{"id":213,"date":"2024-10-19T01:57:33","date_gmt":"2024-10-19T01:57:33","guid":{"rendered":"https:\/\/cybersecuritysanity.com\/?p=213"},"modified":"2024-10-19T03:20:40","modified_gmt":"2024-10-19T03:20:40","slug":"an-underwriters-guide-to-cyber-risk-managing-3rd-party-risk-part-2","status":"publish","type":"post","link":"https:\/\/cybersecuritysanity.com\/?p=213","title":{"rendered":"An Underwriters&#8217; Guide to Cyber Risk: Managing 3rd Party Risk &#8211; Part 2"},"content":{"rendered":"\n<p><strong>Understanding and Preventing Zero Day And Other Software Supply Chain Attacks<\/strong><\/p>\n\n\n\n<p>This is the second post in the series, intended to help better understand how third party risks can be managed, and addressing the problem of misinformation from high raking sources. Because of the pervasiveness of the myth that third party risks are unmanageable, primarily due to the insistence by insurance executives that &#8220;Well I don&#8217;t understand it, and therefore it can&#8217;t be done.&#8221; But because of this toxic insistence, it is necessary to break things down and provide detailed supporting information.<\/p>\n\n\n\n<p>In this post, we will look at zero days and unpatched vulnerabilities as a type of exposure to third party risk.  Zero days are similar to supply chain attacks, and many of the same methods for controlling zero days apply to supply chain attacks as well. MOVEit is an example of a zero day attack, which caused massive damage to the US and global economy.  It illustrates exactly how these attacks work.<\/p>\n\n\n\n<p>In some ways, it was the kind of systemic attack that insurers are constantly complaining about. However, it also illustrates all the ways the damage could have been prevented. MOVEit was bad, but it was also tragic, because so much of the loss could have been prevented, if we had our act together on this.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p><strong>Manage Third Party Risk Through Critical Patch and Zero Day Management:<\/strong><br>One of the biggest unnecessary losses that we continue to su\ufb00er is that of unpatched so\ufb05ware, which as been exploited and is actively being used to attack businesses. The principle is not hard to understand: so\ufb05ware sometimes has \ufb02aws discovered in it, and those \ufb02aws may make the so\ufb05ware subject to compromise. If this is the case, and the so\ufb05ware is high risk then moments matter. Mitigating steps must be taken right away, and these can include patching the so\ufb05ware or, if necessary, suspending its use until it can be safety returned to service.<\/p>\n\n\n\n<p>A \u201dZero day\u201d is a situation where there are zero days of notice on a critical \ufb02aw, because the bad guys discover it \ufb01rst and the \ufb01rst sign of trouble is that you are breached by a novel \ufb02aw that was previously unknown and therefore could not be avoided. While this can happen, it should be noted that it would be astronomically bad luck to be hit on the literal \ufb01rst day an exploit is discovered and few organizations truly are.<\/p>\n\n\n\n<p>Last summer, the world su\ufb00ered the single most costly and damaging supply chain attack in history. The a\ufb05ermath is still not fully clear. Hundreds of companies were hacked and some of the most sensitive, highly damaging and private information is now in the hands of some of the most viscous ransomware gangs out there. The attack pumped over a quarter billion dollars of ransom into the Kl0p group, with some of it ending up with a\ufb03liates in Iran and North Korea. The attack has le\ufb05 the US and allies with a gaping wound torn open. The ransomware gangs now have the single largest injection of cash in their history, and much of it is already being used to buy weapons for the pro-Russia Ukrainian groups in the Donbas region.<\/p>\n\n\n\n<p><br><strong>MOVEit: A Textbook Example of What We Are Doing Wrong<\/strong><br>The problem started with a product called MOVEit. MOVEIt is a secure server made by Progress so\ufb05ware. It is used in the highest security environments as a way of transferring high risk \ufb01les between locations. For example, if a medical or \ufb01nancial institution needed to provide o\ufb00-site access to secret \ufb01les, MOVEit would be a natural choice to use, and thousands of customers use if for just that. As such, some of the most secure and sensitive environments rely on MOVEit. One would expect that such a product would be the subject to the highest levels of security testing and certi\ufb01cation, but that is o\ufb05en not the case, due to poor enforcement and lax standards.