Radar #6: Week of 12/9/2024

Radar #6: This week's topics: Predictions for the Telcom Breach Downstream Impacts, 2024 Insider Threat Report with A Stern Talking To About Branding, and Chasing The Ghost In The Wire
Learn more about The Radar here

The Wiretap: China Has Infiltrated Police Wiretap Systems

Actors associated with the Chinese threat actor group tracked as Volt Typhoon accessed telecommunication systems that are utilized for lawful intercept, a feature that allows law enforcement with legal authorization to intercept communications, a requirement established by CALEA:

The Communications Assistance for Law Enforcement Act (CALEA) is a statute enacted by Congress in 1994 to require that telecommunications carriers and manufacturers of telecommunications equipment design their equipment, facilities, and services to ensure that they have the necessary surveillance capabilities to comply with legal requests for information.

This “backdoor as a feature” anti-pattern keeps rearing its ugly head, especially regarding special access given to law enforcement. When a backdoor is installed, you can’t be sure who is going to use it as we’ve seen over (tech companies) and over(ring doorbell) and over (Sony) and over (old web shell utilized by CISA red team).

I think telecom exploitation is likely to become a hot topic in the coming years as it’s a tangible example of a target that is digestible to the general public and regulators which will lead to regulations on the Telcom industry to increase security. Explaining the threat model of cloud environments to the general public is hard. Saying “adversaries are wiretapping you” is concise and a sentiment people can rally behind. Additionally, telco systems are not known to be the most secure products.

Zero Trust and Insider Threats

The 2024 Insider Threat Report paints a bleak picture of the rise of insider threats. Most of the report tracks statistics that show increases in risk from insiders (Note: The report is put together by two companies that sell products to “solve” this problem). There is likely some correlation between the increased risk from insiders and increase in polarization within the US. Architecting for security from unintentional threats (such as misconfigured services) is very different than architecting for security against an insider with malicious intentions (more on this later). It would be interesting to see data on the motivation behind intentional insider threat incidents.

It’s important to understand that many of the controls to protect against insider risk threats are also controls that organizations should be moving towards anyway – specifically, enforcing the principals of least privilege at scale which is the core idea behind Zero Trust Architecture (PDF). Notice that “at scale” is doing a lot of work in the previous statement, developing systems that allow your organization to easily and automatically enforce the desired state of security is the key to making sure these principles are enforced. If security relies on a human at any point, it has a chance of failing.

The best practices recommended in the report are:

  1. Implement Advanced Monitoring Solutions (Which the sponsor of the report happens to sell)
  2. Integrate Non-IT Data Sources
  3. Leverage Automated Threat Detection and Response
  4. Adopt a Zero Trust Framework
  5. Enhance Employee Training and Awareness
  6. Foster a Security-Conscious Culture
  7. Conduct Regular Security Audits and Assessments
  8. Implement Comprehensive Incident Response Plans

One gripe with this report is I did not see any definition for what constitutes an “Insider Attack” which I believe is very important to make clear. Side note: the reason we’re seeing a rise in these “year in review” style reports is that it establishes a great brand reputation for being a domain expert and works as a great purchase funnel. This can backfire quickly if the content of the report isn’t data-driven, transparent and obvious marketing. The problem isn’t limited to the security field either, even Spotify is facing backlash over their recent “year in review” Spotify wrapped feature for not distilling interesting insights from the data they collect.

From Me: Chasing The Ghost In The Wire

I recently read Staff Engineer and it got me thinking about where I spend my time. One concept that stuck out to me was ghost chasing. Ghost Chasing is a pattern of thinking where employees in new jobs/roles/environments chase ideas of high importance in the last job/role/environment they were in, not what is important for the current environment because the old problems are familiar and recognizable. Avoiding this is difficult, it’s hard to distinguish between experience and Ghost Chasing. A solution is to work on projects that are important but have not been approached yet, usually because it has complexities associated with them that make them unapproachable to most. This can take many forms:

  • Red team: The problem – your company has inconsistent reports. Some are great, some are terrible. If you’ve seen this in the past, you might think to chase ghosts by attempting to give everyone a bigger training budget. A better solution might be to take on the arduous task of creating an SOP for each type of assessment and push leadership to allow having multiple testers on an engagement that can keep each other accountable.
  • Blue Team: The problem – you’re inundated with low quality alerts. The solution that may be chasing ghosts is to play the endless game of alert tuning. A better solution might be to take on the responsibility of reaching out to infrastructure teams to work on getting logs from more critical locations allowing higher-quality detections to be crafted.
  • CISO: The problem – everything is on fire and your budget isn’t unlimited. The solution that may be chasing ghosts is to distribute the budget so the majority of the budget goes to the most at risk projects. A better solution might be to hire experts who can help determine which security controls, if implemented correctly, fix a disproportionate amount of the issues across all teams.

Caught My Eye

Newsletter

Want this sent straight to your inbox? You can subscribe here to have it sent every Monday morning.