STE WILLIAMS

HackerOne pays $20,000 bounty after breach of own systems

In an embarrassing twist, bug bounty platform HackerOne has paid a $20,000 reward to a researcher who reported a security flaw inadvertently caused by one of its staff during… a bug submission.

According to the company’s timeline, the bizarre incident happened on 24 November when one of its analysts tried to reproduce a security issue submitted by a registered community member called haxta4ok00.

After failing to reproduce the bug, the analyst opened a dialogue with the member during which parts of a curl command (curl is a command line tool used to fetch data from URLs) were accidentally included in a reply. That command disclosed a live session cookie. Session cookies are ‘keys’ that grant you access to a service after you’ve logged in, so having somebody’s session cookie is as good as having their password.

That gave haxta4ok00 access to all the customer reports handled by that analyst for the duration of that session, with the result that:

Sensitive information of multiple objects was exposed. During the timeframe the hacker had access, three different features were used to access sensitive information.

In other words, a security bug had occurred during the reporting of a security bug.

Twenty minutes after it happened, after poking around a bit, haxta4ok00 gave HackerOne the bad news about the breach.

Two hours after that, someone at HackerOne responded, revoking the vulnerable session cookie three minutes later.

What just happened?

On the face of it, the incident was simple human error. In comments to the BBC, HackerOne admitted:

Less than 5% of HackerOne programs were impacted, and those programs were contacted within 24 hours of report receipt.

Luckily, haxta4ok00 did the right thing and came clean about the bug they’d spotted. But judging from exchanges at the end of the advisory between HackerOne’s co-founder Jobert Abma and haxta4ok00, the bug spotter’s poke-about was troubling:

We didn’t find it necessary for you to have opened all the reports and pages in order to validate you had access to the account. Would you mind explaining why you did so to us?

To which, haxta4ok00, replies:

I did it to show the impact. I didn’t mean any harm by it. I reported it to you at once.

The learning

Marked as a critical vulnerability, haxta4ok00 was awarded the maximum bounty for that type of flaw – $20,000.

HackerOne has detailed several preventative measures, which include closing the potential vulnerability by limiting analyst sessions to the IP address from which they originate. And to reduce the time it takes to react to a critical report submission – a particular problem at weekends, as was the case here – it has decided to “move from a Slack notification to paging the on-call security person”.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/iDklXemCQZs/

Networking attack gives hijackers VPN access

Researchers have discovered a security flaw in macOS, Linux, and several other operating systems that could let attackers hijack a wide range of virtual private network (VPN) connections.

The bug, discovered by University of New Mexico researchers William J Tolley, Beau Kujath, and Jedidiah R. Crandall, lets a malicious access point or someone on the same network snoop on a user’s VPN session. The snooper can tell that they’re on a VPN and figure out what site they’re visiting. The researchers explain:

This provides everything that is needed for an attacker to hijack active connections inside the VPN tunnel.

The attack begins by working out the VPN client’s virtual IP address, which is the fake IP address that a VPN gives you when you use it to pretend that you’re somewhere else. It does this by sending SYN (short for synchronization) and ACK (short for acknowledgement) packets to the device. Because it doesn’t know the device’s exact address, it sends these packets to all addresses in the virtual IP space. When this noisy attack eventually hits the victim’s machine, it will respond with a reset (RST) packet that drops the connection.

That tells the attacker that the device is using an external network connection that gives it a virtual IP address. It can then send its own RST packets. The victim machine responds with a ‘challenge ACK’, inviting its VPN to set up a new connection, and the attacker can sniff out these packets by timing them and examining their size. By analysing the packets, it can determine the in-window sequence number of the connection, which tells it what type of VPN connection the victim is using.

From there, they can work out how to inject malicious packets into the VPN connection. An attacker could use those techniques to inject malicious code into a website that could help to compromise a browser.

The bug, CVE-2019-14899, works against a variety of VPN protocols including OpenVPN and IKEv2/IPSec, along with the young upstart WireGuard P2P protocol that is angling for inclusion in the Linux kernel. It exists in Linux distributions including but not limited to Ubuntu, Fedora, Debian, Arch, Manjaro, Devuan, MX Linux, and Void Linux. It also affects Slackware, Deepin, FreeBSD and OpenBSD, not to mention Android, MacOS, and iOS.