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" src=\"https:\/\/cybersecuritysanity.com\/wp-content\/uploads\/2024\/10\/moveit_4x3-640w.webp\" alt=\"\" class=\"wp-image-214\" style=\"width:281px;height:auto\" srcset=\"https:\/\/cybersecuritysanity.com\/wp-content\/uploads\/2024\/10\/moveit_4x3-640w.webp 640w, https:\/\/cybersecuritysanity.com\/wp-content\/uploads\/2024\/10\/moveit_4x3-640w-300x225.webp 300w, https:\/\/cybersecuritysanity.com\/wp-content\/uploads\/2024\/10\/moveit_4x3-640w-400x300.webp 400w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure><\/div>\n\n\n<p>On May 27, 2023, it was discovered that the MOVEit server could easily be breached by an outsider through a simple method known as code injection. Code injection simply means that a command could be entered into the \ufb01elds for things like login or password. If, instead of entering a login, a user entered a command to the system, the command would be run, allowing the user to unlock the server completely and do as they pleased.<\/p>\n\n\n\n<p>Code injection is a well known type of attack. The image to the le\ufb05 shows how a user might enter computer code into a password \ufb01eld with the intention of bypassing the passwords. Code injection has been around for decades. It&#8217;s normally the result of poor coding practice. It&#8217;s so well known and common that it is standard for it to be tested for when secure systems are evaluated. Unfortunately, because that is not enforced and there is no third party to hold anyone&#8217;s feet to the \ufb01re on it, code testing is rarely done and even when it is, external audits and assurance is very rare.<\/p>\n\n\n\n<p>Almost as soon as the \ufb02aw was discovered, it was exploited. Exploiting it was easy. MOVEit servers frequently face the internet and are as easy as using Google to \ufb01nd. Using other search methods, the Kl0p gang, a terrorist group aligned with the Russian far right and with a\ufb03liates in Afghanistan, Iran, Syria and North Korea began to exploit the MOVEit \ufb02aw. The \ufb01rst victims included the BBC, British Airlines and numerous other organizations in the US, UK and Canada. The attack started in the UK but within days, servers were being breached on both sides of the Atlantic.<\/p>\n\n\n\n<p>At this point no further breach should have happened, because by end the of May, word had gotten out and a patch to \ufb01x the problem. Every breach that happened a\ufb05er the patch was issued and news dispatched as an act of extreme negligence.<\/p>\n\n\n\n<p>Before the end of June, beaches at United Healthcare, Johns Hopkins University, Virgin, Aon, Prudential, Shell and others had leaked the private information of hundreds of millions of people, cost the world billions of dollars and enriched Russian terrorists beyond their wildest dreams. The hacks kept coming over the summer. The Kl0p gang even laughed, because as commentators talked about the situation on the news, nobody seemed to realize that the solution was pretty simple: track down the users of the so\ufb05ware and make them patch it.<\/p>\n\n\n\n<p><strong>In General, Attentive Companies Can Protect Themselves<\/strong><br>It is important to note that few zero day hacks actually happen on the first day of the hack being discovered.  That&#8217;s only true for some very unlucky organizations.  From an underwriters perspective, there is a need to be certain that a broad variety of clients are covered, but for individual organizations, the problem can be greatly mitigated by simply engaging in the best practices of patch management.<\/p>\n\n\n\n<p>Patch management is the process of updating software, and it usually is not as critical as it is when a zero day is making the rounds, but it is always important.  It can be largely automated, of course.  Done properly, patch management could stop more than 90% of these problems.   Future articles will describe the patch management process in greater detail.<\/p>\n\n\n\n<p>Because patch management is a form of preventative maintenance, many organizations have a great deal of trouble making it a priority without an external stakeholder to lean on them about it.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/cybersecuritysanity.com\/wp-content\/uploads\/2024\/10\/1686652433954-1024x683.png\" alt=\"\" class=\"wp-image-218\" srcset=\"https:\/\/cybersecuritysanity.com\/wp-content\/uploads\/2024\/10\/1686652433954-1024x683.png 1024w, https:\/\/cybersecuritysanity.com\/wp-content\/uploads\/2024\/10\/1686652433954-300x200.png 300w, https:\/\/cybersecuritysanity.com\/wp-content\/uploads\/2024\/10\/1686652433954-768x512.png 768w, https:\/\/cybersecuritysanity.com\/wp-content\/uploads\/2024\/10\/1686652433954-450x300.png 450w, https:\/\/cybersecuritysanity.com\/wp-content\/uploads\/2024\/10\/1686652433954.png 1080w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p><strong>The Problem is a Lack of Infrastructure<\/strong><br>Had MOVEit been a drug, there would have been a system of pharmacies, distributors and the FDA to coordinate a recall. Had MOVEit been a food product, the FDA, USDA and states would have sprung into action. Had MOVEit been a car, the state DMV\u2019s along with auto dealerships and the DOT would have helped coordinate a recall. But MOVEit is so\ufb05ware, and unlike other products, there exists no system nor agency to coordinate a recall. Additionally, insurers have done nothing to establish any private sector e\ufb00ort to \ufb01nd and address so\ufb05ware or other third party products that may be producing a systemic loss.