As always, the primary ongoing assurance activity is the review of incidents conducted by the security program to determine if the program is efficiently and effectively protecting the scientific mission of the Laboratory. This ongoing review suggests that the program is functioning well and we continue to make adjustments to controls and policies as required by the environment.
Drive-by infections (malicious code on websites that exploit vulnerable web applications) continue to be our most significant source of damage. However, our protections implemented in Q1 limit and isolate the damage early - in Q2 we isolated 390 computers with vulnerable versions of Flash and 40 computers with vulnerable versions of Java. In addition, to protect against other web applications, we expanded BigFix, a tool to patch third party applications, to 2700 clients including both PCs and Macs. With BigFix for Macs we are well positioned to enforce patching if the threat environment starts to focus on Macs.
This is an ongoing top risk, although we have not witnessed any significant activity in the last quarter.
An attack of Macs via the Flashback malware emerged on the Internet. A drive-by-download could install malware on Mac systems with vulnerable versions of JRE. We were one of the first to identify network indicators of the Flashback malware and shared them with REN-ISAC, NSM, ESnet, and Kapersky to facilitate detection. We were able to quickly deploy Bro policy to detect and remove 23 infected Macs from the network.
The emergence of a Mac-targeted trojan suggests that Apple’s growth in market share may generate more targeted attacks. We are well positioned to deal with this threat as we can leverage BigFix to automate patching.
The Cyber Team made significant progress on its FY12 business plan. In addition to other items in this report, progress included:
The Department of Energy’s Inspector General included Berkeley Lab in the following audits which are already in process:
As always, we will consider any recommendations based on these audits in the context of our risk management approach and cost/benefit analysis.
PEMP Objective 8.2 Notable Outcome to “Implement improved intrusion detection by fully deploying a next generation malware protection system and incorporating it into the Laboratory's continuous monitoring program.”
With the integration of FireEye last quarter, we finalized our deployment with fully automated responses to FireEye alerts.
Our cyber team had several successes that provided or will provide broad benefit for the cyber community:
Our policy team participated in several key activities that broadly benefited or are intended to benefit the DOE complex, including: