A cyber analytics firm has discovered several instances of enterprise software that collected and sent information home, a behavior which could lead to exposure of sensitive enterprise data.
While its report does not disclose the name of the software vendors, ExtraHop explains in four case studies how installed software sent out data to external locations without companies’ knowledge.
Even though this transmission of data may not be malicious or a privacy risk by itself because it could only be diagnostic data for all we know, it is important for enterprises to have full control over what data is sent out of their network.
Enterprise software sending data home
Collecting and delivering information from a client’s server is a behavior also known as “phoning data home” which could potentially have legal and regulatory implications especially when the data delivery is being performed without the customer’s knowledge.
In the security advisory published today, ExtraHop defines the phoning home process as “a client-to-server communication” which could prove beneficial for both the third-party vendors and the customers when it’s transparent and well documented.
However, “when customers are unaware of this vendor exfiltration, it risks exposure of sensitive data, such as Personally Identifiable Information (PII), in the vendor’s environment.”
“To be clear, we don’t know why these vendors are phoning home data. The companies are all respected security and IT vendors, and in all likelihood, the phoning home of data was either for a legitimate purpose given their architecture design or the result of a misconfiguration,” adds ExtraHop’s advisory.
“But the fact that large volumes of data are traveling outbound from a customer environment to a vendor without the customer’s knowledge or consent is problematic.”
Software with an appetite for data
ExtraHop’s report showcases four cases unearthed during 2018 and the first weeks of 2019 when enterprise software was observed phoning home data to its own servers without the customers’ permission or prior knowledge.
The software vendor types range from endpoint security and device management to consumer security camera and security analytics, and in all highlighted examples, the clients had no idea that data was being sent from their environment to ones controlled by the software’s vendors.
The enterprise software was observed by ExtraHop while:
• Sending encrypted traffic to the public cloud after an evaluation had ended
• Sending data to the cloud without authorization
• Sending data to a known malicious IP address located inChina that hosts malware
• Sending more than 1 TB of customer data from theUnited States to vendor servers in the United Kingdom
This behavior exposed the companies to a wide range of risks such as unauthorized access to data, device management vendor sending data to the cloud, potential vector for malware downloads, potential exposure of PII and violations underGraham-Leach-Bliley, explains ExtraHop’s report.
“What these examples underscore is that it’s very difficult for enterprises to really understand what’s happening with their data,” adds ExtraHop.
“How can you expect to know when a bad actor is exfiltrating data when you don’t know that your trusted vendors are pulling it out of your environment and for what purpose?”
Unauthorized data transmission risks
Since data privacy is a hot subject these days with most countries working on or having already implemented data protection regulations like European Union’s GDPR, exposing sensitive information by having it sent away to a third-party’s environment could attract severe monetary penalties, as well as enterprise clients exposure to identity theft or customer loss caused by reputational damage.
To mitigate these risks, ExtraHop recommends the following measures to detect and block security software from transmitting potentially sensitive data:
• Monitor for vendor activity on your network, whether they are an active vendor, a former vendor or even a vendor post-evaluation.
• Monitor egress traffic, especially from sensitive assets such as domain controllers.
• Match egress traffic to approved applications and services.
• Track deployment of software agents as part of an evaluation.
• Understand regulatory considerations of data crossing political and geographic boundaries.
• Track whether data is used in compliance with vendor contract agreements.
“We decided to issue this advisory after seeing a concerning uptick in this kind of undisclosed phoning home by vendors,” also said Jeff Costlow, ExtraHop CISO. “What was most alarming to us was that two of the four cases in the advisory were perpetrated by prominent cybersecurity vendors.”
“These are vendors that enterprises rely on to safeguard their data. We’re urging enterprises to establish better visibility of their networks and their vendors to make sure this kind of security malpractice doesn’t go unchecked.”
ExtraHop’s advisory is designed to make organizations aware that software phoning home their data is not something unusual per se but that it could lead to a lot of headaches in the ‘right’ circumstances when it is conducted without their knowledge.
More information and extra details on the four case studies, including technical details on how the behavior was discovered while analyzing customers’ computing environments, is available in the ExtraHop security advisory.
Related Articles:
New York Passes Law to Update Data Breach Notification Requirements
Get 97% off The A to Z Cyber Security & IT Certification Training Bundle Deal
Microsoft Office 365 Webmail Exposes User’s IP Address in Emails
Windows 10 SmartScreen Sends URLs and App Names to Microsoft
Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.
The rules are as follows:
- All information and instructions given within these forums is to be used at your own risk. By following or using any of this information you give up the right to hold BleepingComputer.com liable for any damages.
- All the forums are categorized by topics. Please post your questions or messages in the appropriate forum.