<\/p>\n\n\n\n<p>In order to properly respond to these kind of events in the future, insurance companies need to start ahead of time by planning on how they will address a zero day emergency, such as what happened with MOVEit. Because only a small number of victims are attacked on the very \ufb01rst day, the overwhelming amount of damage that a so\ufb05ware based third party attack can cause can, in fact, be avoided. Doing so, however, requires a fast moving plan of action, because under these circumstances, every moment counts.<\/p>\n\n\n\n<p>In fact, what needs to be done is very straight forward. Insurers must start by getting an inventory of their insured\u2019s IT assets. An IT asset inventory is the \ufb01rst step in any kind of planning for a zero day emergency. This will help determine which clients have the so\ufb05ware in question. However, it is still necessary to provide notice to all, because there are circumstances where a product may not have been updated to the inventory. There are also times when technology can be used to scan systems looking for the vulnerable so\ufb05ware.<\/p>\n\n\n\n<p>In many cases, this can itself be automated. Automated patch management systems do exist and many companies already use them. It is, however, important to verify that such systems are in place and test them regularly. In all cases, it is a best practice for human veri\ufb01cation of the corrective action to be used in the highest risk circumstances<\/p>\n\n\n\n<p>Once it is determined who uses the so\ufb05ware in question, it is simply a matter of assuring they are noti\ufb01ed and that action is taken, either to patch the so\ufb05ware or to uninstall or disable it until a safer version is available. If companies already have a procedure in place to do so, this is a piece of cake, but as with anything else, it is not possible to do a good job when it is necessary to ad hoc a solution together at the last minute.<\/p>\n\n\n\n<p>One reason it is important that the process move quickly is that with more exposure comes more risk that a system may have become compromised, even if it has not been detected. Therefore, as time goes on, the necessity of examining systems that were exposed for a signi\ufb01cant period of time arises, making the entire process that much more costly and di\ufb03cult.<\/p>\n\n\n\n<p>Beyond the urgent zero day emergencies, having outreach to policyholders and assuring they are keeping their so\ufb05ware up to date is a good move to reduce risk in general. As a general rule, keeping so\ufb05ware up to date is a good way of reducing a broad number of risks, so doing so automatically and checking in with policyholders on this important issue has excellent ROI.<\/p>\n\n\n\n<p><strong>Further Mitigation:<\/strong><br>As mentioned, organizations that were proactive in their patch management were likely to avoid all losses in the MOVEit attack, and others similar to it.  Any organization that took it upon themselves to engage in the best practices for patch management was likely to have had no problems with MOVEit, but it was still possible to be hit within the first day or two.  Thankfully, there is a great deal more that can be done to mitigate the risks of a zero day, such as MOVEit occurring at a given organization.<\/p>\n\n\n\n<p>The problem is few organizations go all out to protect themselves.  However, those that do can and should be qualified as the lowest risk.  Listed are some additional controls, which, if in place, will further mitigate the risk of a zero day allowing unauthorized access.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Firewalls &#8211;<\/strong> Firewalls are a basic network defensive measure that should be in place to interrogate all internet connections and should be placed on endpoints and between network segments.  In the case of MOVEit, this would have helped in circumstances where the server as primarily limited to internal use or to a few organizations, enforced with firewalls.  In other circumstances, firewalls can contain most of the damage of a zero day attack.<\/li>\n\n\n\n<li><strong>Sandboxing &#8211; <\/strong>Sandboxing is where certain software is run in a controlled, secured and isolated environment, analogous to a sandbox.  This can be done with software that is being tested or that is uncertain.  In secure settings, it is always desirable to have a sandbox mentality.<\/li>\n\n\n\n<li><strong>IPS\/IDS &#8211;<\/strong> Intrusion Prevention and Intrusion Detection Systems are mature technologies that can monitor IT environments for unseal and suspicions activity.  They tend to be very effective, and in the case of MOVEit, it&#8217;s likely that this measure would have been enough to detect such unusual and potentially malicious activity.  