Having said that, not all system versions are affected. The researchers said that they couldn’t replicate it on Ubuntu versions before 19.10, for example, and point to a configuration update in systemd (the heart of the Linux kernel) made on 28 November 2018 as the likely culprit.

The researchers haven’t tested the vulnerability against the Tor onion routing protocol, which focuses on anonymous communications, but believe that this wouldn’t be vulnerable to the attack. That’s because Tor handles its authentication and encryption outside of the operating system kernel.

What to do

The researchers’ proposed workarounds all have problems. Turning reverse path filtering on (which would stop routing packets from inappropriate addresses) won’t solve the issue for all operating systems and the attack may still work anyway, the researchers said. Filtering bogus packets (known as bogon filtering) could interfere with local network addresses in some instances, they added.

The good news is that this is likely to be extremely hard for attackers to exploit – and those that would wish to have very little information to go on.

The best bet is to wait for a patch from your Linux distributor. The researchers have chosen not to publish a detailed paper on the hack until then.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/L7I8CdL_Udk/

Metasploit for drones? Best of luck with that, muses veteran tinkerer

Black Hat Europe A veteran drone hacker reckons the recent release of the Dronesploit framework won’t go down quite as its inventors hope.

Alexandre D’Hondt and Yannick Pasquazzo gave a quick talk about Dronesploit during Black Hat Europe, held in London last week.

The duo aim to produce a Metasploit-style CLI framework tailored for tinkering with everybody’s favourite unmanned flying objects. At the moment, they say their framework is able to sniff comms for “Wi-Fi controlled light commercial drones”, with plans to include radio-controlled drones and eventually “more complex” craft.

Although their presentation included a DJI-branded Tello drone, these are actually white-label products made by Chinese startup Ryze Robotics with a dollop of DJI branding, as the larger company’s online store makes clear.

During their Black Hat presentation, the Dronesploit devs gave a live demonstration of sniffing and deauthenticating WPA2-PSK credentials protecting the command-‘n’-control stream for a couple of quadcopters. These were of a type originally marketed by US-based Hobbico, which entered bankruptcy and was liquidated in 2018 – meaning there’s no obvious point of contact for reporting discovered vulnerabilities.

Most meaningfully, this means they don’t have any immediately actionable exploits for drones made by DJI, which will be what the market wants given DJI’s near-total dominance of the worldwide small drone market.

Veteran drone hacker Kevin Finisterre, having taken a poke around the Dronesploit GitHub, told The Register: “If it were me, I’d demo my hot sauce, not my weak sauce. They don’t appear to have any actual head busters writing exploits.”

This is a wonderful concept as a whole but it needs talent to support it being effective. Not saying these folks lack talent, but they need quite a bit of man muscle to make this viable.

Finisterre added that in his own drone-hacking research, including efforts to build a community around drone hacking, he had seen that it is “difficult to harness the drone community for free/open-source work” and said he’d be surprised if anyone were to donate “any valuable drone exploits that can be monetised”.

Clearly it’s early days for the Dronesploit devs.

Drone hacking focused on DJI products has a bit of a history. The company uses GitHub and fell foul of the classic “oops that shouldn’t be on there” mistake that we’ve seen penty of times before. It also rolled out a bug bounty programme in 2017, following numerous public vuln disclosures.

While the academic interest in drone hacking is high, the real-world consequences of drone misuse is becoming increasingly hard to ignore. ®

Sponsored:
Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2019/12/09/dronesploit_framework/

New: From the Core to the Edge: 7 Reasons You Need Security at the Edge

No longer can you secure the perimeter and trust that nothing will get in or out.

Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and live online. What’s more, the attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. Security is being redefined right before your eyes. That’s why you need to take security to the edge.

Download

(Registration required.)

Article source: https://www.darkreading.com/edge/theedge/new-from-the-core-to-the-edge-7-reasons-you-need-security-at-the-edge/b/d-id/1336488?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

4 Tips to Run Fast in the Face of Digital Transformation

This gridiron-inspired advice will guarantee your digital transformation success and keep your data safe.

