have all ports set to shut and open ports bound to the device connected… or is this not common?

        • @[email protected]
          link
          fedilink
          English
          23 hours ago

          It depends on the environment for sure. That was standard at the end of my career but definitely not at the beginning.

  • @[email protected]
    link
    fedilink
    English
    349 hours ago

    It seems like they could be rendered ineffective by simply disabling auto run and forcing removable drives to mount noexec.

    • @[email protected]
      link
      fedilink
      English
      12 hours ago

      Yeah our corporate machines won’t run any external media. I assumed that was standard practice.

    • @[email protected]
      link
      fedilink
      English
      57 hours ago

      You would be shocked at the amount of times employees would bring devices into our air gapped network.

    • @[email protected]
      link
      fedilink
      English
      38 hours ago

      Well it’s believed it entices users to click the malware to run by disguising itself as the last accessed folder with the same name and folder icon.

      In that case having the option to always show extensions enabled would be helpful for trained users who care to be careful.

      It’s not that interesting sounding given we know the NSA and eyes countries have developed compromised firmware for certain hard drives to enable true spread without interaction or hope of prevention. Whenever I see one of these I wonder if it’ll be a case of compromising the device itself but it’s this old stuff instead which can be defeated with a good security posture.

      • @[email protected]
        link
        fedilink
        English
        117 hours ago

        Hidden file extensions is such a terrible default it amazes me that Microsoft is still doing that

      • @[email protected]
        link
        fedilink
        English
        36 hours ago

        When the drive is mounted noexec it’s not possible to run any programs on it. You can also mount any user writable directories noexec so they can’t copy the program somewhere else and run it.

  • @[email protected]
    link
    fedilink
    English
    87 hours ago

    Is this mitigated by blocking mass storage devices on all devices on the air gapped network? Seems like the minimum you would want to do on a network important enough to air gap.

    • @HC4L
      link
      English
      66 hours ago

      Depends. If you need updates on the software used in the air gapped network you won’t have lot of options. Burning cd’s doesn’t sound so crazy all of a sudden though…

      • @[email protected]
        link
        fedilink
        English
        105 hours ago

        Having worked in classified areas, both as an admin and an unprivileged user, CDs were normally the method of transferring data up the network. (Transferring down rarely occurred, and even then you’d be limited to plaintext files or printouts.)

        I’ve seen more places use data diodes to perform one- or two-way transfers so that requests can be streamlined and there’s no loose media to worry about tracking. It’s not super fast and higher speeds mean more expensive equipment, but it covers 98% of software update needs, and most non-admin file transfers were under 20MB anyways.

        Anything that did require a USB drive, like special test equipment (STE) or BIOS updates, had to use a FIPS-140-1 approved drive that offered a ready-only mode via PIN. This drive could only be written to from a specific workstation that was isolated from the rest of the machines (where data was transferred via CDs of course) and required two persons to perform the job to ensure accountability.

        Not the most time-efficient way of doing things, and not completely bulletproof, but it works well enough to keep things moving forward.

      • @[email protected]
        link
        fedilink
        English
        35 hours ago

        You can greatly reduce the attack surface by limiting device use to specific users or maybe even specific devices that are controlled.

      • @quixotic120
        link
        English
        15 hours ago

        I mean therein lies the problem. If you remove mass storage devices but allow cds then that’s just a different attack vector to exploit. You could potentially make it so there is no way to interface with any kind of storage but then when someone finds a way to break things open with a hid device you now have no practical way to fix the issue (plus working with the machine will be a nightmare)

        • @[email protected]
          link
          fedilink
          English
          12 hours ago

          No. This exploit worked because the medium is read-write. Once a disc is finalized, it cannot be written to. You can’t exfiltrate data via the CD.

          I’m sure there’s some modified CD burner out there that can write to a finalized disc, but this would only work where the air-gapped machine supports it, and also even has a drive that can write.

          • @quixotic120
            link
            English
            11 hour ago

            Unless it’s a rewritable cd, or the cd is the first step in a chain of exploits that allows write access on the usb ports used for peripherals so that an inside person could get away with a usb key or modified keyboard, or something else we can’t conceptualize but some group of well funded state actors can

        • @chaospatterns
          link
          English
          3
          edit-2
          4 hours ago

          CDs have an advantage over USB drives in that they can’t actually secretly be USB HID devices like a fake keyboard or mouse that runs a bunch of commands when it plugs in. It’s only a storage device.

          A super secure environment might then lock down all USB devices to ones known by them and then epoxy all ports and devices.

      • @[email protected]
        link
        fedilink
        English
        16 hours ago

        Wouldn’t you validate that update on a test machine in an isolated environment…like we’ve done since forever?

  • Optional
    link
    English
    58 hours ago

    Compromised air-gapped systems with http server and GoogleDrive?

    Saywhat?