Ars Technica - All content 09月18日
Ascension 医疗系统因网络安全漏洞面临审查
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

美国参议员呼吁对微软进行网络安全疏忽调查,因其在Ascension医疗系统大规模勒索软件攻击中扮演的角色。此次攻击导致140家医院运营中断,560万患者医疗记录泄露。然而,文章更揭示了Ascension自身在安全方面的严重失误。攻击始于一名承包商的笔记本电脑感染,随后攻击者利用微软的Windows Active Directory漏洞,获得了对Ascension网络的“主控权”。参议员批评微软沿用存在安全隐患的Kerberos认证协议,尽管存在更安全的现代替代方案,但系统仍会回退到旧协议,为此次攻击提供了可乘之机。

🔑 **Ascension 医疗系统遭受大规模勒索软件攻击,影响广泛**:去年,Ascension医疗系统遭受了一次严重的勒索软件攻击,导致140家医院的运营受到生命威胁性的干扰,并使560万患者的医疗记录落入攻击者手中。这次事件的严重性促使美国参议员呼吁对微软进行网络安全疏忽的调查。

💻 **攻击源于承包商笔记本感染,并利用Active Directory漏洞**:此次攻击于2024年2月开始,源于一名承包商在下载了通过微软Bing搜索引擎返回的恶意链接后,其笔记本电脑被感染。攻击者随后利用这一入口,成功渗透到Ascension网络中最关键的资产——Windows Active Directory。Active Directory是管理员用于创建、删除用户账户和管理系统权限的核心工具,控制了它相当于获得了整个网络的“主控钥匙”。

🛡️ **微软的Kerberos认证协议被指存在安全隐患**:参议员批评微软持续支持使用存在安全漏洞的Kerberos认证协议,该协议已存在三十年之久。尽管现代版本的Active Directory默认支持更安全的认证机制,但在网络设备(包括被恶意软件感染的设备)发送使用旧协议的认证请求时,系统仍会回退到较弱的认证方式。这种“回退”机制使得攻击者能够进行Kerberoasting攻击,并直接控制Ascension网络的关键安全部分。

Last week, a prominent US senator called on the Federal Trade Commission to investigate Microsoft for cybersecurity negligence over the role it played last year in health giant Ascension's ransomware breach, which caused life-threatening disruptions at 140 hospitals and put the medical records of 5.6 million patients into the hands of the attackers. Lost in the focus on Microsoft was something as, or more, urgent: never-before-revealed details that now invite scrutiny of Ascension’s own security failings.

In a letter sent last week to FTC Chairman Andrew Ferguson, Sen. Ron Wyden (D-Ore.) said an investigation by his office determined that the hack began in February 2024 with the infection of a contractor's laptop after they downloaded malware from a link returned by Microsoft’s Bing search engine. The attackers then pivoted from the contractor device to Ascension’s most valuable network asset: the Windows Active Directory, a tool administrators use to create and delete user accounts and manage system privileges to them. Obtaining control of the Active Directory is tantamount to obtaining a master key that will open any door in a restricted building.

Wyden blasted Microsoft for its continued support of its three-decades-old implementation of the Kerberos authentication protocol that uses an insecure cipher and, as the senator noted, exposes customers to precisely the type of breach Ascension suffered. Although modern versions of Active Directory by default will use a more secure authentication mechanism, it will by default fall back to the weaker one in the event a device on the network—including one that has been infected with malware—sends an authentication request that uses it. That enabled the attackers to perform Kerberoasting, a form of attack that Wyden said the attackers used to pivot from the contractor laptop directly to the crown jewel of Ascension’s network security.

Read full article

Comments

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Ascension 网络安全 勒索软件 微软 Active Directory Kerberos 医疗信息安全 Ascension Cybersecurity Ransomware Microsoft Active Directory Kerberos Healthcare Data Security
相关文章