Unlike the 16-game NFL season, for the eight in 10 companies in the US undergoing digital transformation (DX), there’s no off-season. The journey is an ongoing one that, for IT leaders, can feel like an endurance challenge, not to mention a massive expense, with DX spending predicted to reach nearly $2 trillion in 2022, according to IDC.

Application-centric visibility is key to accelerating DX. By better visualizing, isolating, and understanding application interaction and usage patterns, organizations can accelerate secure deployment of their digital applications and prompt touchdown dances for DX victories both small and large along the way. I mean, who doesn’t want to see a SecOps team do the Ickey Shuffle?

But getting there requires adapting to the speed of the game, or transforming rapidly, which isn’t an easy feat when DX involves complexities like public, private, and hybrid cloud infrastructure and a new breed of multitier applications need to be managed and secured. Much like a wide receiver making plays in double coverage, networking pros have to be able to run fast networks during DX while navigating everything from changing IT environments to regulatory challenges like the General Data Protection Regulation and security demands in the context of escalating cybercrime.

Here are four gridiron-inspired tips that can help see your way to DX success with data, guaranteeing a SecOps Gronk spike:

1. Create a championship culture from top to bottom.
Organizations can take a cue from great sports franchises that develop and maintain a winning culture. Digital transformation is a business imperative and, much like winning, is built on strong technology underpinnings, ultimately focused on driving the culture of the organization. It starts at the board and C-level team with a vision of what you want the company to be in five years and then determining whether or not you have the culture, people, and resources to get there. You have to deliberately become a data-driven culture in every aspect from top to bottom, and treat cybersecurity as a strategic business enabler rather than an obstacle, in order to win at DX.

2. See everything, all the time. 
Whether we’re talking turf or network, clear visibility of the traffic is just as important as any other technical skills. Like a pass rusher on the quarterback’s blind side, malware moves and data exfiltration happens across the network in stealth mode — not to mention the complexity of applications operating on-premises, in the cloud, or both. Having a clear line of sight into the organization’s network and application layers lets you visualize your infrastructure, what’s running on it, and how applications are performing and interacting with each other — and from there, extract kernels of insight to guide your DX efforts.

3. Handle complex schemes at top speeds.
Getting 53 professional athletes to master an NFL playbook comes with its challenges, not unlike wrangling the new breed of digital applications. Both require turning complexity into cohesion — and doing so fast. I’m referring to applications with multiple tiers (where each tier is scaled out and there’s a set of microservices), some of which are built in-house, others are built externally, and some come from open source. When the components are sandwiched together, complexity escalates rapidly, which ultimately manifests itself as challenges around securing the applications, as well as ensuring consistent performance and experience. The key to keeping things under control is having the right kind of data to help you understand the interaction, performance, and security characteristics of these applications.

4. Be a good halftime coach.
Good coaches make quick adjustments to position the team for second-half success. NetOps and SecOps teams can relate when it comes to troubleshooting, managing, and securing applications. Whatever the application architecture, once in deployment something at some point is bound to go awry. You need to figure out what’s happening and quickly course correct, but when you’re scaling microservices, it’s hard to troubleshoot just through application instrumentation. By analyzing the network traffic pertaining to these applications, you get immediate actionable data points that can be used to address trouble spots and understand security implications as well. The ability to isolate specific applications or microservices communication streams for deeper inspection would allow the security operations to easily understand access patterns and put in place effective micro segmentation strategies.

The NFL game is faster than ever, and the same can be said for the pace of digital business and the proliferation of cyber threats. The ability to the handle day-to-day challenges while positioning the organization for future success is only possible with the appropriate infrastructure in place. NetOps and SecOps teams are tasked with the development, implementation, maintenance, and security of very complex enterprise infrastructures that prepare their organization for tomorrow, much like NFL teams must draft and develop players for future success. Both must do so while reducing risks, costs, and security threats along the way. With the above-mentioned tips as the foundation of your journey, you can position your organization for success for seasons to come.

