Cyber attack and monitoring software

 HomeBlogCyberattack and monitoring software

Cyber attack and monitoring software

In less than 2 months, 2 competing software programs - Solarwinds and Centreon - have been the victims of unprecedented attacks. It is obvious that we want to minimise the damage, but how can we estimate the consequences of hacking that has been going on for years? What cybercriminal does not want to cover his tracks, after his intrusion, in order to commit his crimes without being caught? It is difficult to know what happened after the infection and to what extent the misdeeds have been covered up...

Monitoring software is a target of choice

Monitoring software are targets of choice for hackers because this software generally has access to all the components of an Information System. Using monitoring as a pivot is a real gold mine of information that allows malicious people to understand a company's information system in order to speed up each stage of a malicious act, whether it be in terms of recognition, exploitation of vulnerabilities or data exfiltration.

It is obvious that all software is vulnerable, but might there be considerations that make open source software more of a at risk than proprietary software from a security standpoint? The Canadian government recommends precautions when using open source software and even mentions certain risks related to its use

Why is it easier to analyze security holes in Open Source software?

  1. The source code is open and accessible to all
  2. The lists of vulnerabilities are also
  3. The "perverse" effects of the open community

When maintaining software, administrators must keep abreast of all security issues, whether they concern software, operating systems or the network environment.

For example, in a recent version of Centreon 19.04, there are more than sixty detailed security patches on the Github website: It is also necessary to add certain very vulnerable dependencies such as Apache and PHP which total a history of more than 1,200 vulnerabilities for one and 600 for the other.

Many other sources of information allow the exploitable vulnerabilities (CVE) to be referenced in detail for many open-source software:

On the other hand, there are many tutorials on hacking techniques, MetaSploit-type modules targeting the tools mentioned above https://www. which can provide an almost turnkey hacking solution from a Kali Linux virtual machine. Whether on the software itself or on the embedded libraries, hackers can quietly study each vulnerability, develop a tailor-made virus or an intrusion technique and perform tests for the chosen version.

The role of publishers for software security

At ServicePilot, we also produce highly sensitive software and take the issue of cyber crime very seriously. The source code is under control and closed to the public. The architecture allows for a unidirectional secure flow for data between the servers and the monitoring platform using TLS 1.2, thus avoiding the need to open ports on the target servers. We work with the largest French companies on software quality mark problems from a security point of view. We regularly carry out Pentests (penetration tests). We have already worked with some clients on particular security mechanisms, for example with non-IP networks. We carefully choose every component, every detail of the architecture.

The role of the users

Here are some good practices that we recommend in addition to the usual recommendations:

  1. Put IS monitoring back at the centre of concerns on an equal footing with safety.
  2. Do not entrust the choice of tools to someone who does not understand the safety issues or risks.
  3. audit the vulnerability of each sensitive software as well as all dependencies
  4. avoid using software that is too risky or too complex, especially those that allow you to run scripts (e.g. Apache/PHP)
  5. avoid opening the core of its applications to certain platforms SaaS.

Cyber security standards, an idea to improve software security?

The adoption of a quality mark "secured by design" emphasising software security would not only help companies to improve the security of their own software, but would also provide companies with an indication of the security of the software architecture they wish to integrate into their information system.

Did you like the article? Feel free to share it