Category Archives: Security

Shionogi vSphere Breach

The US DoJ released a press announcement two days ago that says a virtualized environment administrator has admitted to a serious breach.

In the early morning hours of February 3, 2011, Cornish gained unauthorized access to Shionogi’s computer network. Cornish used a Shionogi user account to access a Shionogi server, then took control of a piece of software that he had secretly installed on the server several weeks earlier.

Cornish then used the secretly installed software program to delete the contents of each of 15 “virtual hosts” on Shionogi’s computer network. These 15 virtual hosts (subdivisions on a computer designed to make it function like several computers) housed the equivalent of 88 different computer servers.

That “secretly installed software program” they are talking about sounds really nefarious, but it is actually just VMware vSphere. It is explained better in the formal complaint.

…on or about January 13, 2011, defendant Cornish accessed the CVAULT account and used that to install vSphere — the software program believed to have been used to delete Shionogi’s virtual hosts…officials advised that there was no legitimate business reason for vSphere to be installed or running on the SPVC01 Server.

The press release says Cornish did not attempt a sophisticated attack. He accessed his ex-employer and installed vSPhere from his home network. When he connected again to cause harm (two weeks later) he went to a McDonalds and used his credit card to buy breakfast before using the free wifi.

The investigation by the FBI’s Cyber Crimes Task Force revealed that the attack originated from a computer connected to the wireless network of a Smyrna McDonald’s where Cornish had used his credit card to make a purchase minutes before the attack. Cornish also gained unauthorized access to Shionogi’s network from his home Internet connection using administrative passwords to which he had access as an employee.

The formal complaint again gives more detail.

According to McDonald’s business records, a Visa credit card number ending in 8291 (“the 8291 Visa”) was used at the Smyrna McDonald’s to make an approximately $4.96 purchase…approximately 5 minutes before the attack…

Approximately $4.96? I’d like to see a more exact purchase record.

It seems like he either wanted to be caught or didn’t care much about the risk. Google confirmed that the same credit card number that bought breakfast was linked to an email account used by Cornish. And the credit card issuer, BofA, confirmed that Cornish is the account holder.

Given the timeline and the software and network details this case really boils down to termination procedures and risk management. It’s not about secret software. It’s about a bad actor who abused trust. Cornish worked for Shionogi from 2009 to 2010. The complaint suggests his attack was successful because he could authenticate and use systems many months after his departure without being noticed.

So, on the one hand the DoJ press release is a success story. Logs were available from multiple sources for at least six months of activity and were used to quickly apprehend and get an attacker to admit the crime. On the other hand the details of the attack beg a question of precautions and operational awareness.

It is unfortunate that Shionogi was a victim of this crime but will someone say they should have taken better care, like changing passwords after staff were terminated or left? In other words should a company be externally required to take precautions against an availability loss if there is no impact outside the company (e.g. no regulated data risk)?

It’s a classic case of attack economics. Should a business invest in thicker glass, replace their glass altogether, or improve the chances of catching someone who throws bricks? A related question would be whether and when a victim should realize the level of risk. Did Shinonogi make a conscious decision to leave themselves exposed, or were they somehow led to believe they were safe from easy but devastating harm ($300,000) by former employees?

It’s a good case study of security and compliance as well as the double-edge of remote administration tools in virtual environments.

vCenter Orchestrator AMQP Plugin Released

VMware’s vCenter Orchestrator has a plugin now to develop and automate workflow with the Advanced Message Queuing Protocol (AMQP) — manage brokers and run custom operations.

With this new plug-in, organizations will be able to define policies that automatically trigger specific workflows based on certain AMQP messages. For instance, as part of a vApp pre-provisioning activity in vCloud Director (vCD), vCenter Orchestrator (vCO) can intercept the provisioning request and automatically fetch an IP address from an external system before telling vCD to proceed with the provisioning activity. Or, upon detecting that the vApp provisioning operation is complete, vCO can update CMDBs and other management systems with information about the new vApp instance. What’s more, the AMQP plug-in provides the ability to not just monitor but also publish AMQP messages and conduct administrative tasks such as configuring AMQP brokers and managing queues. Finally this plug-in supports VMware vFabric RabbitMQ as well as other implementations of AMQP.

