Check Point researchers hunt down poor security in remote IT

Spread the love

Mumbai: Check Point researchers have identified security flaws in Apache Guacamole, one of the world’s most popular IT infrastructures for remote work.

With over 10 million downloads, Apache Guacamole – a free and open sourced software enables remote workers to access their company’s computer network from anywhere, by using only a web browser.

It runs on many devices, including mobile phones and tablets, giving remote workers “constant, world-wide, unfettered access to your computers”, according to the software’s creators.

Eyal Itkin, Check Point’s Vulnerability Researcher demonstrated that a threat actor with access to a computer inside an organization, can execute a Reverse RDP attack – an attack in which a remote PC infected with certain malware takes over a client that tries to connect to it.

In this case, the Reverse RDP attack would enable a threat actor to take control of the Apache Guacamole gateway that handles all of the remote sessions in a network.

Once in control of the gateway, an attacker could eavesdrop on all incoming sessions, record all the credentials used, and even control other sessions within the organization. Check Point researchers say this foothold is equivalent to gaining full control over the entire organizational network.

Two Attack Vectors – Check Point researchers classified their findings into two attack vectors:
Reverse Attack Scenario: A compromised machine inside the corporate network leverages the incoming benign connection to attack the Apache gateway, aiming to take it over.

Malicious Worker Scenario: A rogue employee uses a computer inside the network to leverage his hold on both ends of the connection and take control of the gateway.

“While the global transition to remote work is a necessity in these trying times, we should not neglect the security implications of such remote connections, especially as we enter the post-corona era,” said Omri Herscovici, Check Point’s Vulnerability Research Team Leader.

This research demonstrates how a quick change in the social landscape directly affects what attackers might focus their efforts on. In this case, it’s remote work, according to Herscovici.

“The fact that more and more companies have externalised many internally-used services to the outside world opens a number of new potential attack surfaces for threat actors. I strongly urge companies and organizations to keep their servers up-to-date to protect their remote workforces,” added Herscovici.

Leave a Reply

Your email address will not be published. Required fields are marked *