Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

BlackBerry servers ripe for the hacking

From BlackBerry to HackedBerry, say the pentesters.

Article comments

Many companies running BlackBerry Enterprise Server (BES) could be inadvertently opening a door to attackers, a penetration testing company has found.

Penetration testing consultancy NTA Monitor found that most of its customers running the BlackBerry Server with Microsoft Exchange were taking the path of least resistance by opening unencrypted ports from the heart of their network to service providers. The providers, in turn, opened a return back to the BES that would pass through firewalls without any policies being applied.

This left the network open on several levels, including session hijacking, IP spoofing, or just the interception of unencrypted traffic.

"A hacker could potentially use this back channel to move around inside an organisation undetected, removing confidential information or installing malware on to the network," said Roy Hills, NTA’s technical director.

According to NTA Monitor’s technical manager, Adrian Goodhead, the open configuration was no accident of poor implementation, accounting for a sizeable 10-15 of the company’s enterprise-level customers using BlackBerry handhelds (roughly 70-80 percent of the total base they surveyed). The commonest cause was simply cost.

The company recommends implementing a BES in a demilitarised zone (DMZ), which would isolate attacks against the sever from the wider network. However, this added complexity, and added complexity added expense.

"You have to add various software and hardware. People are trying to keep costs down," said Goodhead.

He characterised the flaw as low-to-medium in severity because "it requires a fair amount of knowledge" to exploit, but nevertheless one that needed to be addressed.

Goodhead criticised the service providers for not explaining that a more expensive implementation was usually necessary for security reasons. BlackBerry, for its part, gave details of how to implement its technology securely, he said, and so couldn’t be blamed.

NTA Monitor, which recently found holes in VPNs, offers several general security recommendations for clients using BES. These include using SSL encryption, enabling content protection on the handheld, disallowing non-approved applications – including P2P messaging – and turning off Bluetooth on the handheld.



Share:

More from Techworld

More relevant IT news

Comments

me said: Tomorrow at 5 we report on SMTP servers allowed to connect in to a companys SMTP server THROUGH THE FIREWALL to deliver mailI think somewhere in here is the key piece of information that the ExchangeBES server was completely let loose on the Internet and not behind a firewall at all This is implied in the talk about the DMZ but is never really mentioned outright Just that communication ocurrs back and forth whichummis necessary

Bob Thompson said: This article implies that by owning a BES youre more likely to implement bad networking policies Is that the point youre trying to make I dont see - and Im sure RIM would agree - how opening a load of unsecured ports for a BES is indicative of a security problem with a BES Surely its indicative of poor networking practices



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *