THE FIREWALL ISN’T A FIX-ALL

Understanding the limitations of perimeter security

Firewalls.

Everybody in IT knows what they are and nearly every company has them, some even without knowing it. They prevent unwanted communication. In most cases, it’s the first line of defense against network threats. They are effective, and are part of the list of basic requirements for any network security infrastructure.

But are firewalls enough? How about “Next Generation Firewalls”? To answer that, it is helpful to have at least a basic understanding of how firewalls work. Firewalls work like a ticket agent at the airport – you have a ticket? Great, you’re on the flight. No ticket? Go away. In technical terms, firewalls are based on rules that describe the network communication, which can, for example, allow or deny communication only from specific subnets, IP addresses, on particular ports, or no communication at all.

Firewalls haven’t stayed static, and they have become more advanced; like Next Generation Firewalls or Web Application Firewalls. Next Generation Firewalls are like a gatekeeper on steroids – not only will they not let you in if you don’t have a ticket, but will kick you out if you misbehave during the communication for which you had access. Essentially like a bouncer at a bar on New Year’s – you can come in if you have a ticket, but if you start being “fresh” with your fellow party-goers, you get tossed out. Beside basic firewall features, Next Generation Firewalls also contain Application Firewalls, which controls specific services or applications (not just IPs and ports) and Intrusion Prevention Systems, which block unwanted or malicious communication and are also referred to as IPS.

That’s a lot of walls.

Now, let’s look at whether they are as effective as they are expected to be.

Physical access

Picture a situation where an attacker tries to get into your network the easy way – through physical means. Firewalls are configured to ignore any communication that originates in the external network and is aimed at the core switch. The physical attack can include interaction with employees (more on that in our previous blog post), dumpster diving, physical access to areas, even the restricted ones, and more. In most cases, it’s enough to get into a conference room (sometimes even alone), plug your device into the network via wire and the attacker is into the network and off to the races. It’s then possible to set up a remote connection from within the network, because firewall policies for internal networks are often much less restrictive than those for external network (employees need to be able to work), allowing undisturbed access inside the network, not cut off by a firewall.

Remote access

Of course, access can be gained even without any physical access. For example, a new critical vulnerability is discovered for a popular network device provider which allows anyone to execute commands from the console on that device. Cases like this don’t happen every day, but they happen nevertheless. And when they happen, they can be catastrophic, because they are unknown to the existing network security tools or network/network security administrators. An attacker with remote shell access on such a device is then able to do anything. At that point, network is his, not yours.

While vulnerabilities like this are not as common, there are other remote attacks that are efficient, effective, and more common. In our previous blogpost we described one phishing scenario and we can build on that here. Say an attacker sends a crafted .pdf file via email to the victim. Since email communication is something that nearly every company needs, the email itself is not blocked. Maybe it’s disguised as an invoice or as a charity offer (as in the previous blog post), but once that file opens, the attacker gains full access to that computer and possibly even anything that’s available from there. You might think “but we use tools that prevent any malware in emails, we’re safe.” You might be right, but these are functionally just protection against spambots. Keep in mind that this will catch only known files – that are known to the security tool. If someone sends new malware, or specially created malware (which is usually how this attack is accomplished), then it won’t help.

 


 

BYOD

Finally, consider the example of the “personal device” – where (for example) Karen in the Accounting Department brings her phone to the office, and connects it to the network. Karen likes to watch MMA, but happens to use her mobile to stream content from sites which don’t respect authors and performance rights – what might be called a “bootleg feed” or a torrent site. As these streaming sites are notoriously rife with malware, Karen’s device is now infected – because she isn’t deploying mobile device security. When she accesses the trusted internal wifi network via her phone, she is opening up a direct pipeline for all of the malware on her phone, without having to go through the firewall.

In all of these scenarios, the firewall is ineffective, because not all of the communication comes through the firewall. This means that while a firewall is effective, it doesn’t offer 100% protection. Gaps exist, just a few of which have been included here.

But how to close the gap?

With enough time and effort, any network can be penetrated. To minimize the damage, you need to take precautions steps and close gaps left by tools like firewalls. How can you do this? To be able to identify what dangers have escaped your firewall, you need to be able to visualize every communication and every device in the network. Network Traffic Analysis (NTA) solutions monitor network traffic from communications not just through the firewall, but within the firewall as well – closing the gap on not just targeted attacks from outside, but also on BYOD, and other “safe” communications within the network. With full visibility, you know about everything that happens, right when it happens, which means you can respond to detected attacks before any serious damage happens to your organization, saving money, reputation, and your IT team’s sanity.

Identify anomalies

But what good is a mere visibility if there are countless packets every second? No one will be able to go through it all in real time – even with a team of thousands. So how to make sure that this incident gets the attention it deserves? NTA technology also helps to identify anomalous communications – devices acting strangely – on the network. Since an infected device starts to behave differently than it’s normal behavior – even in hard-to-identify ways – NTA technology; like MENDEL from GREYCORTEX, solves the problem, because it analyzes all network traffic and is able to spot these anomalous behaviors nearly immediately. It then informs the network team, allowing them to isolate infected or questionable devices from the rest of the network, preventing further damage, as well as to further investigate the incident without any risk of compromising further devices.

Having a firewall greatly improves the security of your network, but relying only on firewalls is irresponsible for many reasons – poor configuration, advanced threats or above-mentioned gaps. To be sure that nothing leaves your network without you knowing about it or having a say in it, you need bigger guns than just a firewall, even a next generation one. For significant improvement in your security, you need NTA solution to identify the hidden connected devices on the network, as well as to identify anomalous behavior that shows the hidden work of a compromised device.


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

BEING “SMART” DOESN’T MAKE YOU SAFE

As you may have noticed, we have posted a lot on LinkedIn recently about new cyber attacks. The biggest link between these is that those attacks are commonly caused by not following best practices, or relying only on “legacy” security tools and/or the use of weak passwords.

Even with the use of today’s most advanced security tools, it can all fail at the weakest link of the security chain – people. According to csoonline, 56% of IT decision-makers claim that targeted phishing attacks are their top security threat. And this fear isn’t wrong. Everyone can be conned, even conmen. In many cases, it’s easier to get inside of the network if you abuse that fact. The most commonly used methods of exploiting people are phishing and blackmailing.

Phishing in its simplest form can be easily detected by regular humans. Because it’s not targeted, people on the receiving end can simply ask question “why did I get this email when it has nothing to do with me?” When it comes to more advanced phishing forms, like “whale” (going for the big target, e.g. top management or CEO) or spear phishing (targeted attacks against certain group/ individual), the attacker does the research and gets to know as much as possible about victims, which can be done with a search on the Internet or dumpster diving (think about what you throw away – are there any documents?). Once equipped with knowledge about the target, those attempts are way more effective.

Let’s examine it the security context. In this example, paraphrased from Christopher Hadnagy’s book “Social Engineering: The Art of Human Hacking,” an overconfident CEO is the target. The CEO thought that it’s not possible to hack him mainly for two reasons: he doesn’t utilize much technology in his personal life, and he thought that he was too smart to fall for phishing. Turns out he wasn’t that smart after all. In this example, the CEO expected an audit and readied himself for it. After scouring various sources of information, attackers decided to go with: the name of his favorite baseball team, favorite restaurant, and that he contributed funding to cancer research. On one Friday evening, a phone call took place. In it, the attacker approached the CEO with a plea asking about small contribution to the cancer cure research stating that here will be also a contest for contributors – winners will get two tickets to CEO’s favorite baseball team match (claiming that they know that baseball is not everyone’s cup of tea) and a voucher to one of three restaurants, including CEO’s favorite one. The CEO was willing to contribute, motivated by his desire to cure cancer and the possibility of winning tickets and a voucher, he told the attacker his email address, so they would be able to send him a .pdf file. That file contained a malicious code and CEO opened it, thus providing the attacker with access to his computer and everything in its reach.