Related Content:

 

Shane Buckley is President and Chief Operating Officer of Gigamon with responsibility for expanding the company’s business and markets worldwide. He brings more than 20 years of executive management experience to the team and joins Gigamon from Xirrus where he was CEO prior … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/4-tips-to-run-fast-in-the-face-of-digital-transformation/a/d-id/1336534?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

OpenBSD bugs, Microsoft’s bad update, a new Nork hacking crew, and more

Welcome to yet another El Reg security roundup. Off we go.

OpenBSD a little too true to its name

The widely-used OpenBSD operating system is the host of a rather serious security vulnerability.

Researchers with Qualys found and reported, an authentication bypass flaw that would allow an attacker to login without valid credentials.

“We discovered an authentication-bypass vulnerability in OpenBSD’s authentication system: this vulnerability is remotely exploitable in smtpd, ldapd, and radiusd, but its real-world impact should be studied on a case-by-case basis,” notes Qualys. “For example, sshd is not exploitable thanks to its defense-in-depth mechanisms.”

Admins will want to update their systems as soon as possible.

Microsoft update borks databases

Admins running Microsoft Access might want to hold off on installing the latest patch from Redmond.

This after Microsoft warned that the original patch for the database tool, released on November 12, was causing queries to fail.

While some versions have been updated with a fix to clean up the issue, two others, Access 2013 C2R and Access 2019 Volume License, will not get their fix until December 10.

For those wondering, things like this are part of the reason why some companies are behind on their patching: security fixes can sometimes bring with them other bugs that can cripple important systems.

IBM breaks down Hive0080

No, that’s not the name of the cheesy EDM act your sister’s new boyfriend plays in. It’s the newest North Korean hacking operation.

The team at IBM’s X-Force says that Hive0080 is in many ways like the other APTs operating out of the reclusive dictatorship. The outfit mainly exists to help the sanction-hit nation line its coffers with purloined currency.

“Our analysis of this group’s activity indicates they have been active since at least early 2018 and that their malware and TTPs are linked closely to those employed by North Korean-backed cyber operations groups,” X-Force reports.

“These links suggest that this group is financially motivated and, based on their efforts to stage enterprise data for extraction, may also be attempting to steal intellectual property.”

Beware orphaned Windows Hello TPM keys

Admins will want to read this Microsoft advisory and make sure they are not vulnerable to a security hole caused by mishandling of orphaned TPM keys in Azure Active Directory.

“After a user sets up Windows Hello for Business (WHfB), the WHfB public key is written to the on-premises Active Directory. The WHfB keys are tied to a user and a device that has been added to Azure AD, and if the device is removed, the corresponding WHfB key is considered orphaned,” Microsoft says of the keys.

“However, these orphaned keys are not deleted even when the device it was created on is no longer present.”

Bayrob hackers go down for decades

Bogdan Nicolescu and Radu Miclaus, the Romanian duo behind the Bayrob fraud operation, have been sentenced to 20 and 18 years in prison, respectively.

The pair were found to have infected more than 400,000 people’s with malware and made off with an estimated $4m using a combination of identity theft, phishing and cryptocurrency mining.

DOJ takes aim at money mules

The US Department of Justice has launched a campaign to take down money mule networks across the US.

The “mules”, sometimes unwitting accomplices, are used as the go-between for cybercriminals to get money out of the accounts of victims and wired overseas to accounts controlled by the bad guys. The DOJ hopes it will be able to identify and stop hundreds of these individuals.

“The Money Mule initiative highlights the importance of partnership to stop fraud schemes, and it sends a message to all who are engaged in money mule activity that they will be caught and prosecuted,” FBI director Christopher Wray said of the effort.

Aviatrix VPNs vulnerable

Researchers with Immersive Labs have uncovered a vulnerability in the popular Aviatrix enterprise VPN platform

The elevation of privilege flaw requires the attacker to already have access to the VPN, so it is not a major risk, but admins will still want to update the software as soon as possible, since these bugs can often be chained with other exploits to create a more serious issue.

“Coming hot on the heels of the UK and US Government warnings about VPN vulnerabilities, this underlines that often the technology protecting enterprises needs to be managed as tightly as the people using it,” said Alex Seymour, the Immersive Labs researcher who uncovered the bug.

