Across the internet, more than a thousand companies spent the past week digging out from a mass ransomware incident. In the wake of the devastating compromise of Kaseya's popular IT management tool, researchers and security professionals are warning that the debacle isn't a one-off event, but part of a troubling trend. Hackers are increasingly scrutinizing the entire class of tools that administrators use to remotely manage IT systems, seeing in them potential skeleton keys that can give them the run of a victim's network.
From a Chinese state-sponsored supply chain compromise to an unsophisticated attack on a Florida water treatment plant—and many less visible events in between—the security industry has seen a growing drumbeat of breaches that took advantage of so-called remote management tools. And at the Black Hat security conference next month, a pair of British researchers plans to present techniques they've developed as penetration testers for security firm F-Secure, which allowed them to hijack yet another popular tool of the same kind—this one focused on Macs rather than Windows machines—known as Jamf.
Like Kaseya, Jamf is used by enterprise administrators to set up and control hundreds or thousands of machines across IT networks. Luke Roberts and Calum Hall plan to show off tricks—which, for now, remain technical demonstrations rather than ones they've seen used by real malicious hackers—that would allow them to commandeer the remote management tool to spy on target machines, pull files off of them, spread their control from one machine to others, and ultimately install malware, as ransomware gangs do when they drop their crippling payloads.
Those techniques, the two researchers argue, represent a prime example of a larger problem: The same tools that let administrators easily manage large networks can also give hackers similar superpowers. "The piece of your infrastructure that manages the rest of your infrastructure is the crown jewels. It's the most pivotal. If an attacker has that, it's game over," says Luke Roberts, who recently left F-Secure to join the security team of the financial services company G-Research. "The reason that ransomware actors are going after things like Kaseya is because they offer complete access. They are like the gods of the environments. If they have something over one of these platforms, they get whatever they want to get."
The remote-management hijacking techniques Roberts and Hall plan to show at Black Hat require hackers to get their own initial foothold on a target computer. But once in place, attackers can use them to vastly expand their control over that device and move to others on the network. In one case, the researchers demonstrated that if they simply alter one line in a configuration file on a PC that runs Jamf, they can cause it to connect to their own malicious Jamf server rather than the target organization's legitimate one. Making that change, they point out, can be as simple as impersonating IT staff and tricking an employee into changing that line or opening a maliciously crafted Jamf configuration file sent in a phishing email. By using Jamf as their own command-and-control connection to a target machine they can exploit Jamf to fully surveil the target computer, extract data from it, run commands, or install software. Because their method doesn't require the installation of malware, it can also be far stealthier than the average remote-access Trojan.
With a second technique, the two researchers found they could exploit Jamf by posing as a PC running the software instead of a server. In that intrusion method, they impersonate a target organization's computer running Jamf, then trick the organization's Jamf server to send that computer a collection of user credentials. Those credentials then allow access across the organization's other machines. Typically those credentials are held in a PC's memory, where a Mac's "system integrity protection" safeguard usually prevents hackers from accessing it. But because the hacker is running the Jamf client on their own computer, they can disable SIP, extract the stolen credentials, and use them to hop to other computers on the target organization's network.