Even with growing cloud adoption data centres still house a huge amount of information and for attackers, represent a valuable target that is hard to resist. The vast security measures put in place by enterprises to protect their data centres means attacking and infiltrating a data centre system is a slow process which requires patience. In order to compromise a data centre, a significant amount of time and effort needs to be put into planning and executing the attack.
Subsequently, the attacker needs to operate below the radar of the security teams. Attackers can stay hidden in networks for months, even years, in order to get to their final goal: exfiltrate or manipulate data from the data centre. It is, therefore, incredibly important for security teams to understand what they need to look out for when monitoring for these attacks. In our experience, there are six critical attack vectors and techniques that cyber-attackers use in order to pull off a sophisticated attack against data centres.
Firstly, there is the co-opting of administrative access. Due to the privileged access administrative accounts have to the data centre; they are natural targets for attackers. The protocols used by administrators give attackers powerful access into the data centre if they are able to authenticate. Ultimately, this is a much easier way of accessing the data centre because it removes the need to exploit an application vulnerability. By using standard admin tools and services such as SSH, Telnet or RDP, attackers can easily blend in with legitimate admin traffic, meaning they can go undetected for a long time. Consequently, any attacker that has breached the system is even harder to track and recognise. It is vital that security teams stay vigilant to any changes in the observed privilege behaviours.
Data centre admins sometimes implement local authentication options, or additional admin accounts to be used in an emergency in order to access the hosts and the workloads they need to manage. These local authentication options and accounts are usually not logged so there is no record of them being used. Furthermore, the login details are often shared across hosts and workloads to simply make life easier. Naturally, this poses a huge risk because attackers will find these authentication credentials by compromising an administrator, and then they carefully and silently access the data centre with the knowledge that their presence and activity is not being logged.
Authenticated local access also allows the attacker to extend further into the data centre hardware. For example, virtualisation is tantamount to the running of a data centre. This virtual environment lifecycle in the data centre is an interesting one because, in order to work, it needs to run on the physical hardware. Therefore, the virtual discs found in data centres can only work with the presence of physical disks, and the physical disks run in physical servers. Physical servers are independently managed by management planes. The management planes are designed to have a lights-out and out-of-band management, with their own memory, power, processes and protocols. This enables administrators to mount disks and re-image servers in situations where the power to the main server is powered off.
Intelligent Platform Management Interface (IPMI) is an example of a protocol which allows an action such as the one above. There are a variety of own branded versions of IPMI, such as Dell iDRAC or HPE Integrated Lights-Out (ILO) which some hardware servers use. However, they are all established on the IPMI framework and they perform the same functions.
Despite this, IPMI and similar protocols are renowned for having security weaknesses and vulnerabilities that attackers can utilise and take advantage of. Worryingly, in September 2019, researchers at Eclypsium found over 47,000 workstations and servers that were running on Supermicro motherboards and were exposed to the internet, and wide open to attacks, due to the vulnerabilities found in baseboard management controller (BMC) which is a component of IPMI. This is not a-typical for IPMIs and naturally represents an attractive target for attackers looking for an easy route into a data centre.
IPMI is not the only vulnerable aspect of a data centre. Because data centres are such an attractive target, physical servers, routers, switches, and firewalls are targeted by the most advanced attackers, including nation-states. The attackers are clever and sly so will aim low and use methods to enter the data centre at a critical level but stay beneath the radar. This is often at the level of the operating systems which ultimately makes them incredibly difficult to detect with traditional methods. Techniques such as these are used by attackers because it enables them to infect the security devices which are meant to protect the data centre network. They can then use those devices to launch attacks that penetrate an even deeper level of the network.
It is vital that administrators keep an eye on their data. The end goal of an attack is to steal or manipulate this data. Attackers seek to create monetary value from the data they find, so it is prudent to start viewing data centres essentially like a bank vault full of money. Like any criminal, attackers will try and steal data with as little disruption as possible. They do not want to draw attention to themselves, so depending on the skillset of the attackers, they will use a variety of approaches to smuggle data out of the data centre. One approach may be to take the data in bulk, or alternatively, take it a little bit at a time in an attempt to avoid detection. The latter example is the more obvious approach as it stops attention being drawn to the attacker. The data is then often moved directly to the Internet, or to a staging area in the campus network.
No one data centre is the same; they vary according to users and organisations. There is however a method to the attacks and a series of events which unfold prior to the attack on the data centre. This usually involves starting at the bottom of the chain. For example, their first point of penetration may be through a compromised employee account, that may have been compromised though a phishing email, or a malware riddled application, for example. This allows them access to the network where the attackers look to expand their presence by targeting other devices, and while doing so, plant backdoors or hidden tunnels to communicate with each other inside the now compromised network. Patience and resilience are key to their next stage because they then spend time recognising and identifying valuable assets and resources within the network which they can utilise to make their time and presence worth the effort. The administrators credentials are an attackers golden trove and once they access this, the attack is usually at its most mature. This enables them to attack an organisations data centre because administrators are often the only individuals who can access the data. The movements prior to access of the administrators credentials build up to the peak attack on the data centre.
Attackers are usually more inclined to focus on the physical infrastructure of a data centre and understand the levels required to gain access. They have no problem starting at the bottom of the chain and working their way up through the network in order to reach the pivotal level of data centre access. Therefore, organisations need to look at the bottom of the chain, from employee accounts and client devices, and work their way up through the system, employing security at every level to ensure attackers cant gain access to what is arguably their most valuable asset their data centre. By doing this, even if attackers were to find a way to start accessing information which will give them the key to a data centre, they will expose themselves to multiple detection opportunities that provide security teams the best chance to find attackers early. Early detection can make the difference between a contained incident or a successful takeover that costs the organisation time, effort, reputational damage and money.
Matt Walmsley, senior technology industry marketer, Vectra
See the rest here:
The attacker and the data centre - ITProPortal
- Setting up a Virtual Server on Ninefold - Video [Last Updated On: February 26th, 2012] [Originally Added On: February 26th, 2012]
- ScaleXtreme Automates Cloud-Based Patch Management For Virtual, Physical Servers [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Secure Cloud Computing Software manages IT resources. [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Dell unveils new servers, says not a PC company [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Wyse to Launch Client Infrastructure Management Software as a Service, Enabling Simple and Secure Management of Any ... [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- As the App Culture Builds, Dell Accelerates its Shift to Services with New Line of Servers, Flash Capabilities [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Terraria - Cloud In A Ballon - Video [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Ethernet Alliance Interoperability Demo Showcases High-Speed Cloud Connections [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- RSA and Zscaler Teaming Up to Deliver Trusted Access for Cloud Computing [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- [NEC Report from MWC2012] NEC-Cloud-Marketplace - Video [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- IBM SmartCloud Virtualized Server Recovery - Video [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- BeyondTrust Launches PowerBroker Servers Windows Edition [Last Updated On: February 29th, 2012] [Originally Added On: February 29th, 2012]
- Ericsson joins OpenStack cloud infrastructure community [Last Updated On: February 29th, 2012] [Originally Added On: February 29th, 2012]
- ScaleXtreme Cloud-Based Patch Management Open for New Customers [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- RootAxcess - Getting Started - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- How to Create a Terraria Server 1.1.2 (All Links Provided) - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- Dell #1 in Hyperscale Servers (Steve Cumings) - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- Managing SAP on Power Systems with Cloud technologies delivers superior IT economics - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- AMD Acquires Cloud Server Maker SeaMicro for $334M USD [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- Web Host 1&1 Provides More Flexibility with Dynamic Cloud Server [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- Leap Day brings down Microsoft's Azure cloud service [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- RightMobileApps White Label Program - Video [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- bzst server ban #2 - Video [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- “Cloud storage served from an array would cost $2 a gigabyte” [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- More Flexibility with the 1&1 Dynamic Cloud Server [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Hub’s future jobs may be in cloud [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Cloud computing growing jobs, says Microsoft [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- TurnKey Internet Launches WebMatrix, a New Application in Partnership with Microsoft [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Cebit 2012: SAP Cloud Computing Strategy - Introduction - Video [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Dome9 Security Launches Industry's First Free Cloud Security for Unlimited Number of Servers [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Servers Are Refreshed With