SlideShare a Scribd company logo
Delivering	the	best	in	z	services,	so2ware,	hardware	and	training.	Delivering	the	best	in	z	services,	so2ware,	hardware	and	training.	
World	Class,	Full	Spectrum,	z	Services	
How	to	Protect	Your	Mainframe	from	
Hackers	
Rui	Miguel	Feio	
Security	Lead
Agenda		
•  Introduc@on	
•  Mainframe	Hacking	–	Fact	or	Fic@on?	
•  Securing	the	Mainframe	
•  Is	this	Enough?	
•  Warning!	The	Human	Factor	
•  References	and	Resources	
•  Ques@ons?
Introduc@on	
Rui	Miguel	Feio	is…	
–  Security	lead	at	RSM	Partners	
–  Mainframe	technician	specialising	in	mainframe	security:	
•  Penetra@on	Tes@ng	
•  Security	Audit	
•  Security	Improvement	
–  Has	been	working	with	mainframes	for	the	past	16	years	
–  Started	as	an	MVS	Systems	Programmer	
–  Experience	in	other	plaTorms	as	well
Mainframe	Hacking	
–	Fact	or	Fic@on?
“It	is	a	fairly	open	secret	that	almost	all	systems	
can	be	hacked,	somehow.	It	is	a	less	spoken	of	
secret	that	such	hacking	has	actually	gone	quite	
mainstream.”		
Dan	Kaminsky
Hacking	a	Mainframe	
•  The	mainframe	is	highly	securable	but	not	secure	by	default.	
–  You	need	to	invest	@me	and	resources	to	make	it	secure.	
•  Can	the	mainframe	be	hacked?	
–  Not	only	it	can	be	hacked	but	it	has	already	been	hacked!	
•  Most	mainframe	hacking	cases	are	not	reported.	
•  But	there	are	cases	that	have	come	to	public…
Mainframe	Hacking	In	the	News
Mainframe	Hacking	In	the	News
Hacking	the	Mainframe	on	YouTube
Hacking	the	Mainframe	on	YouTube
Hacking	the	Mainframe	on	YouTube
Hacking	the	Mainframe	on	YouTube
Securing	the	Mainframe
Top	10	Security	Vulnerabili@es		
1.  Excessive	access	to	APF	libraries	
2.  Number	of	users	with	System	Special	
3.  User	SVCs	reques@ng	privileged	func@ons		
4.  USS	controls	(UNIXPRIV,	UID=0)	
5.  Started	tasks	not	defined	as	PROTECTED		
6.  RACF	database	not	properly	protected	
7.  Profiles	in	OPERCMDS	Class	not	properly	set	
8.  SURROGAT	profiles	permihng	use	of	privileged	userids	
9.  RACF	profiles	with	UACC	or	ID(*)	>	NONE	
10.  Batch	Jobs	with	excessive	resource	access
What’s	the	Problem?	
•  Excessive	access	to	APF	libraries	
–  Users	with	UPDATE	access	or	higher	to	an	APF	library	can	create	an	authorised	
program	that	can	bypass	security	controls	and	execute	privileged	instruc@ons.	
•  Number	of	users	with	System	Special	
–  SPECIAL	aoribute	gives	the	user	full	control	over	all	of	the	RACF	profiles	in	the	
RACF	database.	At	the	system	level,	the	SPECIAL	aoribute	allows	the	user	to	
issue	all	RACF	commands.		
•  User	SVCs	reques@ng	privileged	func@ons	
–  They	are	extensions	to	the	opera@ng	system,	receiving	control	in	Supervisor	
State	and	in	the	master	storage	protected	key	(key	0).	This	means	that	they	
have	the	power	to	circumvent	security	measures	by	altering	otherwise	
protected	storage	areas.
What’s	the	Problem?	
•  USS	controls	(UNIXPRIV,	UID=0)	
–  The	UNIXPRIV	class	resource	rules	are	designed	to	give	a	limited	subset	of	the	
superuser	UID=0	capability.	Userids	with	superuser	authority	(UID=0),	have	
