DreamHost Hack And Mass Password Reset Could Have Been Avoided

Password

Reports that DreamHost, the US West Coast-based hosting provider, has reset all of its many users passwords in the wake of a hacker incursion into its systems, could probably have been prevented through the effective management of end user privileges.

By controlling exactly who has access to specific applications on the hosting provider’s servers, hackers would have been prevented from even starting to compromise the member’s credentials as they appear to have done.

We know that DreamHost’s shared and dedicated hosting network consists of a series of Web servers and that the controlling software is a customised application that was developed in-house. If the developers had integrated privilege management software into their customised applications from the ground up, then the user’s credentials would not have been accessible from the public Internet.

Privilege management software is all about empowering users to do their job. By effectively managing access to the software to specific users, and specific terminals, even if the hackers gained access to the IT staff credentials, they could then only access the relevant software from within the corporate network.

Putting it simply, this form of software security means that the IT admin credentials would only work from nominated terminals within DreamHost’s network. Hackers coming from outside the network – and on the Internet – would have been blocked. This policy driven privilege management approach means that where there is least privilege there is least risk.

As I said late last year when we identified that the financial sector is ahead of the curve when it comes to security, cybercriminals are now focusing their attacks as they attempt to further monetise their malware programs.

My observations suggest that there is a significant security threat associated with excessive user rights and that no amount of user auditing and log files can solve this problem.

It is therefore essential that IT security professionals should not compromise their security for the sake of delivering functionality. Privilege creep is a common problem that a growing number of security professionals are aware of – and have acted upon to help mitigate the risk.

That said, many sectors of the IT industry are still catching up, leaving their systems exposed to the dangers of admin right abuse. We know that many professionals are continuously struggling to control unsecure third party programs – such as browsers, games, animations and password crackers – that are able to run, even in the most secure software environment.

The strategic whitelisting and blacklisting of applications and programs ensures that malicious code and content can be blocked to create a more secure environment. Building this type of security into a customised set of applications software is therefore a must-have for anyone in the IT software development arena.

Paul Kenyon is co-founder and Chief Operations Officer of Avecto. Paul is a successful business executive with an outstanding 15-year track record in building, growing and leading high-performing, multinational high tech companies in North America, Europe and the Pacific Rim. In 1999, he started AppSense, the global leader in User Environment Management for businesses and service providers. With the lead role on global sales, AppSense quickly grew to profitability with revenues of over $30 million.