“People tend to think of their VPN as one of the more secure elements of their security posture, so it should be a bit of a wakeup call for the industry.” ®

Sponsored:
What next after Netezza?

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2019/12/07/security_roundup_dec_6/

How Attackers Used Look-Alike Domains to Steal $1 Million From a Chinese VC

Money meant to fund an Israeli startup wound up directly deposited to the scammers.

Some cyberattacks involve extremely sophisticated tools and cutting-edge exploits. Others, not so much.

A case in point is an incident involving a Chinese venture capital firm and an Israeli startup that it had agreed to fund. Nearly all it took for scammers to walk away with a cool $1 million in cash — meant for the startup from the investment firm — was two Web domains and 32 emails.

Check Point Software, which investigated the scam on behalf of the Israeli firm, this week described the incident as starting with a compromise of the Israeli startup’s email server. A few months before the transaction was scheduled to happen, the attackers noticed an email thread containing information about a multimillion-dollar seeding fund from the Chinese VC.

Rather than simply monitoring the thread and having emails forwarded to them, the attackers registered two domains. One of the domains was a look-alike of the Chinese investment company’s domain; the other was a spoof of the Israeli firm’s domain. In both instances, the threat actors simply added an “s” to the end of the original domain name.

The next phase of the scam involved the attackers sending two emails with the same subject header as the original email thread about the planned seed funding.

The attackers used the Israeli firm’s look-alike domain to send an email to the Chinese VC firm that appeared to be from the startup’s CEO. They also used the Chinese firm’s look-alike domain to send an email to the Israeli company that purported to be from the email account of the manager in charge of the transaction at the investment firm.

“This infrastructure gave the attacker the ability to conduct the ultimate Man-In-The-Middle (MITM) attack,” Check Point said in a blog describing the incident.

Thus, all email communication that both sides carried out in response to those two initial emails were being sent directly to the attackers first. The threat actors would review each email, make whatever changes they felt they needed to make, and then forward the messages from the look-alike domains to the original destination.

In total, the attacker sent 14 emails to the Israeli side and 18 to the Chinese VC firm using the look-alike domains. Over the course of these communications, the attackers managed to change the bank account information for the VC firm and replace it with their own, so any money that the VC firm sent to the Israeli firm would end up with the attackers instead.

Brazen Scam
According to Check Point, the attackers were so brazen they even managed to cancel a scheduled meeting in Shanghai between the CEO of the Israeli company and the Chinese VC firm. They basically sent emails with different excuses to both sides using the rogue domains. The goal in thwarting the meeting apparently was to minimize the risk of the bank account number switch being discovered.

“This operation was unique because the threat actor successfully spoofed both sides of the transaction and was able to disrupt physical meetings between the parties involved,” says Tim Otis, team leader, incident response operations at Check Point.

Such scams highlight the need for organizations to have a capability in place to scan for look-alike domains, Otis says. They also show why secondary protection mechanisms — like verbal confirmation — are necessary when making high-value transactions, he says.

Look-alike domains have become an increasingly popular tactic among online scammers and those seeking to pull off impersonation schemes. In many cases, attackers set up look-alike domains for well-known brands and use the domains to try and trick users into sharing passwords, payment card info, and other sensitive data. The trend is especially noticeable during the holiday shopping season.

Security vendor Venafi recently looked into the explosion of such sites and discovered over 100,000 lookalike domains for just the top 20 retailers in the US, UK, France, Germany, and Australia.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “10 Security ‘Chestnuts’ We Should Roast Over the Open Fire.”

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/how-attackers-used-look-alike-domains-to-steal-$1-million-from-a-chinese-vc-/d/d-id/1336547?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

China fires up ‘Great Cannon’ denial-of-service blaster, points it toward Hong Kong

China is reportedly using the ‘cannon’ capabilities of its massive domestic internet to try and take down anti-government websites in Hong Kong.

The team at ATT Cybersecurity reports that LIHKG, a forums and social news site being used to organize protests on the island, has been the target of an ongoing distributed denial of service (DDoS) attack from the mainland.

