Unruly USB: Devices Expose Networks to Malware

Page created by Marshall Townsend
 
CONTINUE READING
Unruly USB: Devices Expose Networks to Malware
Unruly USB: Devices Expose Networks
to Malware
It’s pretty easy for organizations to get so wrapped up about what goes out on USB

drives that they forget to protect against what comes in their environments via

USB. And with attacks inflicting increasingly greater damage following

uncontrolled connection, it’s time that organizations got serious

about this threat.

                                                                                     February 2011
                                                                                       WP-EN-02-14-11
Unruly USB: Devices Expose Networks to Malware
Unruly USB: Devices Expose Networks to Malware

 Introduction
 The news today is chock full of stories about sensitive
 information being carried out the institutional perime-
                                                                                       » It’s Not Just USB
 ter on ‘simple’ USB devices. These powerful portable
                                                                                         While we’ve focused much of our attention on the
 drives rightfully worry IT as a means for devastating
                                                                                         ubiquitous USB flash drive, organizations need to
 data loss at the hands of malicious insiders. But it’s
                                                                                         think about threats that extend from all forms of re-
 pretty easy for organizations to get so wrapped up
                                                                                         movable media in use today. These include:
 about what goes out on USB drives that they forget to
                                                                                            »» CD drives
 protect against what comes in their environments via
                                                                                            »» DVD drives
 USB. And with attacks inflicting increasingly greater
                                                                                            »» Blu-ray drives
 damage following uncontrolled connection, it’s time
                                                                                            »» FireWire
 that organizations got serious about this threat.
                                                                                            »» eSATA connected devices
                                                                                            »» Consumer products such as picture frames

                                                                                                                                         »
 After all, according to researchers, as many as one
 in four malware attacks1 is carried out through a USB
 device. In the past year, we’ve seen Stuxnet raise its
 ugly head and Conficker continue to circulate through
 the USB vector. Recently the US Army admitted that
                                                                                    Evolution of USB as an
 an infected USB stick was responsible for causing
 one of the biggest cybersecurity breaches in military
                                                                                    Attack Vector
                                                                                    The more users depend on USB and portable de-
 history. And yet the proliferation of USB devices only
                                                                                    vices to store and move data, the more tantalizing
 continues to skyrocket by billions each year.
                                                                                    a target these devices become for hackers look-
                                                                                    ing for an easy way to infect a large number of
 In order to keep organizations secure from threats, IT
                                                                                    machines. And as the USB format becomes more
 departments must bring greater scrutiny and control
                                                                                    complex with a greater number of features to ex-
 over how the network is exposed to potentially infect-
                                                                                    ploit, the bad guys are finding increasingly creative
 ed portable payloads. But let’s get real: they can’t
                                                                                    ways to use USB against their victims.
 do so by gluing USB ports shut. Portable devices as
 business tools are here to stay. IT leaders who refuse
 to recognize that fact will be seen throughout their or-
 ganizations as inhibitors to success. The key to USB
 security is balancing productivity with protection.

 1.   ComputerWorld, 1-in-4 worms spread through infected USB devices, Gregg Keizer (August 26, 2010)                                            1
Unruly USB: Devices Expose Networks to Malware
Unruly USB: Devices Expose Networks to Malware

»Why USB Malware Is
                                                                                      But as USB platforms evolved, so did the attack
                                                                                      methods. Functionality enhancements opened up
                                                                                      new possibilities for hackers.                   For example, Win-
                                                                                      dows Autorun made it simpler for users to gain im-
 So Successful                                                                        mediate access to the contents of their drives but
 According to analysts at In-Stat, by 2012 the                                        also enabled hackers to write code that could initi-
 market will ship over 4 billion USB-enabled de-                                      ate without user intervention. And platforms such as
 vices per year. From the establishment of the                                        the U3 smartdrive platform made it possible to run
 USB 1.0 standard to the roll-out of iPods and                                        applications directly from the drive, giving hackers
 thumb drives, and all the way through the de-                                        another potentially untraceable attack vehicle.
 velopment of USB 3.0-enabled mega-storage
 devices, portable device innovation has always                                       Some of the most public early successes by malware
 been about speed, capacity and convenience.                                          distributors using evolved USB as a vector came
 This has meant great things for the business                                         several years ago with the eruption of Conficker.
 world, which leverages these devices for in-                                         One of the major variants of this devastating worm
 credible productivity gains.                                                         used USB propagation to great effect, explains re-
                                                                                      searchers in a recent SRI International Report:
 But the standard’s successful proliferation has
 also made it a prime target for malware devel-                                             “Conficker B copies itself as the auto-
 opers. It’s a matter of simple mathematics. The                                            run.inf to removable media drives in the
 more devices out in the wild, the more likely an                                           system, thereby forcing the executable
 attack will find fertile ground for propagation.                                           to be launched every time a remov-

