Salt Storm Didn’t Hack Their Approach In – They Logged In
The Salt Storm marketing campaign, a complicated operation attributed to a state-sponsored actors, revealed a chilling actuality: attackers don’t all the time want exploits to breach essential infrastructure. As a substitute, they used stolen credentials and protocol weaknesses to mix in seamlessly.
Right here’s how their playbook unfolded, based mostly on reviews from Cisco Talos and different sources:
- Goal Directors: Attackers centered on community operators with excessive privileges, managing routers, switches, and firewalls.
- Harvest TACACS+ Site visitors: Conventional TACACS+ encrypts solely the password subject, leaving usernames, authorization messages, accounting exchanges, and instructions in plaintext, susceptible to interception.
- Steal Credentials: Attackers captured TACACS+ site visitors to extract passwords (crackable offline) and different delicate information, resembling gadget configurations, to allow unauthorized entry.
- Exfiltrate Knowledge: TACACS+ classes and gadget configurations have been quietly collected and despatched offshore for evaluation, masquerading as regular admin site visitors.
- Mix in as Admins: Utilizing stolen credentials, attackers authenticated like reliable directors, issuing instructions and producing logs that appeared routine.
- Evade Detection: By analyzing plaintext accounting information, attackers understood log patterns and cleared traces (e.g., .bash_history, auth.log) to cowl their tracks.
- Transfer Laterally and Persist: Over months or years, they expanded entry throughout gadgets, sustaining sturdy footholds in essential infrastructure.
The brilliance of the marketing campaign wasn’t in breaking the system. It was in residing contained in the system by abusing weaknesses in an outdated protocol.
The marketing campaign’s success lay in exploiting TACACS+’s outdated safety mannequin, turning routine admin site visitors right into a goldmine for attackers.
The Legacy Drawback: TACACS+ in a Trendy Risk Atmosphere
TACACS+ (Terminal Entry Controller Entry-Management System Plus) has been a cornerstone of gadget administration for many years, offering authentication, authorization, and accounting (AAA). Nonetheless, its design displays a pre-Zero Belief period:
- Restricted Encryption: Solely the password subject is encrypted; usernames, instructions, authorization replies, and accounting information stay in plaintext.
- Replay Threat: With out cryptographic session binding, captured TACACS+ site visitors may theoretically be reused to authenticate or execute instructions, although particular proof of this in Salt Storm is proscribed.
- Predictable Logs: Plaintext accounting messages permit attackers to check and anticipate log entries, aiding evasion ways like log clearing.
- Trusted-Community Assumption: TACACS+ was constructed for inside networks, not trendy environments with distant entry or untrusted connections.
These flaws make TACACS+ a legal responsibility in right now’s risk panorama, the place attackers exploit intercepted site visitors to impersonate admins.
Why Replay Assaults Are a Concern?
Whereas not explicitly confirmed in Salt Storm’s ways, the danger of replay assaults in conventional TACACS+ is critical resulting from its lack of session-specific cryptographic protections:
- Authentication Replay: Captured authentication exchanges may doubtlessly be reused to realize entry.
- Authorization Replay: Stolen authorization tokens may permit attackers to execute privileged instructions.
- Command Replay: Recorded command strings might be repeated to imitate reliable admin actions.
This vulnerability stems from TACACS+’s absence of ephemeral keys or timestamps, making captured site visitors seem legitimate. Salt Storm’s credential theft and log manipulation spotlight how such weaknesses may be exploited to mix into regular operations.
Cisco’s Reply: TACACS+ Over TLS 1.3
Cisco has addressed these vulnerabilities with TACACS+ over TLS 1.3 in Cisco Identification Providers Engine (ISE) 3.4 Patch 2 and later releases, delivering a strong, standards-aligned resolution for securing gadget administration. This implementation leverages TLS 1.3 to offer:
- Full-Session Encryption: All TACACS+ site visitors – usernames, authorization replies, instructions, and accounting information is encrypted, eliminating plaintext publicity.
- Replay Safety: Ephemeral session keys guarantee every change is exclusive and non-replayable, rendering captured classes ineffective.
- Trendy Cipher Suites: TLS 1.3 makes use of safe, up-to-date ciphers, hardened towards downgrade and interception assaults.
This resolution instantly counters the vulnerabilities exploited by Salt Storm, resembling plaintext information exfiltration and potential session reuse, guaranteeing admin site visitors stays confidential and tamper-proof.
Going Past Encryption: Stopping Credential Abuse with MFA
Encryption secures information in transit, however stolen credentials stay a threat. Cisco’s ecosystem integrates Cisco ISE with Cisco Duo multi-factor authentication (MFA) to handle this:
- Duo MFA: Requires a second issue for gadget admin logins, neutralizing stolen or intercepted credentials.
- Zero Belief Alignment: Steady verification ensures that even legitimate credentials can’t be used with out further authentication, thwarting impersonation makes an attempt or credential theft.
This mix strengthens administrative entry controls, aligning with Zero Belief ideas of by no means trusting and all the time verifying.
Why This Issues Now
Identification-based assaults, like Salt Storm, are more and more frequent amongst nation-state and felony actors. Reasonably than counting on exploits, attackers goal protocols and credentials to realize persistent entry. For organizations utilizing conventional TACACS+:
- You threat exposing usernames, instructions, and accounting information in plaintext.
- You’re susceptible to credential theft and potential session replay.
- Your logs may be studied and manipulated by attackers.
- It’s possible you’ll not meet trendy compliance requirements, resembling NIST 800-53, FIPS 140-3, or PCI DSS, which require sturdy encryption and authentication.
Cisco’s TACACS+ over TLS 1.3, mixed with Duo MFA, presents a number one resolution to safe gadget administration, supported by Cisco’s intensive expertise in community safety.
The Takeaway
Attackers like Salt Storm exploit weaknesses in outdated protocols to impersonate admins and persist undetected. Conventional TACACS+ leaves essential information uncovered and susceptible.
With Cisco ISE 3.4 Patch 2 and Duo MFA, you’ll be able to:
- Encrypt all TACACS+ site visitors with TLS 1.3
- Forestall credential theft and session replay
- Block unauthorized entry with MFA
- Defend logs from evaluation and tampering
- Meet compliance necessities (e.g., NIST, FIPS, PCI DSS)
- Implement Zero Belief for gadget administration
Safety threats evolve quickly. Your AAA technique should hold tempo. Cisco’s resolution empowers you to safe your directors and defend your infrastructure from subtle assaults.
Learn extra about Cisco ISE.
We’d love to listen to what you suppose! Ask a query and keep related with Cisco Safety on social media.
Cisco Safety Social Media
Share: