Avast Says Hackers Breached Internal Network Through Compromised VPN Profile (zdnet.com) 13
An anonymous reader writes: Czech cyber-security software maker Avast disclosed today a security breach that impacted its internal network. In a statement published today, the company said it believed the attack's purpose was to insert malware into the CCleaner software, similar to the infamous CCleaner 2017 incident. Avast said the breach occurred because the attacker compromised an employee's VPN credentials, gaining access to an account that was not protected using a multi-factor authentication solution. The intrusion was detected on September 23, but Avast said it found evidence of the attacker targeting its infrastructure going as far back as May 14, this year. The identity of the attacker is currently unknown, but the company said hackers didn't manage to modify CCleaner downloads this time around.
Kiss of death? (Score:5, Insightful)
Re: (Score:3)
Especially when it is by pure negligence that the compromise was allowed to take place.
What on earth would lead someone to believe that a firewall-bypassing link to an internal network should not need a second authentication factor?
Is it time to rethink TCP/IP? (Score:2)
This is the second VPN hack today. Perhaps we need to rethink the TCP/IP protocol. As it was initially intended for a rather closed network, of trusted computers, which it became the go to for almost all communication, where encryption of the data portion of a packet isn't enough anymore, perhaps we need to really rethink what is going on.
Re: (Score:2)
Re: (Score:1)
There's nothing wrong with TCP/IP that needs fixing, it does exactly what it was designed to do, however there is something defective with th
Re: (Score:2)
Sounds like a great idea:
https://xkcd.com/927/ [xkcd.com]
Re: (Score:2)
No, it's the VPN software. There's not one native OS client other than strongswan that supports both enterprise EAP methods and a second phase of authentication when using modern (IKEv2) IPSec configurations. So unless you do hardware keys as the second factor, or do your second factor post-tunnel-establishment (block the user's VPN IP until they 2FA) you are stuck with using shitty systems that use IKEv1 and XAUTH, and most of the commercial MFA providers further want you to expose your RADIUS infrastruc
Re: (Score:2)
Then phone and talk to another member of staff to get a code just for that dongle. Using the human voice as a person on the phone.
Use humans to add to the layers of security. To get a one time code thats only good for that session.
A smaller private secure VPN crated over the company VPN?
Secure networks per session over secure networks to ensure more security?
Layers of new code, hardware and new crypto on the existing network crypt
Re: (Score:2)
Or... the main providers of native OS client software (apple, microsoft, google) could just fix their crap so the existing 2FA solutions work solidly and present themselves in a way the users can understand.
OTP and Crypto keys are both adequate solutions. Some of the cell-based solutions aren't too awful if your cell is an MDM-managed corporate-issued device. Barrring that, running OTP or even IM (not SMS) at least raises the bar so both the phone and access credentials have to be compromised.
What makes i
Re: (Score:1)
Is someone paying you to derail the conversation with this stupid bullshit? TCP/IP had nothing to do with how the VPN endpoint got compromised, so telling people that changing to something else would have prevented it is both false and harmful.
Friendly reminder (Score:4, Insightful)
Re: (Score:2)