In-depth

Cybercrime: Hidden backdoors to enterprise data

How much of a risk do backdoors pose to corporate data? Davey Winder investigates...

The word "backdoor" is regularly used in conversation between enterprise IT security folk. Generally, this will involve speculation about the US Government calling on Linus Torvalds to code one into the Linux OS, for example.

Occasionally, though, talk will turn to developer tools left in firmware or clever hackers finding unlikely routes into corporate networks via a printer or some other peripheral.

But just how much of a threat are backdoors to your data, and what should you be doing to mitigate the risk?

Unexpected routes to illegal access

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

D-Link recently patched the firmware of its routers after security researcher, Craig Heffner, discovered a backdoor that let him bypass the authentication process and access the device's web-based admin interface. The same researcher has also found backdoors in Chinese router manufacturer Tenda's products.

When an attacker has gained access to a system and elevated their privileges, adding a backdoor is often the next step.

Why is that important? Well, in the case of router backdoors, it's a triple threat you're faced with. First there's the damage that can be done, such as changing of passwords, disabling encryption and blocking access.

These devices also tend to have long lifecycles in most SMEs and, apart from power-cycling reboots every now and then, they are pretty much a fire-and-forget thing.

Furthermore, the process of upgrading firmware is so time consuming very few people ever consider doing it unless something is obviously broken and stops working properly. Router firmware security upgrades are rarely on the radar of the average enterprise.

Then there is HP, which admitted earlier this year to undocumented remote support backdoors in its StoreOnce D2D and StoreVirtual products that could potentially lead to hackers gaining root access to the OS and putting the data stored within at risk. These backdoors have since been patched.

Advertisement - Article continues below

Hackers know disassembling firmware, although time consuming and complex, can be worthwhile. Finding a remote debugger in the production testing code that was overlooked when the product went to release can be just as useful to a cybercriminal as finding a zero-day in software (if not as lucrative in financial terms).

Device-level vulnerabilities might be all but ignored by the IT department, but you can bet the bad guys will happily exploit them in any way they can for political reasons, malicious disruption, or as an alternative way to cause a data breach.

Not all backdoors are of the developer tools variety. Some are simply malicious, as Owen Wright, head of assurance at Context Information Security, points out.

"When an attacker has gained access to a system and elevated their privileges, adding a backdoor is often the next step to allow them to regain control if their initial compromise is detected.

Advertisement
Advertisement - Article continues below

"The most trivial examples of this include adding user accounts to a system (e.g. backup', guest') that look innocuous but allow the attacker to regain control of the system easily. Or, adding a program that runs every time the computer is booted and allows access," he explains.

"A more sophisticated example would be to change the password reset functionality of a system to send an attacker a user's password every time they change it."

Advertisement - Article continues below

There are also front doors that become backdoors through bad usage. "I think that the most common backdoors are actually left-out forgotten front doors," warns Amichai Shulman, chief technology officer of Imperva.

These are often "misconfigured, abandoned FTP servers, test applications left open to the world," he continues.

"Unnecessarily left-open admin interfaces could be used as backdoors by attackers either because they were mis-configured or have unpatched vulnerabilities that allow attackers to create a bridge head inside the organisation's network."

Some backdoors are mistakenly not considered a security risk. Take the good old Multi-Functional Device (MFD) found in most offices, the ones that nearly all contain a hard drive.

Quentyn Taylor, director of information security at Canon Europe, told IT Pro its recent Office Insights report revealed how two-thirds of organisations work with sensitive information, yet 79 per cent print on an MFD that is accessible to others.

"This means vast amounts of information is at risk due to failure to prepare properly," Taylor warns.

Advertisement - Article continues below

"Our own research indicates companies are failing to safeguard information at the crucial output stage. If a document is printed on a device that can be accessed by others, it's at risk of both accidental document leaks and malicious theft."

As Tim TK' Keanini, CTO of Lancope, says  backdoors are everywhere and it is just matter of time until they are discovered.

Advertisement
Advertisement - Article continues below

"The problem we have right now is the bad guys are the ones more motivated and funded to find them first," he said.

But the good news is that, compared to a decade ago, the exploitation of these hardware backdoors is relatively uncommon.

"As a penetration tester for four years, coming across a backdoor was fairly rare," explains Adrian Sanabria, senior security analyst with 451 Research. "Finding default credentials were much more common."

Sanabria says the security community has tried to shed light on the common issue of developers unintentionally uploading private keys to publicly accessible code repositories, like GitHub.

Advertisement - Article continues below

"While not a back door, per se, this issue allows the compromise to occur in the same manner," he tells IT Pro. "What makes any back door so dangerous is that no alarms go off when an attacker accesses it, as only one successful logon attempt occurs".

Featured Resources

How inkjet can transform your business

Get more out of your business by investing in the right printing technology

Download now

Journey to a modern workplace with Office 365: which tools and when?

A guide to how Office 365 builds a modern workplace

Download now

Modernise and transform your sales organisation

Learn how a modernised sales process can drive your business

Download now

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now
Advertisement

Most Popular

Visit/cloud/cloud-computing/354767/google-cloud-snaps-up-multi-cloud-analytics-platform-for-26bn
cloud computing

Google Cloud snaps up multi-cloud analytics platform for $2.6bn

13 Feb 2020
Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/cloud/microsoft-azure/354771/microsoft-azure-is-a-testament-to-satya-nadellas-strategic-nouse
Microsoft Azure

Microsoft Azure is a testament to Satya Nadella’s strategic nouse

14 Feb 2020
Visit/operating-systems/27717/how-to-fix-a-stuck-windows-10-update
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020