lessons learned from an as/400 data breach

23
All trademarks and registered trademarks are the property of their respective owners. © HelpSystems LLC. All rights reserved. Carol Woodbury VP of Global Security Services Robin Tatam Director, Security Technologies Lessons Learned from an ”AS/400” Hack

Upload: helpsystems

Post on 16-Jan-2017

115 views

Category:

Technology


2 download

TRANSCRIPT

All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved.

Carol WoodburyVP of Global Security

Services

Robin TatamDirector, Security

Technologies

Lessons Learned from an ”AS/400” Hack

HelpSystems LLC. All rights reserved.

• An “AS/400” was hacked – as documented in the article, “smoke on the Water [plant] in the “Data Breach Digest” from Verizon.

Why are We Talking About This?

HelpSystems LLC. All rights reserved.

• A hacker was able to make use of a known vulnerability in the payment (credit card) software – Over 2.5 million records were exfiltrated

• The AS/400 administrator’s user id and password were stored in cleartext (and discovered) in an .ini file on a web server running on the AS/400. These were used to gain access to the Supervisory Control and Data Acquisition (SCADA) application which controls the community’s water supply. – The mixture of chemicals going into the water supply was manipulated,

affecting times to replenish water supplies • No network segmentation existed. The organization’s AS/400 was

directly attached to the Internet and the internal network was exposed.

What Happened?

HelpSystems LLC. All rights reserved.

Was this Incident a Failure of AS/400, iSeries, IBM i?

HelpSystems LLC. All rights reserved.

IBM i has a well-deserved reputation as one of the most securable operating systems on the market.

But, securable does not imply you simply plug the server in and don’t have to configure anything!

It takes a joint effort by:IBM (who supplies the OS),Your software vendors (who supply the application),And YOU (who has ultimate responsibility for the server and data)

“I Thought We Were Already Secure!”

Securable Secure

HelpSystems LLC. All rights reserved.

• Failure to:– Use the features readily available in IBM i– Follow any sort of security ‘best practices’

The write-up clearly pointed out that the single AS/400 administrator made no consideration for the security implications of the configuration settings chosen

– Keep applications patched– Use common sense!

So, what was the Cause?

HelpSystems LLC. All rights reserved.

Security Incidents by Attack Type, Time, & Impact

From the IBM X-Force Threat Intelligence Report 2016

HelpSystems LLC. All rights reserved.

HelpSystems Has Insight Into “AS/400”

HelpSystems LLC. All rights reserved.

Running at the Wrong Security Level

Source: PowerTech “State of IBM i Security” Study 2016

HelpSystems LLC. All rights reserved.

Far Too Many Powerful Profiles

Source: PowerTech “State of IBM i Security” Study 2016

HelpSystems LLC. All rights reserved.

Default Passwords

Source: PowerTech “State of IBM i Security” Study 2016

HelpSystems LLC. All rights reserved.

“New” Risks Are Often Not Considered

AV Scan on File OPEN

89%

11%

97%

3%

AV Scan on File CLOSE

Source: PowerTech “State of IBM i Security” Study 2016

HelpSystems LLC. All rights reserved.

248,095 Reasons To Scan Your IFS!

HelpSystems LLC. All rights reserved.

Unprotected Data

Application Security / Menu Security

ODBC, FTP. DDM, Sockets

Query / SQL

HelpSystems LLC. All rights reserved.

Unencrypted Sessions

FTPODBCDDMTelnetPassthruSNA connections

User: CJW Pwd: cjw

Salary: CJW SSN: 123-11-1234

HelpSystems LLC. All rights reserved.

Think ‘Sniffing’ Doesn’t Happen…?

Then you haven’t met this guy

HelpSystems LLC. All rights reserved.

Shares to /root or QSYS.LIB

Sharing /root shares QSYS.LIB

/QSYS.LIB contains all libraries on the system.

HelpSystems LLC. All rights reserved.

• OS level– e.g., Can’t get to TLS1.2 unless you’re at V7R1, TR6

• PTFs– Java PTFs are released quarterly

• iAccess -> Access Client Solutions (ACS)– Not supported on Windows 10– Can support / update as you would any other desktop application

Stay Current!

HelpSystems LLC. All rights reserved.

Start Somewhere – Even if It’s a Small Step!

HelpSystems LLC. All rights reserved.

Action Leads to Results

ReduceRisk

HelpSystems LLC. All rights reserved.

HelpSystems’ Solution-Based Approach

HelpSystems LLC. All rights reserved.

Data Security Life Cycle

HelpSystems LLC. All rights reserved.

Questions?

www.helpsystems.com/professional-security-services

www.helpsystems.com/powertech

800-328-1000 | [email protected]

Tools Services