The Ripple Effect of the CrowdStrike Incident – An Expanded Attack Surface and Potential Future Threats

The CrowdStrike incident in July 2024, which resulted in the blue screen of death (BSOD) affecting millions of Windows computers globally, not only highlighted vulnerabilities within IT infrastructure but also potentially handed malicious actors new clues about weak points to exploit. This incident underscores the increased attack surface area and the heightened risk of future attacks targeting critical infrastructures such as shopping malls, airports, hospitals, and other essential services.

If you missed my previous blog explaining the CrowdStrike Incident, you can refer it here: Understanding the CrowdStrike Incident of July 2024

The Expanded Attack Surface

An attack surface refers to the various points within a system or network that could be vulnerable to exploitation by attackers. The CrowdStrike incident has inadvertently revealed new attack vectors, potentially increasing the attack surface in several ways:

Critical Infrastructure Vulnerabilities

  1. Airports and Airlines: The disruption caused flight delays and cancellations, exposing the vulnerabilities in the IT systems of airlines and airports. Attackers now see these systems as potential targets for future attacks, aiming to cause widespread chaos and economic damage.
  2. Hospitals and Healthcare Services: The incident highlighted the susceptibility of hospital IT systems, where even minor disruptions can have life-threatening consequences. Attackers could exploit these vulnerabilities to launch ransomware attacks or disrupt critical medical services.
  3. Shopping Malls and Retail Services: Retail services were also affected, indicating vulnerabilities in the digital payment systems and supply chain management. Future attacks could aim to steal customer data, disrupt sales, or manipulate inventory systems.

Increased Interconnectivity

The interconnected nature of modern IT systems means that an attack on one system can ripple out to affect many others. The CrowdStrike incident demonstrated how interconnected services, from cloud providers to local networks, can be impacted, making the entire ecosystem more vulnerable.

Remote Work and Digital Transformation

The rise of remote work and the accelerated digital transformation in various sectors have expanded the attack surface. Remote work setups often rely on less secure home networks, which can be exploited by attackers to gain access to corporate networks.

Supply Chain Attacks

The incident showed how updates and third-party software can be vectors for attacks. Attackers might focus more on supply chain attacks, targeting software vendors and service providers to infiltrate their customers’ systems.

Potential Future Attacks

Given the expanded attack surface, several types of attacks could become more prevalent in the future:

Ransomware Attacks

Ransomware attacks on critical infrastructure like hospitals, airports, and retail networks can cause significant disruption and compel organizations to pay hefty ransoms to restore their operations. The heightened awareness of these vulnerabilities may lead attackers to increasingly target these sectors.

DDoS Attacks

Distributed Denial of Service (DDoS) attacks can overwhelm the systems of airports, airlines, and large retail chains, causing outages and service disruptions. These attacks could be timed to coincide with peak periods, such as holiday travel seasons or major sales events, to maximize impact.

Data Breaches and Theft

Attackers may focus on stealing sensitive data from hospitals and retail networks, such as patient records and customer payment information. This data can be sold on the dark web or used for identity theft and financial fraud.

Advanced Persistent Threats (APTs)

APTs involve attackers infiltrating networks and remaining undetected for extended periods, gathering intelligence, and causing damage. Critical infrastructure and large corporations could be prime targets for such sophisticated attacks.

Mitigating the Risks

To combat these potential threats, organizations must adopt robust security measures:

Enhanced Security Protocols

Organizations must implement comprehensive security protocols, including regular updates and patches, multi-factor authentication, and advanced threat detection systems.

Employee Training and Awareness

Employees should be trained to recognize phishing attempts and other common attack vectors. Regular security awareness training can significantly reduce the risk of successful attacks.

Network Segmentation

Segmenting networks can limit the spread of an attack and protect critical systems. By isolating sensitive areas of the network, organizations can contain breaches and minimize damage.

Incident Response Planning

Having a well-defined incident response plan is crucial. Organizations must be prepared to respond swiftly and effectively to minimize the impact of any security breaches.

Collaboration and Information Sharing

Collaboration between organizations and government agencies can enhance overall security. Sharing information about threats and vulnerabilities can help organizations stay ahead of potential attacks.

Conclusion

The CrowdStrike incident of July 2024 has not only exposed critical vulnerabilities in our digital infrastructure but also expanded the potential attack surface for malicious actors. By understanding these vulnerabilities and adopting proactive security measures, organizations can better protect themselves against future threats. It is imperative to recognize that as our digital world evolves, so too must our strategies to safeguard it, ensuring resilience against the ever-growing landscape of cyber threats.

Important References

  1. “Security Engineering: A Guide to Building Dependable Distributed Systems” by Ross Anderson
  2. “Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems” by Heather Adkins, et al.
  3. “Zero Trust Networks: Building Secure Systems in Untrusted Networks” by Evan Gilman and Doug Barth
  4. Research Paper: “Network Segmentation: Architecture and Use Cases” by the SANS Institute

Optimising Traffic Capacity In an Age of Terabit DDoS Attacks

Optimising Traffic Capacity In an Age of Terabit DDoS Attacks [1].

The exponential growth in both hardware and software marvelling engineering crafts has opened new opportunities for both consumer and enterprise industry. On the cross roads of offered services and demand, it is crucial for business to focus in an entirely new way to look for the business risk mitigations. The rise of internet technology and related threats since its inception has was not same as in last few years. Just to quote an example, as per Arbor NETSCOUT [2], there are not less than 55% of global world population on Internet and they have on an average 5.5 devices per person. This is not only an exponential proliferation but an exponential growth in process as we talk.