If properly configured, IDS can detect something like a connection, happening from an unusual activity and seeking highly sensitive data.  IPS can stop the connection and report it.<\/li>\n\n\n\n<li><strong>Multiple Layers of Access Control &#8211;<\/strong> In the case of MOVEit, most of the servers were connected to the internet and required only logging onto the MOVEit server itself, often with only a login and password.  This was never the safest way to set up this kind of connection.  Instead, it should have been a more secure process involving multiple layers.  Because this software is used for such sensitive files, requiring a separate VPN would make complete sense here and would have prevented the problem.<\/li>\n\n\n\n<li><strong>Offline Backups &#8211; <\/strong>While in the case of MOVEit, the object as not so much to delete data as it was to exfiltrate it, there were also a large number of systems that were locked up or had files deleted or encrypted.  Offline backups are a basic general purpose loss control that every organization should have and which will nearly fully mitigate the risk of data loss or downtime, if done properly.<\/li>\n\n\n\n<li><strong>Data Reduction and Destruction &#8211; <\/strong>One of the reasons these attacks are so severe is that organizations retain a great deal of sensitive data.  Often, they simply do not have to and it is common for organizations to have far more data on hand than they benefit from.  This could have made a powerful difference in reducing the blow of MOVEit.  Do dentists need to collect all the social security numbers of their patients?  Probably not.  Do doctors need to keep the records on file of patients who transferred elsewhere years ago?   At the very least, these things can be taken off line, if not used regularly.  Keeping a slim inventory of sensitive data is an important risk reduction move few organizations practice.<\/li>\n\n\n\n<li><strong>Data Leak Prevention, DLP &#8211;<\/strong> MOVEit was yet another example of the need for greater use of another general purpose data protection measure: DLP or Data Leak Prevention.  It&#8217;s one of the most important and under utilized technologies for loss prevention.  DLP can sometimes be slightly labor intensive, because it requires tracking down potential false positives, but it&#8217;s absolutely essential for high security environments.  DLP would have stopped MOVEit, because it would have detected the attempt to exfiltrate unusual amounts of data in unusual ways.<\/li>\n\n\n\n<li><strong>Internal Only Access &#8211;<\/strong> One of the reasons MOVEit was so bad is that most MOVEit servers are available for connection to anyone with an internet connection. Some can even be found by searching Google.  This is not a sensible way to run a server that is used for exclusive communications of sensitive material.  This is actually common these days, as many organizations use the &#8220;web based&#8221; services they have available for ease of use.  It&#8217;s not necessary though.  Most of these systems should be kept off the wider internet entirely and only used for internal networks and systems.  This is absolutely possible and device and network based security can be enforced a few different ways.<\/li>\n\n\n\n<li><strong>Network Segmentation &#8211;<\/strong> One of the most basic loss control and risk management measures that organizations can take is network segmentation.  As the name implies, this means seperating a network into different portions, so that an attacker who gains access to one portion can&#8217;t leapfrog to other portions.  Most networks are not all that well segmented.  In the case of MOVEit, this particular measure would not have made a huge difference, but it could elsewhere.  For example, the Solar Winds supply chain attack could have been curtailed through network segmentation.<\/li>\n\n\n\n<li><strong>Logging &#8211;<\/strong> Logging is an important risk control measure.  It allows a greater ability to understand what is happening, greater monitoring and response.  Logging may not always prevent problems, but it can make them much easier to respond to and can make the damage much less severe.<\/li>\n\n\n\n<li><strong>Honeypots &#8211; <\/strong>A honeypot, and the related concept of honey web are fake decoy servers, files and repositories, intended to be traps for the bad guys to walk into.  They can serve both to misdirect attackers an obscure the actual valuable files. Additionally, they can be a powerful detective control.  Honeypots would have worked well in the case of MOVEit and can be very effective in other cases.  They are barely deployed at all.<\/li>\n\n\n\n<li><strong>Other General Risk Controls &#8211; <\/strong>There are a number of other basic risk controls that could make a big difference here and in the case of other zero day and third party attacks.  It really all depends on how the attack goes down and which further vectors are utilized. In many cases, zero day attacks are just the first step in breaking onto a network, so all other measures, such as endpoint protection and keeping systems up to date are valid and could be very useful here.<\/li>\n<\/ul>\n\n\n\n<p><strong>Working Toward a Mature System<\/strong><br>Having insurance companies start working to make sure that their policyholders properly respond to zero day emergencies is a good start, but it\u2019s only a start. For one thing, it does not address the risk that may exist in a third party, such as a payroll provider or MSP which many policyholders may rely on. It also only addresses the problem in those who are insured by that company, and while that is always the company\u2019s primary concern, it is important to realize that every ransomware victim helps sustain the con\ufb02agration.<\/p>\n\n\n\n<p>A more mature answer will eventually be to work together, with public sector entities, insurers and so\ufb05ware companies working as one to make sure that everyone gets the message and takes the necessary actions, whether disabling or updating the so\ufb05ware that has been compromised. This is so critical because zero day emergencies constitute the most severe systemic threat of massive loss across the economy. Without some kind of action, its just a matter of time before an even larger loss hits the US economy due to a zero day exploit.<\/p>\n\n\n\n<p>Working together is also critical because zero day hacks need to be identi\ufb01ed as soon as possible. All parties bene\ufb01t from information sharing agreements and mutual aid, but this remains a very immature area of cyber security. Even the federal government lacks any way of coordinating zero day responses across agencies, resulting in massive losses due to unidenti\ufb01ed MOVEit servers at the Justice Department.<\/p>\n\n\n\n<p>In the end, such a system does not need to be expensive. Much of the work can be accomplished by simply having manufacturers of so\ufb05ware include an automated feature to allow them to remotely recall so\ufb05ware, rendering it inoperable unless patched. It is a bit surprising such systems are not universal to so\ufb05ware products, but as things currently stand, most so\ufb05ware does not self-enforce patch requirements for even the most critical updates.<\/p>\n\n\n\n<p><strong>Looking Toward the Future<\/strong><br>This kind of loss is not acceptable.  It&#8217;s something that can&#8217;t be sustained, and it is stupid to continue to allow society to lose so much, when the answer is right in front of us.  Product recall infrastructure clearly needs to be in place.  This is made easier by the fact that &#8220;software as a service&#8221; and automated updates should be able to make it easier to automate software updates. <\/p>\n\n\n\n<p>At present, the biggest hinderance is that software companies do not want to own the problem of how to deal with problems with products.  Most software is sold without warrantee or guarantee and the tech companies are loathed to change that. Such practices are far past the point of obsolescence, but historically only the insurance sector has been able to cause the kind of risk management expenditure that other sectors fight.<\/p>\n\n\n\n<p>The problem of not being able to respond to these &#8220;zero day&#8221; hacks likely will not improve, or will improve only marginally, until there is either insurance sector or regulatory action.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding and Preventing Zero Day And Other Software Supply Chain Attacks This is the second post in the series, intended to help better understand how third party risks can be managed, and addressing the problem of misinformation from high raking &hellip; <a href=\"https:\/\/cybersecuritysanity.com\/?p=213\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[6,26,31,5,2,32,1],"tags":[11,35,9,39,40,43,20,37,38,41,36,34,33,42],"class_list":["post-213","post","type-post","status-publish","format-standard","hentry","category-cyber-insurance","category-justice-system","category-loss-control","category-ransomware","category-risk-management","category-third-party-risk","category-uncategorized","tag-buffet","tag-guide","tag-insurance","tag-loss-control","tag-moveit","tag-patch-management","tag-risk","tag-risk-management","tag-standards","tag-supply-chain","tag-third-party-risk","tag-underwriters-guide","tag-underwriting","tag-zero-day"],"aioseo_notices":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/posts\/213"}],"collection":[{"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=213"}],"version-history":[{"count":11,"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/posts\/213\/revisions"}],"predecessor-version":[{"id":242,"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/posts\/213\/revisions\/242"}],"wp:attachment":[{"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}