Alleged CIA hacking documents reinforce need for SSL traffic inspection

WikiLeaks last week released thousands of documents containing several hundred million lines of code that it claims shine a light on the solutions and tactics the Central Intelligence Agency used to spy and hack into devices, including smartphones, computers and smart televisions.

While there are still questions around the documents’ authenticity, if they are legitimate they show that the CIA has used sophisticated tools to, among other things, conceal malware and listen to technology in SSL encrypted traffic.

>See also: WikiLeaks exposes apparent CIA spying secrets

Nation states are already known to be in possession of sophisticated tools, such as those alleged by WikiLeaks, but with the attention that leaks such as this draw, the tools and ideas are now proliferating in the wild and are increasingly being used for more nefarious activities.

HIVE and command and control

There are numerous delivery mechanisms for the malware, but once implanted, most of them rely on some kind of command and control (C2) infrastructure. This infrastructure is generally used to control the malware and botnets, and it may be directly controlled by the malware operators or run on hardware compromised by the malware.

WikiLeaks alleges that the CIA has a dedicated project, called HIVE, which is a multi-platform malware suite that provides command and control (C2) over “customisable implants for Windows, Solaris, MikroTik (used in Internet routers) and Linux platforms and a listening post (LP)/command and control (C2) infrastructure to communicate with these implants.” HIVE specifically uses SSL (HTTPS) to cover its tracks, according to WikiLeaks.

While the use of SSL for Command and Control of malware is increasingly common, HIVE went a step further and introduced the use of client-certificate authentication, a technique that allows them to mitigate the risk of SSL interception, WikiLeaks alleges.

The power of SSL inspection

Although A10 is not in a position to comment on WikiLeaks’ allegations, it does highlight the importance of understanding what’s in encrypted traffic and possibly hiding in plain sight. It’s up to you as a business or a consumer to decide what traffic you determine is good and what is undesired.

There is no doubt that the concealment techniques for command and control traffic as used by HIVE will very soon be in public domain and will fall into the hands of bad actors who can use them for their own purposes.

>See also: Don’t trust the TV in the boardroom

Even script-kiddies will have access to sophisticated tools, like those alleged by WikiLeaks and used by nation states, which will enable them to conceal their footprints.

If these techniques are allegedly being employed by the intelligence community to protect national interests, imagine what methods APTs (advanced persistent threats) are using to hide within the SSL/TLS blind spot to target your business and intellectual property for exfiltration.

The Verizon Data Breach Investigations Report indicates that 89% of breaches had a financial or espionage motive. That is why being able to decrypt and inspect encrypted traffic is a wise business decision.

Defence in depth

A10 encourages the use of best of breed solutions for robust security protections from the evolving threat landscape and to maximise your layers of defence. Having multiple layers of security increases the chances of catching and eradicating malware before it has the opportunity to wreak havoc. A multi-layered defence will also mitigate the risk of any single device being compromised and being rendered ineffective.

Additionally, we strongly encourage the use of a hardware security module (HSM) to safeguard and manage SSL private keys, which can be construed as master keys for any digital encrypted communications, to ensure strong authentication and privacy.

>See also: An election disrupted by technology: Did tech help Trump win?

To summarise, A10 recommends the following to protect your organisation:

· Maximise your layers of defence.
· Minimise the sprawl of your private keys.
· Protect private keys via HSM.

 

Sourced by Duncan Hughes, systems engineering director, EMEA, A10 Networks

Avatar photo

Nick Ismail

Nick Ismail is a former editor for Information Age (from 2018 to 2022) before moving on to become Global Head of Brand Journalism at HCLTech. He has a particular interest in smart technologies, AI and...

Related Topics