Poor administrator identity and access management controls were at the heart of last yearโs huge data breach at Avid Life Media Inc. (now called Ruby Corp.), the Canadian parent company of Ashley Madison and related global dating sites, that led to the release of personal and information of 36 million user accounts.
The lack of multi-factor authentication for controlling remote administrative access was described as a โsignificant concernโ by the privacy commissioners of Canada and Australia in a joint report issued Tuesday into the breach.
Itโs an old but known problem: According to this yearโs annual Verizon Data Breach Investigation report, 63 per cent of the 3,141 confirmed data breaches it investigated around the world last year involved leveraging weak, default or stolen passwords.
But theย company that advertised itself as having a โ100% discreet serviceโ had inadequate security safeguards and policies, the report concluded,
It was one of lessons all Canadian organizations who fall under the federal Personal Information Protection and Electronic Documents Act (PIPEDA) can learn from the international incident, says an addition to the main report.
Those lessons include:
โorganizations should carefully consider all potential harms โ not just financial โ to customers or partners of a breach of personal information in their care so that they can properly assess and mitigate risks. In ALMโs business, loss of personal data could โ and did โ affect peopleโs personal reputation;
โOrganizations may have firewalls and scanners, but these safeguards should be supported by an adequate information security governance framework, to ensure that practices are โappropriate to the risksโ and โconsistently understood and effectively implemented.โ At ALM, the investigation concluded that the lack of such a framework was an โunacceptable shortcomingโ which โfailed to prevent multiple security weaknesses.โ
โBe straight up with data deletion and retention policies. PIPEDA gives individuals the ability to withdraw consent to the collection and use of their personal information. ALM charged a $19 fee to fully delete a subscriberโs data โ and, the report notes, there was confusion on whether data was fully deleted. Whether such a fee is reasonable would have to be evaluated in light of factors such as the actual cost to the organization relative to the fee charged, and the likely influence it would have on the individualโs decision on whether to withdraw consent, the report says.
Even if a fee is reasonable, the report adds, it would have to be clearly and conspicuously communicated prior to an individual providing consent. โOverall,โ the report warns, โorganizations should treat the decision to implement such a fee with appropriate gravity.โ
โData retention policies should be based on a demonstrable rationale and timeline. ALM legitimately held to deleted profiles for several months for legal reasons. But inactive and deactivated profile information was kept indefinitely.
โBe accurate. ALM required, but didnโt verify, email addresses of registrants. One the one hand, that allowed people to deny being associated with Ashley Madisonโs. On the other hand it creates unnecessary reputational risks in the lives of others โ someone could create a fake profile using another personโs email address. โThe requirement to maintain accuracy must consider the interests of all individuals about whom information might be collected, including non-users,โ says the report.
โBe transparent about security. False or misleading statements may impact the validity of user consent. ALMโs home page showed a phony trust mark in the form of a โTrusted Securityโ icon. โOrganizations should be aware that deceptive statements will call into question the validity of consent,โ says the report.
โBe clear. Under PIPEDA, consent is only valid if it is reasonable to expect that an individual would understand the nature, purposes and consequences of the collection, use or disclosure of personal information to which they are consenting. โIn the ALM investigation, it became clear that even a close reading of the information provided before registration did not offer key information that may have influenced someoneโs decision on whether to sign up,โ says the report. โFor example, there was no mention of the fee to have personal information deleted from the service. Organizations should take note that a failure to be open about personal information handling practices โ including omitting or lacking clarity about key practices โ may bring into question the validity of consent.โ
Rubyโs new CEO has signed a compliance agreement to address these issues.
But for infosec pros the sections on the weakness in remote administrator access control will be of most interest.
ALM thought it had a good system, one that required those with remote access privileges to have three things: a username, a password and a so-called shared secret โ a passphrase. (In addition, theyโd need to know the VPN group name and the IP address of ALMโs VPN server.)
But, the report notes, all three things are โsomething you knowโ โ so in effect it was a single-factor ID. Not only that, the shared secret was stored onย ALMโs Google drive, so anyone with access to any ALM employeeโs drive on any computer, anywhere, could have potentially discovered it.
Had the company insisted administrators use two- or multi-factor authentication the attack might not have been successful.
The details of what happened are still murky, despite a forensic investigation by ALM. The report says the company believes the attacker(s) somehow โ phishing, social media, a keylogger? โ got hold of an employeeโs credentials. The attack was first noticed on July 12, 2015 when IT staff โdetected unusual behaviourโ in the database management system suggesting an unauthorized access.
However, the company believes the intrusion actually happened several months earlier โ thatโs logical given the amount of data that was exfiltrated โ and the attacker moved around to learn the network topography and gained increasing administrator access.
The report notes that forensic analysts canโt determine some details because once getting administrator access, logs were erased. The attacker also took steps to avoid detection, including accessing the company VPN network via a proxy service that allowed it to spoof a Toronto IP address.
It didnโt help that for an organization with $100 million in revenue ALM didnโt have an intrusion detection or prevention system, a security information and event management (SIEM) system or data loss prevention monitoring.
VPN logins were tracked and reviewed only weekly. Unusual login behaviour โ and in this case itโs not clear if the attackerโs actions would have been seen as unusual โ was not well monitored, says the report. In fact, it was only while investigating this attack that ALMโs third party cyber security consultant discovered there had been unauthorized access to ALMโs systems โ using valid security credentials โ in the weeks before the July 12, 2015 discovery. โThis further reinforces our view that ALM was not adequately monitoring its systems for indications of intrusion or other unauthorized activity,โ says the report.
Ruby has now adopted two-factor authentication for administrators.