hoFFy wrote: ↑Jul 05, 2021 6:38 am
Hi Rob,
I don't know how to tell you exsctly what I think, maybe because I'm no native speaker, but let's try.
I'm working for an IT service provider with very small customers up to up to customers with about 1000 employees. Over the last years I've seen and heard a lot. It starts from "why do I have to by anti-virus licenses for my servers? Only the clients are receiving emails and surfing the web" to "I only want to by 2 USB drives, they are so expensive. Two backups are enough".
At the moment I'm working with a new customer who called us in is darkes hours: Hafnium hit him hard. He patched his Exchange 2016 Server on March, 13th. But only with the CU19 from december and without installing any further security patches. Within days webshells have been deployd but nothing more happened (from the customers PoV). In mid-June he was wondering about slow server performance and called his old IT service provider who found out that he has been infected, but he couldn't help him "because lack of time"..... So the customer has a cyber security ensurance, which called a IT forensic company whose experts imediatly told him to shut down all systems. Thats where we joined the game. Whe had been called to extract all data for a deeper analysis and be some kind of remote hands for the forensic company. Together we found out that the customer was under attack since early April. Anti-Virus software has beend continuously deleeting web shells on the Exchange Server("why should I install AV on my servers?" you remember?). But one day the got through, were able to delete anti-virus software, extract admin credentials, walk through the servers and install crypto-mining software on every server. In my opinion the attackers had all aces in their hand and all they did was installing crypto miners, which worked with 100% CPU usage... only a matter of time until somebody wonders why servers are so slow.... Having a good backup might be enough by just doing a full system recovery and be happy. But we found out that the typical 14 days retention policy wasn't enough. Attackers where in the system even before the oldest restore point and at that time the domain controller already has fallen. EVERY serious security expert will tell you that its not enough to recover your data which was already infected, do a full system scan with one or two anti-vrus scanners and go online again. At the moment we are rebuilding his whole environment from scratch.....
I know this isn't exactly what you asked, but it's an example on how things can go, if you don't have a high retention policy. And even then: Only a few companies are able to recover from restores with month-old-data. Not only the loose of reputation by their customers when calling ("hello sir, yes we had an attack and lost all our data of the last 4 month. No, we also lost all construction data for our $$$-project. Yes we have to start fom scratch. Are we still friends?..") but also the loose of data, value and so on over the last month... all will be lost. Only a few can really think of what that will mean to their business.
Second example, which I only heard of: Backup server, not on the domain. Backup copy to a seperate place, in case of fire. Backup to cloud, because of... its better and the evil hackers.... All kind of security soft- and hardware. Small company, 30 employees, working 100% digital and relying completly on their IT. The firewall / router hasn't been patched agains a new vulnerability in its VPN-stack, attackers had been able to enter through the VPN login of the manager. By the use of software like Mimikatz they were able to extract cached login data and made their way through the servers with high privileges. It took them several weeks, but in the end thei made their way to the backup server (RDP from one of the domain joined servers which had been use by the IT service provider), changed the retention policy in the jobs to be sure that there will be no valid data, then deleted every backup they could find and had direct access to. Then they started to encrypt every data on every server. When finished they asked for Bitcoins worth 250.000$. They were so professional, one had to open a page in the dark net, start a chat with the attackers (which by the way hat their own opening hours for their chat so you had to wait for them) and then you had to talk to them. They told you very directly how they were able to get into your environment and what they found out about this company over the last weeks just do demonstrate that they have you by the balls.
This all ended up in paying the attackers (much lower than the original 250.000$), because no one was able to help them. They got an
encryption key and got their data decrypted.
These stories should tell you something, may be you should try reading between the lines. Don't be so arrogant as you have been in this complete thread! There will ALWAYS be a zero day vulnerabiltiy in Windows, ESXi, your NAS box, firewall / router, all you can think of.
Air gapped should mean there is no open port to nowhere. If you are running physical backup servers at all your small business companies, then this one should not be able to connect to by RDP, VNC, other software or even BMC. And if there is a NAS-box as abackup target: Only connect it to the backup server. To nothing else. Even not to a network switch. Or do you think a network switch is safe? They also have vulnerabilities or standard credentials like admin : admin allowing the attacker to use port mirroring to catch network packets which allow him to extract login data (when no
encryption is being used). Your backup servers should also not make use of remote managemt software. Have you heard of SolarWinds...? In the case of having to get in touch whith the serves you should need to walk to them, connect a keyboard and mouse. There should be NO other option. And your retention policy.... long enough, but not that long... I already mentioned above. Customers always have to ake use of every possible security option, starting from anti-virus software, over MFA, strict security policies, etc. etc. . And in the end attackers will always be one step in front of us. The only thing you can do is to make live for them very hard, because they are trying to cath the low hanging fruits and make the most money out of them. Secure environments, where they have to circumvenct several lines of security, might be of lower interest of them passing by and attacking the next one.
But again: Never be so arrogant to think you are safe just because the server is not domain joined and your ESXi has been patched. There will be one day where the systems are not patched the same day, or patches are not already released. And then there is the real chance that you'll be hit. Have you heard of Microsofts printer nightmare? There's no patch at the moment, but one can create an privleged account an run malicious code.