Given the discipline surrounding most "air gapped" machines I've seen I always find this quote appropriate:<p>"At best, an air gap is a high-latency connection" -Ed Skoudis - DerbyCon 3.0
Reminds me of the time I was looking after a SECURE system: One of the tasks was the daily update of the antivirus. So I would grab the blessed stick, insert it into the Internet-PC, and using FTP would download the latest antivirus update. Then I'd walk over to the SECURE system, insert the stick, and run the exe from the stick. There, system SECURED for today!<p>Norton, trust no other!
The weak-point is the shared USB device that copies from one machine to another which seems to defeat the whole purpose of being air-gapped - you could have printed-and-OCR'd data three decades ago so the air-gapped machine is never reading anything from outside at all, these days a video stream and AI could probably automate that?
This is an old attack vector. No one is learning from history. The organizations being hit have poor cybersecurity.<p><a href="https://en.wikipedia.org/wiki/2008_malware_infection_of_the_United_States_Department_of_Defense" rel="nofollow">https://en.wikipedia.org/wiki/2008_malware_infection_of_the_...</a>
Why would you go through all the hassle of setting up an air-gapped system, only to stop at enforcing strict code signing for any executable delivered via USB?
This does really not deserve a huge writeup.<p>Employees (unknowingly(?)) using infected USB drives caused security problems.
Well imagine that.<p>As several others pointed out the USB ports on the secure serfver should all be
fullly disabled<p>In addition I would suggest leaving one rewired seemingly availble USB port
that will cause a giant alarm to blare if someone inserted anything into it.<p>Further all informatin being somehow fed into the secure machines should be
based on simple text based files with no binary components.
To be read by a bastion host with a drive and driver that will only read those specific
files, that it is able to parse succefully and write it out to the destination
target, that I would suggest be an optical worm device that can then be
used to feed the airgapped system.
> As was the case in the Kaspersky report, we can’t attribute GoldenJackal’s activities to any specific nation-state. There is, however, one clue that might point towards the origin of the attacks: in the GoldenHowl malware, the C&C protocol is referred to as transport_http, which is an expression typically used by Turla (see our ComRat v4 report) and MoustachedBouncer. This may indicate that the developers of GoldenHowl are Russian speakers.<p>This is quite a stretch. So we have nothing so far.
As soon as the article started describing malware being installed upon insertion of a USB thumb drive, I had to Ctrl-F for "Windows", and indeed, of course that's the OS these machines are running.<p>I'd be really curious to hear of stories like this where the attacked OS is something a little less predicable/common.
Unless I'm missing something, this doesn't rely on something really advanced and low-level like USB drive firmware, but a classic flaw that's existed in Windows for almost 30 years:<p><i>It is probable that this unknown component finds the last modified directory on the USB drive, hides it, and renames itself with the name of this directory, which is done by JackalWorm. We also believe that the component uses a folder icon, to entice the user to run it when the USB drive is inserted in an air-gapped system, which again is done by JackalWorm.</i><p>It's just another variant of the classic .jpg.exe scam. Stop hiding files and file extensions and this hole can be easily closed.
>Ctrl-f, Windows.<p>Ahem, "air-gapped'.<p>Any decent Unix system has either udev or hotplug based systems to disable every USB device not
related to non-storage purposes. Any decent secure system woudln't allow to exec any software to the user beside of what's in their $PATH. Any decent system woudn't alllow the user to mount external storage at all, much less executing any software on it.<p>For air-gapped systems, NNCP under a secure Unix (OpenBSD with home mounted as noexec, sysctl security tweaks enforcing rules, and such) it's godsend.<p>Securelevel <a href="https://man.openbsd.org/securelevel.7" rel="nofollow">https://man.openbsd.org/securelevel.7</a><p>NNCP <a href="http://www.nncpgo.org/" rel="nofollow">http://www.nncpgo.org/</a><p><a href="http://www.nncpgo.org/" rel="nofollow">http://www.nncpgo.org/</a>
Am I the only one that finds it incredible an air gapped device has enabled USB ports? You want to bring data to it, use a freaking cd/dvd-rom. You may bring all sorts of crap in, but if let's say the air gapped machine is reimaged from cd/dvd every day and nothing ever leaves it, who cares?
I don't know anything about security, but why does an airgapped system even have a USB drive? Seems obvious to me that you want to disable all IO systems, not just internet? OK, sure people can still take photos of the screen or something, but that would require a willing collaborator.
You generally want to avoid getting malware into your network, but it is even more important to avoid allowing for exfiltration of data. So the "copy via USB-stick" serves a purpose and makes it MUCH harder to exfiltrate data.
I’m a bit disappointed the mechanism to exfiltrate data is based on sharing the USB between an internet-connected and air gapped devices. It would have been cool if it used some other side channel like acoustic signals.
> This may indicate that the developers of GoldenHowl are Russian speakers.<p>Journalists need to check their biases and ensure that everything they write is balanced. When mentioning that they might be Russian speakers, a good balancing sentence would be to point out countries which use the Russian language. Just throwing in "Russian speaker" after explicitly stating they're not sure which nation state did this is extremely unprofessional.<p>Sure, mention all the facts. Don't try to interpret them as "clues". If you have to, make sure you're not building a narrative without being absolutely sure.<p>Its not good journalism to go from `transport_http` to indicating that this is an attack by the Russian federation. That's not how you do good journalism. How many people will retain the fact that the author does NOT know which, if any, nation state did this?
I'm actually seeing some organizations deliberately forbidding air-gapped systems. The upsides no longer outweigh the downsides. While the speed at which attacks can be implemented is lower, they are more difficult to detect. An air-gapped system still needs to be updated and policed. So someone has to move data into it, for software updates at least. But the air-gap makes such systems very difficult to monitor remotely. Therefore, once an attack is ongoing it is harder to detect, mitigate and stop.
tldr: The breach relied on careless human(s) using USB key to and from the air-gapped systems. All the clever technology would have been for naught had the staff used robust physical security procedures.