Intel's New E5 Chips [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Samsung's AllShare Play pushes pictures from phone to cloud and TV [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Google drops the price of Cloud Storage service [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- New Intel Server Technology: Powering the Cloud to Handle 15 Billion Connected Devices [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Swisscom IT Services Launches Cloud Storage Services Powered by CTERA Networks [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- KineticD Releases Suite of Cloud Backup Offerings for SMBs [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- First Look: Samsung Allshare Play - Video [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Bill The Server Guy Introduces the New Intel XEON e5-2600 (Romley) Server CPU's - Video [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- New Cisco servers have Intel Xeon E5 inside [Last Updated On: March 8th, 2012] [Originally Added On: March 8th, 2012]
- Cisco rolls out UCS servers with Intel Xeon E5 chips [Last Updated On: March 8th, 2012] [Originally Added On: March 8th, 2012]
- From scooters to servers: The best of Launch, Day One [Last Updated On: March 8th, 2012] [Originally Added On: March 8th, 2012]
- Computer Basics: What is the Cloud? - Video [Last Updated On: March 9th, 2012] [Originally Added On: March 9th, 2012]
- Could the digital 'cloud' crash? [Last Updated On: March 10th, 2012] [Originally Added On: March 10th, 2012]
- Dome9 Security Launches Free Cloud Security For Unlimited Number Of Servers [Last Updated On: March 10th, 2012] [Originally Added On: March 10th, 2012]
- Cloud computing 'made in Germany' stirs debate at CeBIT [Last Updated On: March 11th, 2012] [Originally Added On: March 11th, 2012]
- New Key Technology Simplifies Data Encryption in the Cloud [Last Updated On: March 11th, 2012] [Originally Added On: March 11th, 2012]
- Can a private cloud drive energy efficiency in datacentres? [Last Updated On: March 12th, 2012] [Originally Added On: March 12th, 2012]
- Porticor's new key technology simplifies data encryption in the cloud [Last Updated On: March 12th, 2012] [Originally Added On: March 12th, 2012]
- Borders + Gratehouse Adds Three New Clients in Cloud Sector [Last Updated On: March 12th, 2012] [Originally Added On: March 12th, 2012]
- Dell to invest $700 mn in R&D, unveils 12G servers [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Defiant Kaleidescape To Keep Shipping Movie Servers [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Data Centre Transformation Master Class 3: Cloud Architecture - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- DotNetNuke Tutorial - Great hosting tool - PowerDNN Control Suite - part 1/3 - Video #310 - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Cloud Computing - 28/02/12 - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- SYS-CON.tv @ 9th Cloud Expo | Nand Mulchandani, CEO and Co-Founder of ScaleXtreme - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Oni Launches New Cloud Services for Enterprises Using CA Technologies Cloud Platform [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- SmartStyle Advanced Technology - Video [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- SmartStyle Infrastructure - Video [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- The Hidden Risk of a Meltdown in the Cloud [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- FireHost Launches Secure Cloud Data Center in Phoenix, Arizona [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- Panda Security Launches New Channel Partner Recruitment Campaign: "Security to the Power of the Cloud" [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- NetSTAR, Inc. Announces Safe and Secure Web Browsers for iPhones, iPads, and Android Devices [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- Amazon Cloud Powered by 'Almost 500,000 Servers' [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- NetSTAR Announces Secure Web Browsers For iPhones, iPads, And Android Devices [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Be Prepared For When the Cloud Really Fails [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Dr. Cloud explains dinCloud's hosted virtual server solution - Video [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- New estimate pegs Amazon's cloud at nearly half a million servers [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Amazon’s Web Services Uses 450K Servers [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Saving File On Internet - Cloud Computing - Video [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- DotNetNuke Tutorial - Great hosting tool - PowerDNN Control Suite - part 2/3 - Video #311 - Video [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Linux servers keep growing, Windows & Unix keep shrinking [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Cloud Desktop from Compute Blocks - Video [Last Updated On: March 16th, 2012] [Originally Added On: March 16th, 2012]
- Amazon EC2 cloud is made up of almost half-a-million Linux servers [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- HP trots out new line of “self-sufficient” servers [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Cloud Web Hosting Reviews - Australian Cloud Hosting Providers - Video [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Using Porticor to protect data in a snapshot scenario in AWS - Video [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- CDW - Charles Barkley - New Office - Video [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Nearly a Half Million Servers May Power Amazon Cloud [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Morphlabs CEO Winston Damarillo talks about their mCloud Rack - Video [Last Updated On: March 20th, 2012] [Originally Added On: March 20th, 2012]
- AMD reaches for the cloud with new server chips [Last Updated On: March 20th, 2012] [Originally Added On: March 20th, 2012]