1/ Solving the root cause of #GoldenSAML attacks, recently used in #Sunburst attacks.
Don't of scale security "UP", burying #SAML's private key deeper in HSM,
scale it "OUT": distribute it w/ modern crypto (#TSS#MPC)+ service architecture, as we do for #cryptocurrency@ZenGo
2/ Advanced attackers (#APT) steal long term secrets ("the stamp") that allow them to issue access tokens and thus access all services in victims' environment, bypassing all security, including multi-factor auth (#MFA,#2FA)
3/ @CISAgov recommends protecting such secrets with hardware (HSM), but this solution is not always feasible, does not scale well and is susceptible to vulnerabilities especially when facing #APT attackers (hence: "aggressively updated") media.defense.gov/2020/Dec/17/20…
4/ Therefore a more feasible solution can be distributing the defenders' private key ("the stamp") with modern cryptography Threshold Signatures (#TSS) and having some portion of it outside of the defenders reach, and hence also outside of the attackers reach.
5/ The solution consists of 2 mandatory parts, TSS cryptography and the security architecture of an external service. It is the combination of these two parts that makes this solution effective.
See discussion @LindellYehuda@veorq@matthew_d_green
6/ This solution is VERY practical. We are using it to protect @ZenGo#cryptocurrency wallet customers for few years now. The problems are almost identical: protecting a private key by distributing it while still being able to sign (in fact #cryptocurrency is a bit harder)
7/ and if one service is not enough security, it can be easily scaled out to distributing the secret to multiple (>2) services github.com/ZenGo-X/multi-…
A big shout out to @UriKelman for these great illustrations
• • •
Missing some Tweet in this thread? You can try to
force a refresh
1/ IT politics is part of the "physics" of the security problem, much like friction, noise and air resistance in the physical world.
An often overlooked aspect of security solutions is that they empower CISOs to mitigate issues without asking others for help
2/ Per the "Kerberoasting" example mentioned by @jaredhaight, the naive solution would be to just ask service account owners to upgrade password strength.
However, the CISO may have a security solution that monitors Kerberos requests to the DC and blocks massive harvesting
3/ while it might not be the perfect solution, but the CISO can do it right away without asking anyone and buy precious time to fix the root cause of the problem.
2/ The gist of it: Facebook breached their TOS as it allows blocking only in cases the blocked user actually violated the TOS and requires informing the blocked user
3/ some of the plaintiffs were blocked from both #Facebook and #instagram, while others were only blocked from FB