full	access	to	all	USS	directories	and	files	and	full	authority	to	administer.	
•  Started	tasks	not	defined	as	PROTECTED		
–  Userids	associated	with	started	tasks	should	be	defined	as	PROTECTED	which	
will	exempt	them	from	revoca@on	due	to	inac@vity	or	excessive	invalid	
password	aoempts,	as	well	as	being	used	to	sign	on	to	an	applica@on.	
•  RACF	database	not	properly	protected	
–  A	user	who	has	READ	access	to	the	RACF	database	could	make	a	copy	and	
then	use	a	cracker	program	to	find	the	passwords	of	userids.
What’s	the	Problem?	
•  Profiles	in	OPERCMDS	Class	not	properly	set	
–  Controls	who	can	issue	operator	commands:	JES,	MVS,	operator	commands.	
•  SURROGAT	profiles	permihng	use	of	privileged	userids	
–  This	class	allows	userids	to	access	the	privileges	of	other	userids	by	submihng	
work	under	their	authority	without	requiring	a	password.		
•  RACF	profiles	with	UACC	or	ID(*)	>	NONE	
–  If	a	userid	is	not	defined	to	the	Access	Control	List	(ACL)	of	a	RACF	profile,	
UACC	or	ID(*)	will	provide	them	the	access.	In	some	cases,	READ	access	can	be	
a	security	risk	because	it	can	provide	access	to	sensi@ve	data.
What’s	the	Problem?	
•  Batch	Jobs	with	excessive	resource	access	
–  It	is	common	to	see	the	userid	of	the	batch	job	having	too	much	access	to.	
This	means	that	when	the	job	enters	into	the	job	scheduler,	it	can	accidentally	
or	maliciously	access	sensi@ve	data	or	resources.
But	There	Are	Many	More!!	
•  Profiles	in	Warning	mode	
•  Userids	with	no	Password	
Interval	
•  Data	transfer	methods	
•  U@li@es	(e.g.	ISRDDN,	TASID)	
•  RACF	Class	Facility	
•  RACF	Class	XFACILIT	
•  RACF	Class	SERVAUTH	
•  RACF	Class	JESINPUT	
•  RACF	Class	JESJOBS	
•  …
Monitoring	and	Aler@ng	Systems	
•  Monitoring	and	Aler@ng	is	essen@al	but	does	not	always	work.	
•  Monitoring	processes:	
–  Not	covering	the	essen@als	
–  Teams	not	skilled	enough	to	iden@fy	problems	
•  Aler@ng	processes:	
–  Not	covering	the	essen@als	
–  Not	properly	configured	
–  Can	be	compromised
Compromising	the	Aler@ng	System	
•  Let’s	use	the	example	of	IBM	zSecure	Alert…	
•  HLQ.C2POLICE.C2PCUST	contains	all	the	aler@ng	code	and	
configura@on	sehngs	
•  Whoever	has	READ	access	to	this	dataset	will	be	able	to:	
–  Check	the	configura@on	and	the	alerts	
–  Check	for	example	to	which	email	address	the	alerts	are	being	sent	and	flood	
the	email	address	with	false	posi@ves	
–  While	problem	is	being	iden@fied,	the	hacker	has	a	window	of	opportunity	to	
perform	malicious	ac@vi@es
Is	This	Enough?
“The	hacker	is	going	to	look	for	
the	crack	in	the	wall…”		
Kevin	Mitnick	in	“The	Art	of	Intrusion”
Once	he	finds	it…	It’s	Play@me!
7	Security	Principles	
•  Know	what	are	you	trying	to	protect	1	
•  Know	the	environment	2	
•  Know	your	enemy	3	
•  Know	your	weaknesses	and	strengths	4	
•  Assess	and	plan	5	
•  Define	a	strategy	6	
•  Adapt	and	evolve	or	‘die’	7
The	Mainframe	is	Part	of	Something	
The	mainframe	is	part	of	an	
ecosystem:	
–  Servers	
–  Terminals	
–  Other	mainframes	
–  Smart	phones	
–  Tablets	
–  Routers	
–  Switches	
–  IoT	devices	
