|
Scenario
The company that seeks our advice dedicates to road transport in different areas: long distance, logistics and distribution and transport of refrigerated products.
The company is in business since the 1970s. At the beginning, it distributed products from local bottling companies. Later, it started merging and acquisition processes which , in time, turned it into a large bottling company at an international level. They then expanded their distribution from the city of Buenos Aires to the interior of Argentina.
The company has a fleet of its own of about 150 trucks which are located in different parts of the country. It also manages more than 10 outsourced independent carriers.
Its operating center is located in the city of Buenos Aires where it also has a workshop for heavy trucks, a parking lot for trucks and cargo transfer and its administrative office. It is in the administrative office where the data center can be found. This data center is on a network connected through Virtual Private Networks (VPNs) to all the other points.
The Systems Department is managed by 2 administrators who distribute among them the maintenance, support and planning tasks.
The Case
The situation arises when they decide to dismiss one of the systems administrators, who learned about this decision by informal channels before the management had the chance to communicate it to him formally.
Everything seemed to follow the normal course of events until, just one day after this employee was separated, the company found out that:
- The administrator’s password had been changed.
- The users’ privileges had been removed.
- The passwords to access the routers had been modified.
- The password to access the Microsoft licensing portal had been changed.
The domain controller was setup in a Hewlett Packard server with RAID 5.
The envisaged scenario posed the question as to whether this employee could have remote access to the network and, where in doubt, we acted as if this scenario were real.
Therefore, the first immediate measure was to propose that routers in every access point to the network be replaced in order to take control of the accesses of the corporate network.
The next step consisted in virtualizing the DC (domain controller) to be able to later work in a lab environment and look for a solution which could be implemented in the production environment.
Considering that installing software was impossible due to the lack of an administrator user, we got software that allowed the server to be started and virtualized from an external disc without having to install it. Then the virtual image that we obtained was copied onto different external discs and we worked on different computers using different lines of action.
A team found vulnerabilities in the software and succeded in modifying the password. A procedure, which could later be replicated successfully in the production environment, was drawn up.
Another team devoted to obtaining the hashes of the users’ passwords as a first step towards getting the domain administrator’s password by using similar tools.
All this could be completed in 60 days.
Lessons Learned
Having more than one employee managing the Systems department is a necessary condition, but not sufficient to safeguard the business continuity.
It is essential to have a Human Resources policy able to monitor the processes where critical positions for the company are involved. The security level is determined by its weakest link which, in general, is the user.
In the case we just described, we can say that the dismissal process failed. According to the “Fraud Triangle” model, three conditions must be met for a person to commit fraud: pressure, opportunity and rationalization.
Pressure is what motivates the crime in the first place. In general, this is generated by economic or financial needs that will trigger in case the following two phases occur.
The second element is the perceived opportunity – this defines the method by which the illicit act will be brought forward. The person must see some way by which he can abuse his position of trust in order to solve his economic or financial constraints.
The third phase necessary to commit a fraud is rationalization. Most fraudsters don’t have a criminal background or behaviour, so they need to find grounds that justify their acts in a way that they become acceptable.
When the person finds this rationale, the triangle is closed and the fraud is perpetrated.
The business continuity plan is NOT a mere technological or auditing issue. Instead, it is a subject where every area in the organization should be involved. |