Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure

By

Global cyberattack poses a serious threat to critical infrastructure.

US and international security agencies have warned that Chinese state hackers “have compromised networks of major global telecommunications providers to conduct a broad and significant cyber espionage campaign.”

“The PRC-affiliated cyber activity poses a serious threat to critical infrastructure, government agencies, and businesses,” said CISA Executive Assistant Director for Cybersecurity Jeff Greene. “Along with our US and international partners, we urge software manufacturers to incorporate Secure by Design principles into their development lifecycle to strengthen the security posture of their customers. Software manufacturers should review our Secure by Design resources and put their principles into practice.”

In light of this threat, the agencies – including CISA, FBI, NSA, and others – have jointly released a detailed new guidance document to help network administrators and defenders identify anomalous behavior, improve configuration, harden their devices, and limit the attackers’ access.

For example, the device hardening section for network engineers includes actions such as:

  • Use an out-of-band management network that is physically separate from the operational data flow network. Ensure that management of network infrastructure devices can only come from the out-of-band management network.
  • Implement a strict, default-deny ACL strategy to control inbound and egressing traffic and ensure all denied traffic is logged.
  • Employ strong network segmentation via the use of router ACLs, stateful packet inspection, firewall capabilities, and demilitarized zone (DMZ) constructs.
  • Place externally facing services, such as DNS, web servers, and mail servers, in a DMZ to provide segmentation from the internal LAN and backend resources.
  • Do not manage devices from the internet. Only allow device management from trusted devices on trusted networks.
  • Control access to device Virtual Teletype (VTY) lines with an ACL to restrict inbound lateral movement connections.
  • If using Simple Network Management Protocol (SNMP), ensure only SNMP v3 with encryption and authentication is used, along with ACL protections against unnecessary public exposure.
  • Disable all unnecessary discovery protocols, such as Cisco Discovery Protocol (CDP) or Link Layer Discovery Protocol (LLDP).
  • Disable Internet Protocol (IP) source routing.
  • Disable Secure Shell (SSH) version 1. Ensure only SSH version 2.0 is used with the following cryptographic considerations. For more information on acceptable algorithms, see NSA’s Network Infrastructure Security Guide.

Organizations that believe they are a victim of these attacks should contact their local FBI Field Office or CISA. Read the complete list of guidelines at CISA.
 
 

 
 
 

12/05/2024

Related content

  • NSA Offers Best Practices for OSS in Operational Technology
  • News for Admins
    In the news: CISA Directive Requires Federal Agencies to Secure Network Devices; SUSE Report Reveals Cloud Security Concerns; Canonical Sunbeam Extends OpenStack to Small Cloud Environments; IT Teams Struggle with Cloud Operations; NVIDIA Announces Large Memory AI Supercomputer; PostgreSQL 16 Beta; Red Hat Announces Ansible Lightspeed AI Service; Global Tech Adoption Trends from the World Economic Forum; and CIQ Announces New Infrastructure Management Platform.
  • News for Admins
    In the news:Open Source AI Definition Now Available; Sysdig Report Highlights LLMjacking and Other Security Threats; Microsoft Releases OpenHCL, an Open Source Paravisor; NASA Moves Forward with Lunar Time Zone; Open Source Malware on the Rise, According to Sonatype Report; Six Principles of Operational Technology Cybersecurity Released; New Password Rules Recommended by NIST; OpenSSH 9.9 Released; Docker Updates Usage Plans.
  • CISA Warns of Widespread Exploitation of Known Confluence Vulnerability
  • How to Use an SBOM
comments powered by Disqus