Configuration Errors Caused Utah Data Breach

A massive data breach in the US state of Utah in March was caused by configuration errors, it has been revealed.

The attack was made possible by a series of configuration mistakes during an upgrade that left the server wide open to attackers, who downloaded data from the server on 30 March, according to the interim director of Utah’s Department of Technology Services (DTS), Mark Van Orden.

Eastern European hackers

Utah’s former DTS director resigned last week in the wake of the data breach, which exposed the personal information of nearly 800,000 people to hackers believed to have been in Eastern Europe.

Van Orden told local journal the Deseret News that a series of errors had exposed the server as the state upgraded its Medicaid Management Information System.

The server, he explained, was installed by an independent contractor and was not protected by a firewall during the upgrade. In addition, the server used factory-issued default passwords, which he said is not “routine”.

“Two, three or four mistakes were made,” Van Orden was quoted as saying. “Ninety-nine percent of the state’s data is behind two firewalls, this information was not. It was not encrypted and it did not have hardened passwords.”

Scott Crawford, research director at Enterprise Management Associates, said that organisations seem to struggle with defining management security objectives such as the change control policy for high-value assets, actually implementing those objectives in practice, monitoring the environment for compliance, detecting deviations and responding effectively when something unusual occurs.

Browser controls

“Lack of identifying high-value assets and prioritising monitoring and control in those environments often contributes to exposures,” he said. “Finer control over access privileges – implicated directly in the Utah case – is one example where such control can and should be scrutinised more carefully and more consistently enforced.”

Poor control over browsers are another example, he added, noting that many of today’s browsers enable sandboxing, validate code and provide other techniques to limit exposures.

“Many organisations find it difficult to keep such issues current, particularly with large numbers of widely distributed endpoints,” he said.

Oftentimes, people are more interested in making things work than making them work right, said Andrew Storms, director of security operations at nCircle.

“One of the most common configuration errors I see is running services with too many permissions,” he said. “For example, in UNIX, the Apache process is run as user www to limit exposure. If Apache were compromised and the process was running as an admin, then the attacker would gain full administrative access to the server.”

“Another common configuration error is altering file system permissions in order to make an application run,” he continued. “This is the quick and easy way out of file/folder access problems, but it’s better to ask why the application needs access to those files in the first place.”

“Even if [people] understand the implications of configuration errors, they take the easy way out,” he said.

How much do you know about smartphones? Take our quiz.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

NASA, Boeing To Begin Starliner Testing After ‘Anomalies’

American space agency prepares for testing of Boeing's Starliner, to ensure it has two space…

2 days ago

Meta Launches Friends Tab, As Zuck Touts ‘OG Facebook’

Zuckerberg seeks to revive Facebook's original spirit, as Meta launches Facebook Friends tab, so users…

2 days ago

WhatsApp Appeal Against EU Fine Backed By Court Advisor

Notable development for Meta, after appeal against 2021 WhatsApp privacy fine is backed by advisor…

3 days ago

Intel Board Shake-Up As Three Members Confirm Retirement

First sign of shake-up under new CEO Lip-Bu Tan? Three Intel board members confirm they…

3 days ago

Trump’s SEC Pick Pledges ‘Coherent’ Crypto Rules

Trump's nominee for SEC Chairman, Paul Atkins, has pledged a “rational, coherent, and principled approach”…

3 days ago