How UNIX/Linux security trap could affect you and why our solution should be used?

 

In data center, security traps on UNIX/Linux are very easy to set up and are very dangerous. For example, if you have a UNIX machine running very critical financial database, you will have a group of DBAs to support the database. On the machine, there is a dba account which the database uses to run on the machine, and the DBAs will need to use that account to perform database maintenance.

One day, one of the DBAs was punished by the company and he became unhappy with the company. In next few days, he wrote a simple script based on the .profile of the dba account on the machine. In the script, besides the original lines of the .profile, he added some SQL commands and then moves back the original .profile.  When he was on duty to work on the database, he “mv .profile .profile_save” and then put his script as the .profile before logs off from the machine.

A few hours or days later, another DBA was on duty and needed to work on the database, so he logged on to the dba account: without knowing the trap, the trap got triggered, and big money was illegally moved from one customer account to another. This DBA might still not know what happened.

When company found the problem, the money had already gone.

When to find the culprit, the obvious evidence was pointing to the innocent DBA, and probably you will not find clear evidence to capture the real culprit.

Now it should be clear how dangerous the security trap could be, and how easy it could be set up by internal malicious person.

It is not a question whether you should implement some solutions to combat this type of threat, but instead, how to combat this type of threat?

As to combat this type of threat involves detecting file change, so is normal file integrity monitoring software good for this?

If the software can give you trustworthy scan report about file integrity about those files, then after the malicious person set up the trap, if you run the software to scan those files, it should detect that the file got changed. But there are some questions here:

1.     Do you need to log on to the system to run the scan? If yes, then the account you used could have a trap, and when you log on, that trap could get triggered, causing losses for the company.

2.     How long after the trap was set up, the scan was run? What if before you ran the scan, the other DBA already logged on to the system, and the trap already got triggered.

3.     Even when the scan found that the file got changed, would you know what kind of changes were made, were those changes for security trap set up?

Now you can see that just using a file integrity monitoring software is not efficient enough to combat the threat.

 

WZIS Software’s solution combines WZSysGuard --- a FIM software that gives very trustworthy scan reports/CaclMgr --- a privilege delegation software that delivers very secure privilege delegation service/Apache --- the most widely used open source web server software/PHP --- the commonly used open source web server scripting language, allows your system/application/database administrators to use a web browser to run a scan for possible security trap detection, before logs on to the system; and allows your information/data security officers to use a web browser to verify the change of the file, if it’s a text file. This way, it can significantly reduce the risk of security trap, making your environment much more secure, and good people get better protection.