Telework exposes vulnerabilities in older ID systems
- By Mark Rockwell
- Sep 22, 2020
Cyber criminals and attackers are adapting to the shifting identity authentication gaps on federal and commercial networks created by the remote work environment, according to federal security experts.
In the last six months, said Sean Connelly, Trusted Internet Connection (TIC) program manager at the Cybersecurity and Infrastructure Security Agency, the attack vector on federal and commercial networks has changed at the expense of older security measures.
With the traditional TIC 2 architecture's "castle and moat" style of cyber protections, said Connelly during a Sept. 22 Venable webcast on identity security, cyber criminals and attackers would look for buffer overflows, DNS and other weaknesses.
In the current work from home environment, attackers have shifted to more interactive techniques, trying to throw users off guard, according to Connelly.
"Now adversaries are trying to get you to click on something, like a social messaging app. How do you put security controls around a social messaging app?" he asked.
Fake social networking profiles aimed at gaining employees' trust, as well as cyber thieves creating fake login pages are also increasing, according to Connelly. "Those attacks are shifting everywhere traditional network security controls are not located," he said. "Many attackers are actually calling employees and encouraging them to logon to those fake pages and then grabbing their credentials from those pages," he said.
"Because we're not physically co-located anymore, there are a lot of authentication factors we used to assume, that we now can't use. If somebody calls the help desk, how are you going to verify them if they can't walk over and show you their CAC [Common Access Card], said Wendy Nather, head of advisory CISO, Duo Security at Cisco during the Venable event. "Those sorts of processes have been breaking down."
"Some of the things that we've long held as pretty strong controls like the PIV [Personal Identity Verification] and the CAC, they have weaknesses now because a PIV card requires an in-person validation, like a fingerprint. That is not as easy to do now," said Ross Foard, a senior engineer in CISA's cybersecurity division during the webcast.
CISA, he said, is using a card similar to a PIV card for new hires that has derived authentication that doesn't necessarily require an initial fingerprint from those new hires.
TIC 3.0 and Zero Trust can help federal networks adjust, but those technologies are emerging, according to the panelists, so network operators should be vigilant, said the experts.
This article first appeared on FCW, a Defense Systems partner site.
Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.
Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.
Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.
Click here for previous articles by Rockwell.
Contact him at [email protected] or follow him on Twitter at @MRockwell4.