Now that his computer has been compromised, as well as access to everything within the organization his authority (and passwords) will let him touch. So what to do? The attacker has access from his computer, so access rights to sensitive files are not an issue, nor is it an issue for the security team that the CEO is accessing files throughout the company. Is there a way to identify that the “CEO” accessing sensitive data is not actually the “real” CEO? Here’s where NTA technology can help. The next step following gaining access to the CEO’s accounts is to exfiltrate data. Network traffic analysis identifies that the computer in question is transmitting data where it shouldn’t, and/or in volumes that it shouldn’t. The computer can then be quarantined, the CEO alerted, and the attacker caught.

But while phishing may be the attack that’s on the mind of management, IT teams understand that “legacy” security tools, like sandbox, IDS, endpoint security or even a firewall, are not sufficient anymore. Let’s look at why.

Modern malware has many methods of detecting if it has infiltrated a “real” environment, or in cases of targeted attacks, if it has hit the right target. When such malware determines that it could be exposed, it lies dormant. This means that if you check everything that enters your company using a sandbox, malicious software can still enter the network if it is sufficiently advanced.

Known threats are usually detected by known patterns or hashes used by endpoint security or IDS, which makes them ineffective against new or advanced threats. Some endpoint security tools use AI to determine malicious behavior and are better equipped to fight new threats, but not every device can have endpoint security. Personal or “bring your own device (BYOD)” are a great example – like a laptop that an employee brings from home and connects to the network – or an IoT sensor where endpoint software cannot be installed. These devices are connected, but not secured by endpoint security.

Firewalls are essential to any networks security infrastructure, and stop communication that goes through them, meaning that generally they are able to protect the company for any threat that comes from the external network. But what if the attack starts after a user accidentally opens a communication link which allows the attacker to get behind the firewall and inside the network? What if the threat was brought inside the company by other means than through the Internet and then tries to spread in the internal network?

While the technology is different in each of these possible attacks, they all have one thing in common – attackers who exploit a gap in the security. The best gap fillers currently available are NTA solutions, like MENDEL from GREYCORTEX. MENDEL monitors all network traffic and analyzes changes of behavior in hosts, detects policy violations, data leaks, and much more. Not every unauthorized entry can be prevented before hit happens. Relying on legacy security tools means it can take months (some statistics reference nearly 200 days) to detect attackers as they move in the network. NTA solutions like MENDEL lower this time to between minutes and a few hours, often before actual damage happens in the network or the attacker knows they’ve gained access.

The question is not if you will get hacked. The question is when you will get hacked. And when that happens, are you ready for it and can you stop it, or will you still rely solely on best practices, as the CEO did, or on “legacy” security tools?


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

MENDEL 3.3 RELEASED

April 16, 2019

GREYCORTEX has released the latest version of our MENDEL network traffic analysis solution. Version 3.3 has several important new features which improve detection and response for the network security team.

The biggest is that MENDEL’s detection and visibility capabilities are now available for SCADA/ICS environments. This new capability goes beyond support for several protocols found in earlier versions of MENDEL, and extends it to a whole new module, including the ability to visualize not just devices, but time series in IEC 61850 Goose, SNMP, and IEC104 protocols.

Not content with just SCADA features, we have added new reporting for managers and security analysts, detection and logging of TLS 1.3, and fingerprinting of encrypted traffic on the JA3 framework, as well as increasing the capabilities of the multi-sensor configurations.

New features

  • New managerial and security analyst reports summarize network data and security threats
  • New module for processing and visualization of SCADA protocols, including new dashboards for visualizing time series in IEC 61850 Goose, SNMP, and IEC 104 protocols
  • Added support for parsing CC-link protocol
  • Added support for parsing Enip/CIP protocol
  • Added support for parsing Kerberos protocol
  • Added support for parsing TFTP protocol
  • Added support for parsing IKEv2 protocol
  • Added support for parsing FTP protocol including parsing FTP data streams
  • Added detection engine for SSL/TLS client fingerprints JA3
  • Added multi-disc installation of MENDEL
  • Added GUI localization into Polish and Korean
  • Introduced new light color scheme
  • Integration with firewalls from Check Point

Please note New system of reports will replace in the near future the old type of reports. If you use them don’t forget to configure new reports.