It is believed that the sustained flood of traffic is the result of the offensive capabilities built into the “Great Firewall,” China’s massive network infrastructure designed to filter, censor, and monitor traffic within the country’s borders. Thus far, it appears that LIHKG’s anti-DDOS service is holding up to the barrage and the site remains accessible.

The offensive mode, referred to as the Great Cannon, has been known since at least 2015, when it was revealed that PCs visiting sites within the firewall’s domain had been seeded with JavaScript code that, on command, would direct them to fire data packets at a specific target.

President Xi of China

Just take a look at the carnage on Notepad++’s GitHub: ‘Free Uyghur’ release sparks spam tsunami by pro-Chinese

READ MORE

“Normally these URLs serve standard analytics tracking scripts,” ATT said of sites handing out the code. “However, for a certain percentage of requests, the Great Cannon swaps these on the fly with malicious code.”

As a result, PCs from within China are now directing repeated requests for data from multiple pages on the LIHKG domain. In some cases, the DDoS flood aims for meme images as well. This, the ATT team believes, is part of an effort to conceal the attack by making the flood of traffic appear more like normal patterns.

While the attack isn’t succeeding at the time of writing, the ATT security crew says it is concerned.

“It is unlikely these sites will be seriously impacted. Partly due to LIHKG sitting behind an anti-DDoS service, and partly due to some bugs in the malicious Javascript code that we won’t discuss here,” the report explains.

“Still, it is disturbing to see an attack tool with the potential power of the Great Cannon used more regularly, and again causing collateral damage to US based services.” ®

Sponsored:
Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2019/12/06/china_ddos_report/

China fires up ‘Great Cannon’ denial-of-service blaster, points it toward Hong Kong

China is reportedly using the ‘cannon’ capabilities of its massive domestic internet to try and take down anti-government websites in Hong Kong.

The team at ATT Cybersecurity reports that LIHKG, a forums and social news site being used to organize protests on the island, has been the target of an ongoing distributed denial of service (DDoS) attack from the mainland.

It is believed that the sustained flood of traffic is the result of the offensive capabilities built into the “Great Firewall,” China’s massive network infrastructure designed to filter, censor, and monitor traffic within the country’s borders. Thus far, it appears that LIHKG’s anti-DDOS service is holding up to the barrage and the site remains accessible.

The offensive mode, referred to as the Great Cannon, has been known since at least 2015, when it was revealed that PCs visiting sites within the firewall’s domain had been seeded with JavaScript code that, on command, would direct them to fire data packets at a specific target.

President Xi of China

Just take a look at the carnage on Notepad++’s GitHub: ‘Free Uyghur’ release sparks spam tsunami by pro-Chinese

READ MORE

“Normally these URLs serve standard analytics tracking scripts,” ATT said of sites handing out the code. “However, for a certain percentage of requests, the Great Cannon swaps these on the fly with malicious code.”

As a result, PCs from within China are now directing repeated requests for data from multiple pages on the LIHKG domain. In some cases, the DDoS flood aims for meme images as well. This, the ATT team believes, is part of an effort to conceal the attack by making the flood of traffic appear more like normal patterns.

While the attack isn’t succeeding at the time of writing, the ATT security crew says it is concerned.

“It is unlikely these sites will be seriously impacted. Partly due to LIHKG sitting behind an anti-DDoS service, and partly due to some bugs in the malicious Javascript code that we won’t discuss here,” the report explains.

“Still, it is disturbing to see an attack tool with the potential power of the Great Cannon used more regularly, and again causing collateral damage to US based services.” ®

Sponsored:
Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2019/12/06/china_ddos_report/

Success Enablers or Silent Killers?

These five success enablers will help CISOs report, measure, and demonstrate ROI to the C-suite.

CISOs today are challenged to report, measure, and demonstrate return on investment to the C-suite and board. CISOs must address these success enablers, because if they don’t, they become silent killers. The lack of ability to report, measure, and demonstrate ROI has been keeping CISOs from a strong and enduring relationship with the C-suite.

The following is a high-level cycle of five success enablers. The first, if successfully set up, enables the second, and onward, with the last reinforcing the first.

