The US Govt. says cyber-security failures were many within failed Jan. hack of US Census Bureau systems.
Threat players exploited an unpatched Citrix flaw to breach the network of the US Census Bureau in Jan. in an attack that was ultimately halted before a backdoor could be installed or sensitive data could be stolen, according to a report by a US Govt. watchdog organisation.
Critical Flaw
However, investigators found that officials were informed of the flaw in its servers and had at least 2 opportunities to fix it before the attack, mainly due to lack of co-ordination between teams responsible for different security tasks, according to the report, published Tues. by the US Department of Commerce Office of Inspector General. The bureau also lagged in its discovery & reporting of the attack after it happened.
The report details & reviews the incident that occurred on Jan. 11, 2020, when attackers used the publicly available exploit for a critical flaw to target remote-access servers operated by the bureau.
Zero-Day
Citrix released a public notice about the zero-day flaw—tracked as CVE-2019-19781–in Dec. In Jan., a representative from the bureau’s Computer Incident Response Team (CIRT_ attended 2 meetings in which the flaw was discussed, & attendees even received a link to steps to use fixes which already had been issued by Citrix.
“Despite the publicly available notices released in Dec. & attending 2 meetings on the issue in Jan., the bureau CIRT did not co-ordinate with the team responsible for implementing these mitigation steps until after the servers had been attacked,” according to the report. Doing so could have prevented the attack, investigators noted.
‘Partially Successful’
The Citrix products affected by the flaw–discovered by Mikhail Klyuchnikov, a researcher at Positive Technologies—are used for application-aware traffic management & secure remote access, respectively. At least 80,000 organisations in 158 countries—about 38% in the US use these products, formerly called NetScaler ADC & Gateway.
The initial compromise at the Census Bureau was on servers used to provide the bureau’s enterprise staff with remote-access capabilities to production, development & lab networks. The servers did not provide access to 2020 decennial census networks, officials told investigators.
Remote Code Execution
“The exploit was partially successful, in that the attacker modified user account data on the systems to prepare for remote code execution,” according to the report. “However, the attacker’s attempts to maintain access to the system by creating a backdoor into the affected servers were unsuccessful.”
Attackers were able to make unauthorised changes to the remote-access servers, including the creation of new user accounts, investigators reported. However, the bureau’s firewalls blocked the attacker’s attempts to establish a backdoor to communicate with the attacker’s external command & control infrastructure.
Other Mistakes
Another security misstep the bureau took that could have mitigated the attack before it even happened was that it was not conducting vulnerability scanning of the remote-access servers as per federal standards and Commerce Department policy, according to the OIG.
“We found that the bureau vulnerability scanning team maintained a list of devices to be scanned,” investigators wrote. “However, the remote-access servers were not included on the list & were therefore not scanned. This occurred because the system & vulnerability scanning teams had not coordinated the transfer of system credentials required for credentialed scanning.”
Not Discovering
The bureau also made mistakes after the attack by not discovering nor reporting the incident in a timely manner, the OIG found.
IT administrators were not aware that servers were compromised until Jan. 28, more than 2 weeks after the attack, because the bureau was not using a security information and event management tool (SIEM) to proactively alert incident responders of suspicious network traffic, investigators found.
https://www.cybernewsgroup.co.uk/virtual-conference-september-2021/