                                                                  »
                                                                                            able drive is inserted into a system. It
                                                                                            combines this with a unique social-en-
                                                                                            gineering attack to great effect. It sets
                                                                                            the “shell execute’’ keyword in the auto-
 Early on, USB malware was exploratory and ex-
                                                                                            run.inf file to be the string “Open folder
 perimental. Most of all it was just, well, random.
                                                                                            to view files’”, thereby tricking users into
 Hackers would find ways to get malware files onto
                                                                                            running the Autorun program.” 2
 drives--either online or even manually--and cross
 their fingers in hope that the intended victim clicked
 the files to initiate infection.

 2.   SRI International, An Analysis of Conficker’s Logic and Rendezvous Points, Phillip Porras, Hassen Saidi and Vinod Yegneswaran (March 2009)
                                                                                                                                                           2
»
Unruly USB: Devices Expose Networks to Malware

 This manipulation of Autorun is a common theme
 with many malware variants that plague IT envi-
 ronments today. For example, the SillyFDC worm
                                                                                          USB Malware in the Headlines
 that infected Army systems in 2008 used a similar
                                                                                          As an example of just how easily malware can
 method. Any USB device connected to an infected
                                                                                          propagate through USB, at a 2010 conference
 machine would become infected and then would in-
                                                                                          a major software company unknowingly gave
 fect any other machine to which it was connected;
                                                                                          away informational USB drives that were in-
 then that machine would begin infecting other USB
                                                                                          fected by an Autorun worm. The kicker? The
 devices plugged into it. This is how the malware
                                                                                          conference in question was the Australian Com-
 is able to move from machine to machine via USB
                                                                                          puter Emergency Response Team (AusCERT)
 devices and this “worm like” malware propagation
                                                                                          2010 conference, a security conference. 3

                                                                                                                                      »
 method copies itself to all available drives, shares,
 removable media and peer-to-peer software appli-
 cation file folders.

 This can greatly increase the exposure surface of                                   In addition to propagating malware, USB drives
 an organization that may otherwise have its net-                                    have also proven to be exceptional hacking plat-
 work security bases covered. In fact, Microsoft re-                                 forms for those attackers with physical access to
 cently announced its findings that Windows XP us-                                   corporate machines. One of the many legitimate
 ers were 10 times more likely to get infected when                                  useful features of USB drives is their ability to act
 faced with such an attack.                                                          as a “PC on a stick” through the use of certain plat-
                                                                                     form and virtualization utilities such as BartPE/
                                                                                     PeToUSB, UBCD4, UNetBootin and MojoPac. But
                                                                                     again, this legitimate use can also be used for dark
                                                                                     purposes. It also makes it possible for malicious
                                                                                     users to replicate their entire Windows hacking lab
                                                                                     with a USB device and run it on virtually any PC
                                                                                     with an available USB port. When the malicious
                                                                                     user is done, she simply removes the USB device
                                                                                     and leaves without a trace.

                                                                                                                   Continued »
 3.   SC Magazine US, IBM distributed infected USB drives at conference, Angela Moscaritolo (May 24, 2010)
                                                                                                                                             3
Unruly USB: Devices Expose Networks to Malware

 Stuxnet Crisis
 In 2010, the IT community witnessed how dangerous USB-propagated malware truly can be when the Stux-
 net family of Trojans 4 came to light. Uncovered by researchers in the summer of 2010, Stuxnet was found
 to be primarily spread by USB. Unlike many previous USB worms that depend on the Windows AutoRun
 feature to allow the virus to load onto a machine, Stuxnet was different. This worm took advantage of a vul-
 nerability in shortcut (.lnk) files put on the infected drive.

