Beware of hackers targeting storage systems
Ameritrade security guru warns that NAS poses large target for cybercrooks
Computerworld - DALLAS -- Corporate storage systems and networks are an attractive target for hackers looking to steal sensitive data or launch computer attacks, Alan Lustiger, security architect at TD Ameritrade Inc., told an audience at Computerworld's Storage Networking World user conference here yesterday.
In particular, he warned IT executives that network-attached storage (NAS) systems are a most attractive entry point for hackers. "The easiest storage technology to hack is clearly NAS," Lustiger said. "NAS is virtually indistinguishable to a file system from a hacker perspective; this is a well-developed and well-known means of attack."
According to Lustiger, NAS carries the largest bulls-eye for hackers because of its reliance on well-known protocols. The clearly defined protocols can be easily studied to uncover weak spots, he said.
For example, a hacker could penetrate a NAS to discover and peek into file systems available for mounting, the process of adding a file system into an existing directory structure, he said.
The typical NAS system could also allow a hacker to use software clients to create spoof permissions to access data, Lustiger said. Such a compromise could allow a hacker to create bogus users with unique IDs, he added.
Hackers penetrating NAS systems can also build sniffing and password hashes; perform protocol downgrade attacks on Windows NT Lan Manager and LAN Manager authentication; and spy on clear text sent over Common Internet File System and Network File System protocols to "sniff" valuable data.
To help protect NAS and storage environments from prying eyes, Lustiger said IT storage personnel must regularly update server operating system security features to incorporate secure builds, patch processes and the latest malware definitions.
Unfortunately, he noted that storage administrators are often left out of IT security planning and implementation processes. "[Usually] the storage team doesn't have the same relationship with the security group as the network guys do," remarked Lustiger. "Very often, security is not involved with [storage] and that's the problem."
He said a common mistake made by storage administrators is to use nonsecurity storage devices as if they were security devices to help protect their storage infrastructure. As an example, Lustiger pointed out that Cisco System Inc.'s virtual LAN technology is often mistakenly deployed in this manner.
Read more about Applications in Computerworld's Applications Topic Center.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- Increase IT Performance from the Enterprise to the Cloud with WAN Optimization Massive consolidation and data mobility, enabled by virtualization, have radically altered how we build servers, design applications, and deploy storage for the emerging...
- Live Webcast
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Video Stream Quality Impacts Viewer Behavior This scientific white paper, using statistical data from Amakai's streaming network, analyzes how changes in video quality cause changes in viewer behavior.
- Service-Enabling CICS Applications: Best Practices This informative webcast provides an informed, thorough look into CICS service-enablement options and how they can affect your environment. You'll learn how to... All Applications White Papers | Webcasts