Enhancements

  • Improved installer with enhanced user interface and new features
  • Improved dark color scheme
  • Redesigned severity color scheme
  • Reorganized main menu for better accessibility
  • Redesigned user dashboards for better user experience
  • Improved network capture module for better performance and less resource consumption
  • Improved network models for faster detection and reduced storage demands
  • Improved task planner and optimization of parallelized processing in the service for better resource consumption and management creating faster processing for multiple sensors on one collector
  • Improved detection and reparation of unusual, incomplete, or swapped flows
  • Improved parsing of incomplete or unidirectional flows
  • Improved network capture default configuration for better capture on all configurations
  • Improved processing of Active Directory events for better calculation of logged users
  • Improved Mikrotik plugin
  • Added button to restore user dashboards to default
  • Improved creation of complex firewall rules in plugin
  • Improved HTTP proxy pairing for incomplete or invalid communication

Bug Fixes

In general, our development team focused on improving the user experience and reporting.

Contact your local GREYCORTEX partner to find out how you can put MENDEL v3.3 to work for you.


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

GREYCORTEX JOINS MICROSOFT CYBERSECURITY TECH ACCORD

On January 18, GREYCORTEX joined the Microsoft Cybersecurity Tech Accord along with 10 other companies. This brings the total to 79 signatories committed to improving the security of cyberspace. Together, GREYCORTEX and the rest of the Tech Accord members pledge to protect users and customers everywhere. GREYCORTEX joins a global expansion, contributing to the increasingly diverse reach of the signatory community – further broadening the dialogue around cybersecurity with signatories from Argentina, Bulgaria, Chile, the Czech Republic, Germany, Luxembourg, The Netherlands, Slovakia, and the United States, expressing a commitment to a more secure cyberspace. This expansion continues to deepen the group’s expertise, adding to the variety of sectors and technologies that characterize the organization.
“As a company focused on the development of network security solutions, we couldn’t agree more strongly that defense, regardless of the type or goal of the threat, is essential to defend the world from cyberattacks. Moreover, we firmly believe that governments and enterprise should act defensively, and that such defense should be both simple and complete. We are happy to be part of the Cybersecurity Tech Accord,” said Petr Chaloupka, GREYCORTEX CEO.
By joining the agreement, the signatories agree to four key commitments:
a stronger defense against cyberattacks – pledging to protect all customers globally regardless of the motivation for attacks online;

  1. a stronger defense against cyberattacks – pledging to protect all customers globally regardless of the motivation for attacks online;
  2. taking no offense by choosing not to help governments launch cyberattacks against innocent citizens and enterprises and will protect against tampering or exploitation of their products and services through every stage of technology development, design and distribution;
  3. doing more to empower developers and the people and businesses that use their technology, by helping them build and improve capacity for protecting themselves; and
  4. building on existing relationships and taking collective action together to establish new formal and informal partnerships with industry, civil society and security researchers. The goal being to improve technical collaboration, coordinate vulnerability disclosures, share threats and minimize the potential for malicious code to be introduced into cyberspace.

Since forming the Cybersecurity Tech Accord, the signatories have supported initiatives on email and routing security, implemented Domain-based Message Authentication, Reporting and Conformance (DMARC) in their own operations, participated in global requests for comments on the UN’s new High Level Panel on Digital Cooperation, and endorsed the Paris Call for Trust and Security in Cyberspace as an early supporter. Additionally, the group has coordinated with like-minded organizations such as the Global Cyber Alliance, the Internet Society, and the Global Forum on Cyber Expertise (GFCE).


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.