–  Users	(technical	and	non-technical)	
–  3rd	par@es	
–  …
The	3	Main	‘Actors’	
Hacker	 Techie	 User
5	Stages	of	Hacking	
	Cover	Tracks	
	Maintain	Access	
	Gain	Access	
	Scanning	
	Reconnaissance
Strengths	and	Weaknesses	
•  Technological	estate		
•  Processes	&	procedures	
•  Technical	documents	
•  Access	requirements	
•  Segrega@on	of	du@es	
•  Training	and	educa@on	to	staff	and	3rd	
par@es	
•  Systems’	updates		
•  Process	to	keep	systems	up-to-date	
•  Team	work	
•  Request	help!
Assess,	Plan	and	Define	a	Strategy
Adapt	and	Evolve	
•  Security	is	not	a	one	@me	@ck	in	a	box	process	
•  Security	requires	a	daily	effort	and	constant	improvements	
•  You	should	consider	performing	regular:	
–  Penetra@on	tests	
–  Security	Audits	
–  Implementa@on	of	Security	Improvement	programmes	
–  Run	vulnerability	scannings	
•  Remember:	Hackers	have	all	the	@me	in	the	world	and	are	
constantly	developing	new	ways	of	aoacking	and	compromising!
Warning!	The	Human	
Factor
“Most	advanced	aoacks	rely	as	much	on	
exploi@ng	human	flaws	as	on	exploi@ng	system	
flaws.”		
An	Hacker
Humans	–	The	Inside	Threat	
*	Figure	from	the	“IBM	2015	Cyber	Security	Intelligence	Index”	report
The	Weakest	Link	
Insider	 Associate	 Affiliate	 Dumbass
Conclusion
To	Summarise…	
•  There’s	a	lot	of	work	to	be	done	to	protect	the	mainframe,	
internally,	and	externally.	
•  Training	and	educa@on	are	essen@al!	
•  Need	to	keep	up	to	date.	
•  Humans	are	the	weakest	link.	
•  Security	MUST	be	taken	seriously!	
*	Dark	Reading	visitors	responding	to	“What	do	you	consider	the	greatest	security	threat	to	your	organiza5on?”
References	&	Resources
Light	Reading	
•  “IBM	2015	Cyber	Security	Intelligence	Index”,	IBM	
•  “2015	Threat	Report”,	Websense	
•  “2015	Cost	of	Cyber	Crime	Study:	Global”,	Ponemon	Ins@tute	
•  “The	Human	Factor	2015”,	Proofpoint		
•  “The	Insider	Threat:	Detec@ng	Indicators	of	Human	Compromise”,	Tripwire	
•  “White	Hats,	Black	Hats.	A	Hacker	Community	is	Emerging	Around	the	
Mainframe.	What	You	Need	to	KNow…”,	Mike	Rogers	@	Aoachmate.com	
•  “The	Art	of	War”,	Sun	Tzu
Web	Sites		
•  PC	World:	
–  hop://www.pcworld.com/ar@cle/2034733/pirate-bay-cofounder-charged-with-hacking-ibm-
mainframes-stealing-money.html	
•  The	Register:	
–  hop://www.theregister.co.uk/2013/03/04/convicted_hacker_hack_into_prison/	
•  Daily	Mail:	
–  hop://www.dailymail.co.uk/news/ar@cle-2526726/Married-Barclays-boss-spent-stolen-2million-call-
girls-Banker-accused-five-year-cash-the2.html
YouTube	Videos	
•  Hacking	Mainframes	Vulnerabili@es	in	applica@ons	exposed	over	TN3270,	Dominic	
White:	
–  hops://www.youtube.com/watch?v=3HFiv7NvWrM&feature=youtu.be	
•  Mainframes	Mopeds	and	Mischief	A	PenTesters	Year	in	Review,	Tyler	Wrightson:	
–  hops://www.youtube.com/watch?v=S-9Uk706wuc	
•  Smashing	the	Mainframe	for	Fun	and	Prison	Time,	Philip	Young:		
–  hops://www.youtube.com/watch?v=SjtyifWTqmc&feature=youtu.be	
•  Black	Hat	2013	-	Mainframes:	The	Past	Will	Come	to	Haunt	You,	Philip	Young:	
–  hops://www.youtube.com/watch?v=uL65zWrofvk&feature=youtu.be
Ques@ons?	
	
Hands	Up!!
Rui	Miguel	Feio,	RSM	Partners		
ruif@rsmpartners.com	
mobile:	+44	(0)	7570	911459	
linkedin:	www.linkedin.com/in/rfeio	
www.rsmpartners.com	
Contact

More Related Content

PPTX
La soberanía y la democracia participativa en venezuela
PPT
20-26. Derecho Constitucional. El Derecho a la Vida
PDF
Mainframe Security - It's not just about your ESM v2.2
PDF
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
PDF
Cyber security and the mainframe (v1.3)
PDF
How to Improve RACF Performance (v0.2 - 2016)
PDF
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
PDF
2017 - Cibersecurity v1.0 (English version)
La soberanía y la democracia participativa en venezuela
20-26. Derecho Constitucional. El Derecho a la Vida
Mainframe Security - It's not just about your ESM v2.2
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Cyber security and the mainframe (v1.3)
How to Improve RACF Performance (v0.2 - 2016)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
2017 - Cibersecurity v1.0 (English version)

Similar to How to Protect Your Mainframe from Hackers (v1.0) (20)

PDF
Security Audit on the Mainframe (v1.0 - 2016)
PDF
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
PDF
(2017) Cybercrime, Inc. (v3.2)
PPTX
Defending Your IBM i Against Malware
PPTX
Cyber Crimes: The next five years.
PPTX
2016 to 2021
PPT
Ethical Hacking
PPTX
Cyber security and Hacking
PDF
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
PDF
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
PPTX
Ethical hacking and cyber security intro
PPTX
Mnx solutions cybersecurity presentation monroe mi
PPTX
Defending Enterprise IT - beating assymetricality
PDF
Life as an enterprise security geek from underground. (What enterprises want ...
PDF
Practical White Hat Hacker Training - Introduction to Cyber Security
PDF
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
PPTX
Presentation infra and_datacentrre_dialogue_v2
PPTX
MSP360 Cybersecurity Master Class part 2
PDF
Network and Endpoint Security v1.0 (2017)
PDF
Avoid These Top 15 IT Security Threats
Security Audit on the Mainframe (v1.0 - 2016)
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
(2017) Cybercrime, Inc. (v3.2)
Defending Your IBM i Against Malware
Cyber Crimes: The next five years.
2016 to 2021
Ethical Hacking
Cyber security and Hacking
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Ethical hacking and cyber security intro
Mnx solutions cybersecurity presentation monroe mi
Defending Enterprise IT - beating assymetricality
Life as an enterprise security geek from underground. (What enterprises want ...
Practical White Hat Hacker Training - Introduction to Cyber Security
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Presentation infra and_datacentrre_dialogue_v2
MSP360 Cybersecurity Master Class part 2
Network and Endpoint Security v1.0 (2017)
Avoid These Top 15 IT Security Threats

More from Rui Miguel Feio (11)

PDF
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
PDF
(2017) GDPR – What Does It Mean For The Mainframe v0.2
PDF
2017 - Data Privacy and GDPR (v1.1)
PDF
RACF - The Basics (v1.2)
PDF
2017 - Ciberseguranca v1.0 (versao em Portugues)
PDF
Tackling the cyber security threat (2016 - v1.0)
PDF
Cyber Crime - The New World Order (v1.0 - 2016)
PDF
Cybercrime Inc. v2.2
PDF
Challenges of Outsourcing the Mainframe (v1.2)
PDF
IOT & BYOD – The New Security Risks (v1.1)
PDF
The Billion Dollar Product - Online Privacy (v2.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2017) GDPR – What Does It Mean For The Mainframe v0.2
2017 - Data Privacy and GDPR (v1.1)
RACF - The Basics (v1.2)
2017 - Ciberseguranca v1.0 (versao em Portugues)
Tackling the cyber security threat (2016 - v1.0)
Cyber Crime - The New World Order (v1.0 - 2016)
Cybercrime Inc. v2.2
Challenges of Outsourcing the Mainframe (v1.2)
IOT & BYOD – The New Security Risks (v1.1)
The Billion Dollar Product - Online Privacy (v2.2)

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Machine learning based COVID-19 study performance prediction
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Big Data Technologies - Introduction.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectral efficient network and resource selection model in 5G networks
Assigned Numbers - 2025 - Bluetooth® Document
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Digital-Transformation-Roadmap-for-Companies.pptx
Programs and apps: productivity, graphics, security and other tools
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx

How to Protect Your Mainframe from Hackers (v1.0)