- Answers to many of the questions you may have can be found in the Tutorials Section, Glossary, or from other posts on the message boards. Please use the search functions, at the top right of each page, to find your answers. If you are still having problems, feel free to post your question.
- All help must be provided in the forums or on our Discord Server. We do not allow support to be provided or requested via personal message, email, or remote desktop control programs (Logmein, TeamViewer, etc).
- If a topic is posted in a forum that is not appropriate for the question, the staff has the right to move that topic to another better suited forum.
- The posting of any copyrighted material on our web site is strictly prohibited.
- Posting links in order to generate affiliate commissions is not permitted at BleepingComputer.com. Any posts that are deemed to be posted in order to generate affiliate commissions, regardless of the product being promoted, will be deleted. If a user continues to create affiliate SPAM posts, they will be banned.
- Posting links to non-Bleeping Computer malware removal guides is NOT permitted with the exception of security vendors who sometimes release specialized tools and instructional documentation. This is because it is impractical for BleepingComputer to monitor and review all such guides for accuracy, no matter how accurate those guides may, in fact, be.
- There will be no use of profanity on our message boards. This will not be tolerated and can lead to immediate suspension.
- When posting, please use proper grammar. Refrain from ‘text-message’ style substitutions of words like ‘u’ for ‘you’, and ‘ur’ for ‘your’. This is a multi-national forum, and some of our non-english speaking members must use translation software which is confused by abbreviations. Most of our volunteer members are very busy helping as many people as they can, and a post that is hard to read will often be overlooked.
- There will be no racial, ethnic, gender based insults or any other personal discriminations. This will not be tolerated and can lead to immediate suspension.
- There will be no posts meant to offend or hurt any other member, in a manner which is offensive or inflammatory. This includes flaming or instigating arguments.
- Spamming is not permitted; please keep all your posts as constructive as possible.
- Pornography, warez, or any other illegal transactions may NOT be linked in any shape or form.
- If you have questions regarding homework, we will only help you with general concepts. If you are looking for a complete solution or answer, we will most likely just delete your post.
- No subject matter will be allowed whose purpose is to defeat existing copyright or security measures. If a user persists and/or the activity is obviously illegal the staff reserves the right to remove such content and/or ban the user. This would also mean encouraging the use or continued use of pirated software is not permitted, and subject to the same consequences.
- If you are receiving assistance in the Virus Removal forum, you are not allowed to request assistance for the same computer at another malware removal forum. This is to prevent conflicting advice from causing issues with your computer or making it unbootable.
- This forum has the right to request alteration or deletion of any offensive post. If this is not done in a prompt manner, the Staff will delete the material themselves.
- Posts may be deleted for any reasons the forum administrators deem reasonable.
- Pictures may be posted as long as they are not explicit, offensive, or copyrighted.
- Advertisements, of any sort, are not permitted. This includes member names and links to commercial sites in Signatures, or in posts. You also may not solicit sales for Newegg through the use of promotion or coupon codes. If you would like to advertise on our site, contact us here.
- In order to reduce spam on the site, you will not be able to add a signature to your account until you reach 25 posts. Signatures are limited to 5 lines or 2000 characters; whichever comes first. If your signature is larger than the allotted size given or deemed unacceptable, you will be requested to adjust your signature. Failure to comply will result in the removal of your signature.
- Only one image per signature. Images in signatures must also be no larger than 500 pixels wide X 90 pixels high. If you have more than one image you will be requested to remove one. If this is not done in a timely manner the staff has the right to modify your signature to abide by these rules.
- Any links in signatures or profiles cannot be commercial in nature or they will be removed by BleepingComputer. You may not put links in your signature soliciting donations unless you are in certain member groups. Those member groups that are allowed will be expressly notified. If you have a personal website or off-site help resource, that is more than fine, but you can not sell products or services through your signature. Multiple links to the same site, unless for a very specific reason, are not permitted in a signature and will be removed.
- Avatars must be in good taste. This means no vulgar or violent images, pornography, or profanity. Avatars that are found to be inappropriate will be removed at the discretion of the staff.
- Linking to hate, anti-Semitic, racist, pornography, warez, or other illegal sites is not permitted.
- Links in your signature must be unobtrusive and can not use formatting so that attention is brought to them.
- Member’s display names can not be email addresses. This rule is in place to protect you from spam bots who will pick up your email address and spam you.
- Members may have only one account on this forum. There is no need to have more than one.
- Any impersonation of a user from these forums, in any mode of communication, is strictly prohibited and will result in a banning.
- Linked and locked topics are pruned regularly to reduce page clutter. If you have a question about where your topic went, please PM a Moderator or Administrator before starting a new topic asking where it went, or posting a duplicate of the original topic. We will be happy to provide you with a link to the new location, or a reason why it was locked and/or removed.
Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.
When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.