[SANS ISC] The Importance of Out-of-Band Networks, (Mon, Dec 6th)

Out-of-band (or “OoB”) networks are usually dedicated to management tasks. Many security appliances and servers have dedicated management interfaces that are used to set up, control, and monitor the device. A best practice is to connect those management interfaces to a dedicated network that is not directly connected to the network used to carry applications/users’ data. If a physically separated network is always best, a dedicated VLAN could do the job in most cases (if properly configured). What we typically find on OoB networks are:

Network devices (switches, routers, access-points)
Appliances management interfaces
Management interfaces of servers

They also carry sensitive protocols like SNMP, backup traffic to not interfere with the “production” traffic. OoB networks are, based on their criticality, pretty well hardened with very limited access through bastion hosts. Sometimes, they are so well protected that remote access is not allowed and could lead to critical situations like the recent Facebook downtime due to a BGP issue[1].

But OoB networks can also be used for other purposes: during a security incident. It’s recommended to not allow Incident Handlers to use the corporate network to exchange information.

A few days ago, an interesting tweet has been posted by @vxunderground[2]. Apparently, the Ragnar Locker ransomware group was able to access a Slack channel used by the organization in charge of the investigations. 

(Image source: vxunderground’s Twitter account)

As you can see on top of the screenshot, there is the classic Remote Desktop Client banner. Probably, an Incident Handler was connected to the Slack channel from a workstation on the compromised network and the attacker was still present… Slack is an “external service” and traffic to Slack is encrypted but if the client or the browser can be accessed, it’s too late!

[1] https://blog.cloudflare.com/october-2021-facebook-outage/
[2] https://twitter.com/vxunderground/status/1466523987031302145?s=20

Xavier Mertens (@xme)
Senior ISC Handler – Freelance Cyber Security Consultant

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Source: Read More (SANS Internet Storm Center, InfoCON: green)

You might be interested in …

[ZDNet] VMware lays out its vision for “easy” security

All posts, ZDNet

Among other security advancements announced at VMworld, the virtualization company unveiled a set of services for flexible, multi-cloud application security called EASE Source: Read More (Latest topics for ZDNet in Security)

Read More

[ESET] Log4Shell vulnerability: What we know so far

All posts, ESET feed

The critical flaw in the ubiquitous Log4j utility has sent shockwaves far beyond the security industry – here’s what we know so far The post Log4Shell vulnerability: What we know so far appeared first on WeLiveSecurity Source: Read More (WeLiveSecurity)

Read More

[BleepingComputer] Google: Russian SVR hackers targeted LinkedIn users with Safari zero-day

Google security researcher shared more information on four security vulnerabilities also known as zero-days, unknown before they discovered them being exploited in the wild earlier this year. […] Source: Read More (BleepingComputer)

Read More