Screen Shot 2019-03-15 at 10.39.54 am

With this growth, projection and future trend, it is not that surprising to see some of the grave risks to business in terms of DDoS attacks. DDoS attack happens with a variety of reasons and in this article we are not talking the details, however the inference we take from this observation [2] is that business need to invest more in being proactive for such situations.

Screen Shot 2019-03-15 at 10.42.41 am

The classical information security policy which governs on how much to invest on security requirements need to be more pervasive to these reports, so that the overall defence strategy remains in good stead. In general, security investment is always a passive expenditure and a day to day return is never expected. Moreover, in a situation like these reports, where we do not have a quantifiable past data against a company’s infrastructure it is very hard to do a forecast analysis and come up with the best strategy to invest in “what” and “where”.

The smart way of next generation security investment should address “what value investment” we get off the solution/product we deploy as a countermeasure and still not using it for the scoped purpose (standby usage). To my experience, in case of Arbor I see Arbor SP’s very important role in analytics. Even if we deploy Arbor SP platform (as an example) for network attack detection, we can use the tool to understand different network sources, types and patterns which will eventually act as a critical piece of information in capacity planning of various Transit, BLPA, MLPA and PNI exit points.

Of course these consideration require a singularity of management understanding over technical sensitivity to business. Its imperative that, in today’s pace of industrial changes we start thinking not only in terms of one specific domain but to go for a multi-abstract solution which is relevant not only for security but serves a broader purpose of “an intelligence feed” for overall traffic management.

People who come from a traditional 3-tier architecture and the technologies behind perimeter security and embedded end point security understand how the hybrid approach is used in our classical strategy of enterprise security needs. Generally we used to have firewalls, IDS and end point agents detecting anomalies and taking actions. These measures do have some limited intrinsic capabilities to offer first layer of defence, however when we have an attack which is,

  1. Either not detected using classical perimeter security, or
  2. The volume of such attack is beyond the capacity of provisioned infrastructure

We can not bank on them to get a solution. So, when it comes to the broader question of optimising traffic capacity against forecasted trend of global DDoS attack, we need to understand that,

  1. There is no perfect model
  2. There is no direct correlation to DDoS attack size and growth
  3. There is no single DDoS mitigation plan to protect your core network, and
  4. A hybrid approach is best to optimise the budget, security needs and mitigation.

In DDoS world the way a countermeasure works, or more specifically the type of countermeasure chosen is a function of the type of attack. This necessitates the need of a hybrid model. It is very difficult and quite impossible to freeze an industry best perfect model as we know that (from the history) the attack landscape is changing each day. In Industry as of today, for any enterprise  (or any large network) network a DDoS counter measure can be achieved in one of the three ways, or can be combined in case of multi vector attacks.

  1. Remote Scrubbing
  2. ISP Mitigation
  3. On-Premise mitigation

Remote Scrubbing is well suited in a situation where we have DDoS attack targeting a customer’s network with a very high volume, which the network itself is not having a capacity to handle. In these situations, an on demand cloud scrubbing can be initiated with Cloud Scrubbing Service Provider (CSSP) like F5 Silverline or Arbor. This work on the basis of BGP prefix advertisements. The prefix to be scrubbed (the attacked network) is advertised by CSSP and the cleaned traffic is handed over to the customer. This method adds a bit of latency post in post scrubbed traffic, but is tolerated compared to the loss of service. The other method was to do a RTBH where we make the service completely black-holed.

ISP mitigation, is to tell the ISP themselves to do a RTBH. This is well suited in case of a volumetric attack where we know the rogue source. These are the attacks that use massive amount of traffic saturating the bandwidth of the target. Volumetric attacks are easy to generate by employing simple amplification techniques. Example, NTP Amplification, DNS Amplification, UDP Flood, TCP Flood. This is much cheaper than CSSP (even free) as this do not require any service provisioning which is required in case of CSSP. ISPs provide specific BGP community which we can use in advertising the subnet we want to blackhole and ISPs, once they receive the community start doing the blackhole. According to Arbor Networks, 65% of DDoS attacks are volumetric in nature [3]. A organisation can also make use of FlowSpec capabilities to make traffic discard process more specific.

On-Premise mitigation (referred as OTP i.e. On-Premise Threat Protection) is to add TMS (Threat Management System) appliance in the network itself and doing an in-house scrubbing. In practice, OTP functions exactly the same way as CSSP works. In fact, if you look into the cloud console of any CSSP like F5 Silverline or Arbor, you will see the same console you get for OTP. So, if you have same vendor for both CSSP and OTP, you will have more singular experience. Deploying OTP require a careful examination of existing network, the sections which are vulnerable and routing decisions to make in diverting and re-injecting the attack (dirty) and legitimate (clean) traffic. There are various method to achieve this objective and it depends on the type of network and security objective scope on how to deploy it. As an example following is the complete Arbor stack for all three options.

Screen Shot 2019-03-15 at 11.14.01 am

It is important to note that as we discussed earlier about the standby usage of the solution, in case of OTP, we do have analytical capabilities in doing on demand packet captures using TMS appliances in understanding the traffic details (if required).

So, although it is always good to have all the solution in place if budget allows, an enterprise may chose one of them or all. There are other considerations as well like which vendor to chose and how to operationalise DDoS mitigation practice in enterprise as a business as usual process, which are as crucial as the solution itself. In all the cases, it is very crucial that we take in consideration what is happening globally in the internet cloud and how the future of security defence in evolving in making a network immune to risks.

References:  

[1] This article is an outcome of the webinar session by JP Blaho, Product Marketing on Brightalk.

[2] http://public2.brighttalk.com/resource/core/221711/capacity-managementwebinar21219_483572.pdf

[3] [https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf]

[4] Image: https://www.pinterest.com.au/pin/836895543232227709/