 A user could infect a machine just by browsing drive files within Windows Explorer. The malware was able to
 take advantage of Windows’ process of loading display icons for .lnk files. As soon as the user browses the
 USB drive and the machine tries to render the files, the malware hijacks the process and initiates infection.
 At no point does the user ever need to launch a file, either manually or through AutoRun.

      stuxnet
                               Search
      Stuxnet-related search
      strings can lead users to any
      of the following payloads:

                                                   Some malicious URLs                    Some malicious URLs       Some malicious URLs
                                                   lead to sites that exploit             lead to the download of   lead to the download of
                                                   CVE-2010-0886 and                      TROJ_FAKEAV.SMZU          TROJ_CODECPAY.AY
                                                   CVE-2010-1885

 While it soon became apparent that Stuxnet posed very little threat to the typical IT environment--the virus
 was extremely targeted to attack industrial control systems--its attack methods should act as a striking
 warning of the types of USB-propagated attacks that we should expect in coming years.

       “The Stuxnet worm is a clever, complex example of a targeted threat. But security man-
       agers should not make the mistake of thinking that this level of malware — or the even
       more sophisticated attacks to come — requires state sponsorship,” John Pescatore and
       Earl Perkins wrote in a Gartner brief. “This attack represents an innovative combination
       of techniques that have already been used in financially motivated cybercrime attacks.” 5

 4.   Microsoft, Malware Protection Center, Research Trojan:WinNT/Stuxnet.B
 5.   Gartner, Don’t Think Targeted Attacks Like Stuxnet Can’t Hit You (September 2010)                                                       4
Unruly USB: Devices Expose Networks to Malware

 Balancing USB Usefulness                                                            USB Security Best Practices
 with Protection                                                                     So what exactly does it take to change our trust
                                                                                     models? It starts with smart policy development.
 It is now difficult to return to the days of yore when
                                                                                     Some key policies that organizations should con-
 IT administrators would simply glue USB ports
                                                                                     sider to reduce their risks right off the bat include:
 shut and call their endpoints secure. USB devices
 are an everyday necessity whether you’re running
                                                                                        »» Ensuring common PC and laptop configurations
 a mom-and-pop business, a corporate office or a
                                                                                            have AutoRun features disabled, limiting the
 government department.
                                                                                            efficacy of USB malware that depends on this
                                                                                            feature to run and to propagate.
 The truth is that portable devices have done great
                                                                                        »» Requiring timely installation of security updates
 things for the business world, which leverages
                                                                                            in order to minimize the risk of USB-borne
 these devices for incredible productivity gains. A
                                                                                            malware taking advantage of unpatched
 late 2010 survey found that all of nearly 230 work-
                                                                                            endpoint vulnerabilities.
 ers surveyed own at least one USB flash drive and
                                                                                        »» Limiting access of USB and portable
 more than half own three to six of these devices.
                                                                                            devices to registered devices only, enabling
                                                                                            better control over who, when and how devices
 Today’s workers can now use ultra-portable flash
                                                                                            are being utilized.
 drives to easily transfer large amounts of data be-
                                                                                        »» Preventing the initiation of some or all
 tween locations. They can use these same devices
                                                                                            executables from portable devices, blocking
 to store important presentation information while
                                                                                            malware from running in the first place.
 on the road at conferences and sales meetings.
                                                                                        »» Requiring strong passwords (and not allowing
 And large organizations can quickly disseminate
                                                                                            the use of default passwords) throughout your
 information to a large number of customers or em-
                                                                                            infrastructure to prevent worms such as Stuxnet
 ployees by uploading data to USB devices and dis-
                                                                                            from working their way further into systems.
 tributing them to the right people.
                                                                                        »» Requiring proper, up-to-date AV and firewall
                                                                                            usage to prevent malware from gaining a
       “The issue isn’t USB ports or flash
                                                                                            foothold within the endpoint and spreading to
       drives. We need USB – keyboards and
                                                                                            other systems in the network.
       iPods don’t work without USB. And
       flash drives have their place,” writes
                                                                                     While the first battle in the war against mobile mal-
       John Kindervag of Forrester Research.
                                                                                     ware starts with the development of clear, in-depth
       “The solution isn’t to ban all flash drives
                                                                                     policies regarding the use of removable devices
       or to buy glue; the solution starts with
                                                                                     and media, the ultimate fight still remains. None
       changing our Trust Model.” 6
                                                                                     of those policies amount to much without solid en-

 6.   Forrester Research, Go Long on Glue Manufacturers, John Kindervag (August 25, 2010)
                                                                                                                                               5
Unruly USB: Devices Expose Networks to Malware

 forcement. Unfortunately, most organizations have                 Organizations should also widen the lens a bit and
 not yet gotten that message. A recent Ponemon                     think about more than just simple device control.
 Institute study found that only 26 percent of organi-             Defense-in-depth should play a role in risk mitiga-
 zations utilize device control to put real ‘teeth’ into           tion. For example, intelligent whitelisting technology
 their policy enforcement.             7
                                                                   can help prevent the initiation of risky applications
                                                                   running on the endpoints by controlling the trust fac-

 Enforcement: Putting Teeth in Policies                            tors that enable execution, such as code source, who
                                                                   authorized the application, whether it is running on
 By enforcing usage policies for removable devices
                                                                   other stable systems within the network and from
 such as USB flash drives and other removable me-
                                                                   where the application originated. And the use of en-
 dia such as CDs / DVDs, you can control the flow
                                                                   cryption to augment defenses could make network
 of inbound and outbound data from your endpoints.
                                                                   assets less attractive to potential attackers.
 Devices that are not authorized should simply not be
 allowed to execute. Ideally, organizations should look
                                                                   Finally, organizations should consider revisiting end
 for tools and develop processes that enable them to
                                                                   user training to ensure they’re covering the risks
 quickly establish and enforce device control policies
                                                                   posed by USB devices. That one-time discussion on
 as simply and as methodically as possible. The idea
                                                                   the first day at work has likely been long forgotten by
 is to enable users to continue to use approved de-
                                                                   most employees and is undoubtedly obsolete anyway.
 vices without resorting to an outright blanket ban.

                                                                   After all, these workers really are your first, last and
 Policies should be manageable by user or user group
                                                                   best defense against USB attacks. That’s why IT pro-
 as well as by computer, and organizations should look
                                                                   fessionals need to remember that in order to win over
 for capabilities that enable user groups to be immedi-
                                                                   the hearts and minds of these line-of-business users,
 ately associated with devices “on-the-fly.” The goal is
                                                                   they’ll need to institute policies and practices that don’t
 to dramatically simplify the management of endpoint
                                                                   adversely affect these workers’ daily productivity. This
 device resources through improved tracking of who,
                                                                   means taking control of USB device usage without
 when and how devices are being used. By validating
                                                                   stooping to wholesale purchases of superglue.
 removable devices as they are used within the enter-
 prise, you can prevent malware from being introduced
                                                                   By developing policies and implementing solutions
 into the network. This includes assigning permissions
                                                                   that enable a more flexible but easily trackable envi-
 for authorized removable devices and media to individ-
                                                                   ronment, IT departments become partners in security
 ual users or user groups and controlling the uploading
                                                                   and business success rather than technology mall
 of unknown or unwanted files from removable devices.
                                                                   cops to be disregarded at all costs. Enterprises with
                                                                   such forward-looking technology decision-makers will
                                                                   gain a decisive productivity advantage while protect-
                                                                   ing their organizational endpoints.

 7.   Ponemon Institute, State of Endpoint Risk 2011 (Nov. 2010)
                                                                                                                                 6
Unruly USB: Devices Expose Networks to Malware

 About Lumension Security, Inc.
 Lumension Security, Inc., a global leader in operational end-

 point management and security, develops, integrates and mar-

 kets security software solutions that help businesses protect

 their vital information and manage critical risk across network

 and endpoint assets. Lumension enables more than 5,100 cus-

 tomers worldwide to achieve optimal security and IT success

 by delivering a proven and award-winning solution portfolio that

 includes Vulnerability Management, Endpoint Protection, Data

 Protection, and Compliance and Risk Management offerings.

 Lumension is known for providing world-class customer support

 and services 24x7, 365 days a year. Headquartered in Scotts-

 dale, Arizona, Lumension has operations worldwide, including

 Florida, Texas, Luxembourg, the United Kingdom, Germany, Ire-

 land, Spain, France, Australia, and Singapore. Lumension: IT Se-

 cured. Success Optimized.™ More information can be found at

 www.lumension.com.

 Lumension, Lumension Patch and Remediation, Lumension

 Vulnerability Management Solution, “IT Secured. Success

 Optimized.”, and the Lumension logo are trademarks or

 registered trademarks of Lumension Security, Inc. All other

 trademarks are the property of their respective owners.

 Global Headquarters
 8660 East Hartford Drive, Suite 300
 Scottsdale, AZ 85255 USA
 phone: +1.888.725.7828
 fax: +1.480.970.6323

 www.lumension.com
 Vulnerability Management | Endpoint Protection | Data Protection | Compliance and IT Risk Management   7
You can also read