1. Security Goals That Don’t Resonate with the C-Suite and Board
We often hear: “Security is a journey, not a destination.” That’s a real problem for business executives because they’re driven by results. They have a fiduciary duty to shareholders to get the most value from an investment. If CISOs have not established security goals that resonate with executives, there isn’t a destination to showcase. In this way, security becomes a journey without a destination. Unfortunately, for CISOs that’s often a journey to C-suite discontent and onward to a new organization.

CISOs should align their cyber resilience goals around business crown jewels. These are top-of-mind business assets that have executive and board-level significance and are clearly critical to business success. This way, it is crystal clear the value that security can provide and doesn’t need to be supported with a regulatory and complex probabilistic impact argument.

2. A Strategy That Doesn’t Clearly Interlink Height, Depth, and Breadth of Cyber Resilience
Most security strategies weakly establish the height, depth, and width of what we might call the “cyber resilience wall.” This is an oversimplification in security terms but an easy way to connect with business leadership to agree on key concepts to frame impact control expectations and security costs.

Threat sophistication covers a full spectrum of capabilities — from accidental to nation-state. Commensurately, the sophistication necessary to counter them varies — as do the costs. Controls and control groups can calibrate costs to defend to various levels. And the CISO should be able to pitch cost levels of cyber resilience. Let’s call this the height of the cyber resilience wall.

Not all security controls act in the same way. Some controls predict to help prioritize defences, prevent to stop/divert attacks, detect to alert responders, respond to handle attacks and impacts, and recovery to learn, recoup, and mitigate. Let’s call this the depth of the wall.

The width of the cyber resilience wall is scope and coverage. Controls often don’t have a firm grasp of scope (e.g., do I know where all the important data is?) and rarely achieve full coverage of known scope.

These three dimensions directly influence the business plan.

3. A Business Plan That Doesn’t Provide the C-Suite with Clear Risk Appetite Choices
You buy “security” to protect against impact. You can do that by preventing the breach that leads to impact, or by handling the breach such that impact doesn’t cross a line of “unacceptable” quantity. CISOs are poorly armed today to robustly justify the quantity of impact control that specific budgets can buy. And that’s very frustrating for executives. Because there isn’t a strong correlation between security investment and control of impact, it’s easy to executives to cut budgets, or to under-budget, and not feel repercussions. This’s why “risk appetite” has been so elusive.

4. Inconsistent SecOps KPIs, Metrics, and Reporting
Because most control leads and security frameworks largely focus on the technical side of security controls, they don’t effectively run it like a business.

Consequently, security controls aren’t measured to a core set of KPIs that accurately predict performance results. Security control KPIs are often inconsistently chosen and measured, and that leads to poorly calibrated, ineffective, inefficient controls, which often set a false sense of security, deliver weak cyber resilience results, and burn a lot of cash.

5. Inability to Show Results That Matter in a Convincing Manner
One of the best and clearest ways to show results is a well-structured set of red-team exercises.

Red teams can be particularly valuable because they can variably emulate threat sophistications and tactics, they can be multimodal (that is, cyber, physical, social), and be pace-throttled.

More importantly, they should aim at strategic security goals (with the ability to act variably and evaluate SecOps performance), robustly evaluate strategic priorities, and prove SecOps performance — down to the control and specific resources levels. In this way, red teams can be the objective rudder on the security program.

The Rodney Dangerfield Effect
If CISOs don’t address these success enablers, they will have a difficult time propelling themselves to a position of appropriate influence or maintaining their position. They will then experience poor perception and traction, and frustration from executives. They may not receive the funding or resources they need, or executives won’t be convinced they’re delivering satisfactory results.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “10 Security ‘Chestnuts’ We Should Roast Over the Open Fire.”

Douglas Ferguson, a security professional of over 20 years, is the founder and CTO of Pharos Security. Pharos specializes in aligning security goals and strategy to the business and a calibrated risk appetite, ensuring an integrated business plan and optimized … View Full Bio

Article source: https://www.darkreading.com/risk/success-enablers-or-silent-killers/a/d-id/1336502?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple