{"id":23027,"date":"2021-07-02T04:59:11","date_gmt":"2021-07-01T23:29:11","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/cyberthreats-in-isolated-subnet\/23027\/"},"modified":"2021-07-02T04:59:11","modified_gmt":"2021-07-01T23:29:11","slug":"cyberthreats-in-isolated-subnet","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/cyberthreats-in-isolated-subnet\/23027\/","title":{"rendered":"Isolated subnets seem secure"},"content":{"rendered":"<p>Some infosec specialists believe isolated networks do not need additional protection; if threats have no way to get in, why bother? But isolation is not a guarantee of invulnerability. Our experts share several scenarios based on real cases to demonstrate.<\/p>\n<p>Our hypothetical enterprise has a subnet isolated with an air gap, meaning not only that there is no access to it from the Internet, but that even other segments of the same enterprise\u2019s network can\u2019t reach it. Moreover, in line with the company\u2019s information security policy, the following rules apply:<\/p>\n<ul>\n<li>All machines in the segment must use antivirus protection and undergo manual updates once a week (that\u2019s frequent enough for an isolated segment);<\/li>\n<li>Every machine\u2019s device control system must prohibit the connection of flash drives except those in the list of trusted devices;<\/li>\n<li>Cell phone use on site is prohibited.<\/li>\n<\/ul>\n<p>Nothing out of the ordinary there. What could go wrong?<\/p>\n<h2>Scenario one: DIY-style Internet connection<\/h2>\n<p>When a facility loses Internet access, bored employees adopt workarounds. Some get themselves an extra phone, hand in one at the front desk, and connect the second as a modem to get a work computer online.<\/p>\n<p>The threat model for this segment does not anticipate network attacks, Internet malware, or other, similar security issues. In reality, not every administrator updates antivirus protection every week, and as a result, cybercriminals can infect one computer with a spyware Trojan, gain network access, and spread the malware over the entire subnet, leaking information until the next antivirus update shuts them out.<\/p>\n<h2>Scenario two: An exception to every rule<\/h2>\n<p>Even \u00a0isolated networks allow for exceptions\u00a0\u2014 trusted flash drives, for example. But with no restrictions on those flash drives\u2019 use, who\u2019s to say a drive won\u2019t be used to copy files to and from the system or for other admin needs in nonisolated parts of the network? What\u2019s more, technical-support staff sometimes connect their laptops to an isolated network, for example to configure network equipment within the segment.<\/p>\n<p>If a trusted flash drive or laptop becomes a delivery vector for zero-day malware, the malware\u2019s presence in the target network should be short-lived \u2014 once updated, the organization\u2019s nonisolated antivirus will neutralize the threat there. Looking beyond the damage it can do to the main, nonisolated network even in that short time, however, the malware will remain in the isolated segment until that segment\u2019s next update, which in our scenario won\u2019t happen for at least a week.<\/p>\n<p>The outcome depends on the malware variant. For example, it might write data to those trusted flash drives. After a short while, another zero-day threat in the nonisolated segment might start searching connected devices for the hidden data and sending it outside the company. Alternatively, the malware\u2019s goal could be some form of sabotage such as altering software or industrial controller settings.<\/p>\n<h2>Scenario three: Insiders<\/h2>\n<p>A compromised employee with access to the premises where the isolated network segment is located can deliberately compromise the perimeter. For example, they might connect a miniature Raspberry-Pi-based malicious device to the network, having fitted it with a SIM card and mobile Internet access. The case of <a href=\"https:\/\/www.kaspersky.com\/blog\/dark-vishnya-attack\/24867\/\" target=\"_blank\" rel=\"noopener nofollow\">DarkVishnya<\/a> is one such example.<\/p>\n<h2>What to do<\/h2>\n<p>In all three cases, a vital detail was missing: an up-to-date security solution. Had Kaspersky Private Security Network been installed in the isolated segment, it would have reacted to and closed down all threats in real time. The solution is essentially an on-premise version of our cloud-based Kaspersky Security Network, but capable of working in a data diode mode.<\/p>\n<p>In other words, although local, Kaspersky Privacy Security Network receives information about the latest threats from outside and shares it with endpoint solutions inside. At the same time, it keeps every single byte of data from beyond the isolated perimeter from getting into the global network. You can learn more about the solution on its <a href=\"https:\/\/www.kaspersky.co.in\/enterprise-security\/private-security-network?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">official page<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-top3\">\n","protected":false},"excerpt":{"rendered":"<p>Does isolating a network segment really guarantee its invulnerability? <\/p>\n","protected":false},"author":2581,"featured_media":23028,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2036,2609],"tags":[2950,2661,2689,3101,81,3028],"class_list":{"0":"post-23027","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-air-gap","10":"tag-darkvishnya","11":"tag-insiders","12":"tag-isolated-network","13":"tag-targeted-attacks","14":"tag-unauthorized-access"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cyberthreats-in-isolated-subnet\/23027\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cyberthreats-in-isolated-subnet\/18509\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cyberthreats-in-isolated-subnet\/24977\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cyberthreats-in-isolated-subnet\/22985\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cyberthreats-in-isolated-subnet\/22243\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cyberthreats-in-isolated-subnet\/25583\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cyberthreats-in-isolated-subnet\/25055\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cyberthreats-in-isolated-subnet\/31002\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cyberthreats-in-isolated-subnet\/9801\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyberthreats-in-isolated-subnet\/40438\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cyberthreats-in-isolated-subnet\/17284\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cyberthreats-in-isolated-subnet\/17732\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cyberthreats-in-isolated-subnet\/14995\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cyberthreats-in-isolated-subnet\/27021\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cyberthreats-in-isolated-subnet\/31179\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cyberthreats-in-isolated-subnet\/27249\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cyberthreats-in-isolated-subnet\/24069\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyberthreats-in-isolated-subnet\/29403\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyberthreats-in-isolated-subnet\/29195\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/air-gap\/","name":"air gap"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/23027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=23027"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/23027\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/23028"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=23027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=23027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=23027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}