Enterprise Systems and Threats
Risa Blair
The scenario included a medium-sized international company. The guidelines were to select and include three enterprise systems that were based on databases, one cloud-based and one that was not SQL-based. Systems were accessible via a browser and included mobile applications. Of key importance for this project was to research potential and known vulnerabilities for these three enterprise systems. The systems selected were ADP Streamline Payroll, Salesforce, and MongoDB. There are numerous threats described in this project, including excessive privileges, SQLi attacks, weak auditing, storage media exposure, unnecessary features enabled, broken configurations, and buffer overflows. Enterprise systems are a potential magnet for hackers on the black market and the Dark Web, as they provide extensive confidential data, particularly in the technology, finance, government, education, healthcare, and retail sectors. It was impressive to see how both ADP and Salesforce provided up-to-date known and potential vulnerabilities. What was the most interesting throughout the research was uncovering the Mongo Lock ransomware and the Salesforce Meatpistol malware. What is worse is that the Salesforce team provided a talk in Las Vegas in July of 2017, where they explained how Salesforce attacked its own system to see how well it would hold up against cyber attacks. The talk focused on Meat pistol, a malware too for making it easier to conduct the attacks from the standpoint of infrastructure automation, implant creating, and interaction. The intent was to make it easier for the Salesforce teams to conduct their attacks. They utilized the methodology of the well-known tool, Metasploit, which does not exploit systems or launch attacks. It just provides the framework for hackers to control systems after they have been able to access what they choose. The duo of “red team” inside hackers explained their process for access the system through the utilization of Meatpistol, against the advice of their superiors. Immediately after the presentation, they were fired. Full Text
|