AMQP is a wire-level protocol, as I mentioned earlier with regard to sniffing.

Terror/Hate Crimes Continue in Santa Cruz

The news in 2008 was of bombs.

Firebombs were intentionally set on a porch and in a car belonging to two UC Santa Cruz researchers in separate incidents early Saturday in what police have classified as acts of domestic terrorism.

Police are calling one of the bombings an attempted homicide.

That case, because of a perceived terrorism association, was taken extremely seriously and turned over to the FBI and ATF. It sets an interesting comparison to crimes that have followed.

A year later Swastikas were displayed openly in the downtown area, but police protected it as a form of free speech.

“You can’t regulate what’s on the inside of somebody else’s house,” said police spokesman….

The man apparently rotates the swastika flags with other, less controversial banners, and Friend said police started receiving complaints of Nazi flags about a month ago. Over the weekend the resident hung America’s Old Glory and Britain’s Union Jack under two Nazi flags. Monday, he hung a modern German government flag between the two flags of the Third Reich.

Of course the police spokesman is wrong. There are many regulations that affect what is on the inside of someone else’s house.

But I can give him the benefit of the usual free speech argument, which the article mentions. It became clear early in 2011 that the residents of the California beach town were in fact facing a serious and persistent test of free speech.

The question of hateful speech and expression spread to the high school. Students who decided to openly identify themselves with white supremacy and swastikas were suspended.

Students at a Santa Cruz County high school have been suspended for suspected scrawling of racist graffiti and joining together in a white supremacy gesture while the senior class picture was being taken, school officials said Friday.

This was treated as a relatively isolated and local affair, but it showed the problem of expression was not isolated to a single resident’s window. Shortly before this incident and the suspension, the University had quietly reported a similar crime.

Campus officials discovered graffiti on March 15 in a men’s restroom in Porter College that included swastikas and the message, “Blood will be shed at UCSC 4/20/11.”

Now, at the end of July, the swastikas have come out again. This time the possible hate speech was coupled with significant property damage, not far from the high school and the University.

Vandals damaged about 50 vehicles—slashing tires and etching swastikas into the paint—on the western side of the city overnight, Santa Cruz police reported.

Most of the vandalism happened on and around Almar Avenue, all between 11 p.m. Friday and 1 a.m. Saturday, according to Santa Cruz police spokesman….

The reaction to the swastikas this month seems similar to the reaction ten years ago. In 2001 the University Student Rabbi downplayed the information conveyed by the symbol.

“This was probably the act of a 15-year-old and I would hate for it to be blown out of proportion,” he added.

Even more to the point, Santa Cruz has been mentioned in the “Save the Swastika” movement, which is trying to reclaim the symbol’s meaning. It posts images of swastika body scars, tattoos, clothing, etc..

There is a problem, obviously, for anyone who hopes to paint a nicer image or downplay significance of the symbol. The swastika clearly continues to be used alongside destructive and criminal activity (not to mention that it still is very much associated with genocide). The police say they already consider the latest vandalism a possible hate crime. Compared with the 2008 attempted bombings I wonder if attacks bearing swastikas will be at some point also be considered a form of domestic terrorism. There also could be irony here. The police may be able to redirect immigration control resources from larger/federal agencies and use it protect residents from the greater threat domestic threat — white supremacy-logo criminals.

Lake Michigan Storm at U20 Championships

U20Macatawa Bay Yacht Club has posted a video of the Ultimate 20 North American Championship racers caught yesterday in a squall on Lake Michigan. A race was shortened and boats sent to shore but not in time to avoid the challenge of rough seas, rain, lightning and heavy winds from the West.

Within minutes this storm came in on Lake Michigan, endangering many boaters…. Wind gusts of up to 53 miles an hour quickly made it impossible to even see all the boaters. Fortunately no boaters were lost, although there was damage done to some boats including a broken mast and rudder.

One of the competitors captured a first-person view. Sailors headed for shore safety who were able to keep their 20 ft boat under way saw 14 knts of speed with mainsail alone (205 sq ft):

And here is the view from shore posted by the yacht club, which shows visibility drop to near zero as the rain and wind roll in.