Advertisement

The Interior Department OIG clearly had some fun hacking the agency’s Wi-Fi networks

The report by the Office of the Inspector General underscores how a tech-savvy team can expose and help fix gaping security holes.
The Department of Interior headquarters (Wikimedia)

While multibillion-dollar companies hire expensive outside experts to conduct elaborate mock-raids on their networks, federal agencies tend to rely on their inspectors general for that. But a new report from the Department of Interior’s watchdog would make any crack team of corporate security-testers proud.

To test the hundreds of wireless security networks at the DOI, inspector general (IG) investigators surreptitiously used cheap hacking tools from publicly accessible areas to intercept and decrypt communications in multiple bureaus at the sprawling department. They found systematic weakness in the department’s security that a malicious hacker could have exploited to steal data.

“The department’s failure to securely configure wireless networks has put its wireless and internal networks at high risk of compromise,” IG investigators said in a report published Wednesday.

The IG’s mock attacks — which weren’t noticed by either physical security guards or IT staff — were “highly successful,” the watchdog said. In one instance, investigators conducted an “evil twin” attack which used a rogue wireless access point to trick devices into sending it data. In another, the IG’s penetration-testers were able to get beyond the wireless network at two of the department’s bureaus and into internal networks.

Advertisement

The report underscores how a tech-savvy IG team can expose and help fix the type of gaping security holes that foreign spies or criminals might covet. The stakes are high as weaknesses at one agency can affect others. For example, when alleged Chinese hackers stole sensitive personal data on millions of federal employees five years ago, they did so in part by accessing a database stored on DOI servers.

The new IG report has the Department of Interior’s attention: Officials agreed to act on a slew of security recommendations, including conducting regular penetration tests of networks and exploring setting up a system to prevent specific hacking techniques.

“The Office of the Chief Information Officer takes the protection of our assets and systems very seriously,” the department said in a statement. “Over the past two years, we have implemented multiple controls to standardize wireless networks across the Department to ensure a consistent level of security. As a result, we substantially addressed all Office of Inspector General recommendations prior to the release of this report.”

Included in those recommendations were steps to better protect the agency’s more sensitive data. “Because the bureaus did not have such protective measures in place, such as network segmentation, we were able to identify assets containing sensitive data or supporting mission-critical operations,” the IG report says.

“Effectively implementing security controls across such a diverse, decentralized, and interconnected infrastructure is a very difficult and complex goal,” the watchdog said. “Any misconfiguration or inherent weakness in one technology can have a domino effect that allows an attacker to pivot from one system to the next, one bureau to the next, repeatedly.”

Advertisement

UPDATE, 05:44 p.m., EDT: This story has been updated with a statement from the Department of Interior. 

Sean Lyngaas

Written by Sean Lyngaas

Sean Lyngaas is CyberScoop’s Senior Reporter covering the Department of Homeland Security and Congress. He was previously a freelance journalist in West Africa, where he covered everything from a presidential election in Ghana to military mutinies in Ivory Coast for The New York Times. Lyngaas’ reporting also has appeared in The Washington Post, The Economist and the BBC, among other outlets. His investigation of cybersecurity issues in the nuclear sector, backed by a grant from the Pulitzer Center on Crisis Reporting, won plaudits from industrial security experts. He was previously a reporter with Federal Computer Week and, before that, with Smart Grid Today. Sean earned a B.A. in public policy from Duke University and an M.A. in International Relations from The Fletcher School of Law and Diplomacy at Tufts University.

Latest Podcasts