Dale,

To address your question about arcache....

That utility can only run on and work against an AR System server running on the
same machine.  That was changed a number of years ago (probably as many as 4 or 
5)
from being able to be run remotely.

It always was protectable from being run, but we decided to go one step further 
and
allow it only to be run on the same machine.

And again, even there, it can be disabled as you mention using a configuration
setting -- and it is recommended for security purposes that you do indeed set 
that
setting and only allow the recovery tool (which is what arcache is) to run when
you are trying to do a recovery by temporarily resetting the option to allow the
utility when needed.

Doug Mueller

-----Original Message-----
From: Action Request System discussion list(ARSList) 
[mailto:[email protected]] On Behalf Of Dale Hurtt
Sent: Friday, January 31, 2014 8:25 AM
To: [email protected]
Subject: Re: Target Attack and BMC Software ITSM?

Just so we are all using the same terminology, a backdoor is intentionally 
hidden (although it may be discovered), so anything documented, like Demo, is 
not a backdoor. http://en.wikipedia.org/wiki/Backdoor_(computing)

> Doug Mueller wrote:
> 
> Now, there are a bunch of other security settings that I encourage you 
> to use --
> 
> -- restrict where run processes can run processes
> -- control the shell under which processes can run
> -- use the password management feature to enforce password rules
> -- use the feature that disables an account after x bad password attempts
>       (and make x a relatively small number like 5 or at most 10)
> -- disallow blank passwords (except for AREA cross-reference 
> situations)
> --  and a number of other things

I am sure all of you have used arcache to insert a new admin account into the 
system because [cough] someone ELSE changed the password of the admin account 
and forgot it. That is not a backdoor either, but a well-documented front door 
in breaking into the ARS server. I haven't had to use this in a while, so I 
don't know if the security parameters have changed, but you used to be able to 
install arcache on your laptop and run it against a remote server. One of the 
security measures NOT mentioned above is to secure arcache by using 
"Disable-User-Cache-Utilities: T" in the ar.cfg. This then requires that anyone 
wishing to use the utility must have access to the file ON the server, thus 
providing another layer of security.

> Doug also wrote:
> 
> Remedy should not be vulnerable to attack of the kind described unless 
> you have opened your systems to the outside

Unfortunately, firewalls don't always help in this regard. Still waiting for 
details (that may never come), but malware inserted inside the firewall, and 
unfortunately masquerading as another BMC product (Bladelogic), was used as an 
intermediary between the POS malware and dumping the data outside. At least if 
I read the preliminary forensics report correctly. 
http://blogs.mcafee.com/mcafee-labs/analyzing-the-target-point-of-sale-malware

> From the above link
> 
> Note: The reference to “bladelogic” is a method of obfuscation.  The malware 
> does not compromise, or integrate with, any
> BMC products in any way.   The executable name “bladelogic.exe” does not 
> exist in any piece of legitimate BMC software.

Regards,

Dale Hurtt
SPEC IT LLC
Contractor for US Army Information Systems Engineering Command (USAISEC)

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the Answers 
Are, and have been for 20 years"

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to