Snowden Reportedly Used High-Ranking Official’s Profiles to Troll NSA’s Intranet

September 3rd, 2013

Something had to be very wrong on that network. Snowden must have pretty much had top level access to pull this off. Even so, it boggles the mind that something like disabling multi factor authentication didn’t generate some sort of notification at the next level up the pyramid.

I’ve been out of the sysadmin game since 2005, but does this make any sense to any of you who are currently involved with that stuff?

Via: Ars Technica:

The National Security Agency (NSA) is the font of information security wisdom for the US defense and intelligence communities. But apparently, the NSA’s own network security is so weak that a single administrator was able to hijack the credentials of a number of NSA employees with high-level security clearances and use them to download data from the agency’s internal networks. That administrator was Edward Snowden.

The systems accessed by Snowden limit access by user role, so he could not have used his own credentials on them without overriding access controls. Officials familiar with the case told NBC that Snowden had obtained the “profiles” of a number of NSA employees that have been identified through forensic examination of logs, finding periods when the employees were traveling but their accounts were still used to access the intranet. If Snowden used administrative privileges to reset their passwords, failed logins might have flagged a problem—but they might have simply been shrugged off as passwords forgotten over vacation.

In order to pull this off without raising alarms, Snowden would have needed access to the full credentials of the users whose identities he borrowed. He would have needed to somehow either gain access to the public key infrastructure (PKI) keys found in their user authentication or he would have needed to override multi-factor authentication to gain access to the systems. He also would have needed to avoid detection by audit logs in making those changes (or delete the record of changes after the fact). He managed to do all of these things, download the content, and get it past the NSA’s physical security.

Leave a Reply

You must be logged in to post a comment.