{"id":13495,"date":"2018-10-02T10:45:59","date_gmt":"2018-10-02T18:45:59","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/02\/news-7262\/"},"modified":"2018-10-02T10:45:59","modified_gmt":"2018-10-02T18:45:59","slug":"news-7262","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/02\/news-7262\/","title":{"rendered":"Hackers Can Stealthily Avoid Traps Set to Defend Amazon&#8217;s Cloud"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5bb2956ff8a2e62d0bd5c4ce\/master\/pass\/honeytoken-01.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 02 Oct 2018 15:35:29 +0000<\/strong><\/p>\n<p>Cloud services host <a href=\"https:\/\/www.wired.com\/story\/exactis-database-leak-340-million-records\/\">vast quantities of valuable information<\/a>, making them <a href=\"https:\/\/www.wired.com\/story\/amazon-s3-data-exposure\/\">perpetually attractive targets<\/a> for hackers. Attackers regularly develop new and clever ways to access cloud accounts\u2014or find ones that have been left exposed\u2014and exfiltrate data. Those in charge of protecting cloud accounts have their own methods of shoring up defenses and securing account perimeters. But just in case someone slips by, they also lay the digital equivalent of a booby trap or a trip wire to sound the alarm on any interlopers. They&#x27;re called honeytokens.<\/p>\n<p>A honeytoken can be any data planted to attract hacker interaction. You might, for instance, send yourself an email marked &quot;Important bank stuff,&quot; and put in a link that&#x27;s really a honeytoken, to let you know if your account gets breached. In the cloud, honeytokens are often authentication credentials that look like the keys to the kingdom, but actually act as canaries in the coal mine. It&#x27;s a clever ruse, and a vital one given the stakes of cloud security.<\/p>\n<p class=\"paywall\">But researchers from the network security firm Rhino Security Labs have made the <a href=\"https:\/\/rhinosecuritylabs.com\/aws\/aws-iam-enumeration-2-0-bypassing-cloudtrail-logging\/\" target=\"_blank\">troubling discovery<\/a> that attackers can identify many honeytokens planted in Amazon Web Services, the largest cloud provider, and silently avoid them while going about their nefarious business. It&#x27;s like a mouse that learns to grab the cheese without tripping the trap.<\/p>\n<p class=\"paywall\">&quot;You as the defending company put these keys out there so when I as the attacker grab them you\u2019re alerted and you know that I\u2019ve compromised that area,&quot; says Ben Caudill, the founder of Rhino Security Labs. &quot;But the problem we&#x27;ve found allows us to do a universal bypass where we can take those keys and without actually triggering the honeytoken. We can identify that it\u2019s booby-trapped, and avoid those AWS services that it would otherwise trigger.&quot;<\/p>\n<p>&quot;People rely on these defenses, but there is an inherent risk.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Spencer Gietzen, Rhino Security Labs<\/p>\n<p class=\"paywall\">The problem Caudill and Rhino Security Labs penetration tester Spencer Gietzen discovered has two components. AWS manages honeytokens through an auditing and compliance service called CloudTrail, but there are a handful of niche services that <a href=\"https:\/\/docs.aws.amazon.com\/awscloudtrail\/latest\/userguide\/cloudtrail-unsupported-aws-services.html\" target=\"_blank\">CloudTrail doesn&#x27;t support<\/a>. Since CloudTrail doesn&#x27;t extend its visibility features to them, it also doesn&#x27;t create logs for activity connected to these services\u2014and for hackers, no logs means no trace.<\/p>\n<p class=\"paywall\">The second component the researchers discovered is that certain failed AWS queries provide a lot of information in their error messages\u2014what the researchers call a &quot;verbose error message.&quot; One thing the errors show is the &quot;Amazon Resource Name,&quot; or the name of the credentials you used to send the query. The Amazon Resource Name will also reveal if you&#x27;re using a honeytoken. As a result, an attacker could intentionally produce errors to check the identity of credentials they encounter, and see whether they are honeytokens. And all of this can happen without CloudTrail having any record of it.<\/p>\n<p class=\"paywall\">&quot;It\u2019s both the fact that AWS doesn\u2019t have logging on those services and the fact that certain error messages from AWS show you which user you are,&quot; Gietzen says. &quot;The API functionality&#x27;s universal response means that I can use an unsupported CloudTrail service as the attacker to get information back. And there\u2019s no way for you as the defender to know I did it.&quot;<\/p>\n<p class=\"paywall\">Both the security company Thinkst, which offers a honeytoken service called Canary, and the enterprise software developer Atlassian, which oversees the open source honeytoken project SpaceCrab, are making changes to remediate these issues as much as they can. But Caudill  and Gietzen note that a full fix to the larger conceptual issue can only come from architectural changes to AWS. Amazon did not return a request for comment by publication.<\/p>\n<p class=\"paywall\">&quot;This is a fundamental issue within AWS that I think is not known well enough and can be exploited by an attacker,&quot; Caudill says. &quot;People rely on these defenses, but there is an inherent risk.&quot;<\/p>\n<p class=\"related-cne-video-component__dek\">It seems like every time you turn around there&#39;s a new breach of personal information. Follow these steps to minimize the damage.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/aws-honeytoken-hackers-avoid\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5bb2956ff8a2e62d0bd5c4ce\/master\/pass\/honeytoken-01.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 02 Oct 2018 15:35:29 +0000<\/strong><\/p>\n<p>In the cat and mouse game of protecting cloud services, attackers find a sneaky advantage. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-13495","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13495"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13495\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13495"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}