02:59 PM

Tech Insight: The Enterprise Hacks Back!

Have you ever been tempted to strike back against a hacker? Read this before you make the wrong move

Let's face it: We are all tired of attacks against our enterprise networks. Heck, we'd love to stick it to bad guys plaguing our users and our corporate data -- but even though you might have the tools and skills to do it, being a vigilante can be a dangerous game.

Even if you put aside the legal issues -- taking matters into your own hands can constitute a violation of the law -- hacking back could make things worse for your users. If they feel they're in a firefight, then some attackers could choose to take a more persistent approach -- targeted directly at your organization.

As security professionals, we are regularly reminded of our ethical duties to keep data safe, protect our users, and not exploit a vulnerability we did not have specific permission to attack. These things don't apply just to our daily work. Our ethical obligations extend beyond the borders of our network and even to the machines being used in attacks against us.

When's the last time you received a phishing or spear-phishing attack against your organization? Did you stop to look deeper into it, click the link, and start exploring the site that was targeting your users? There are some interesting things that can be found just by viewing the site and attempting to navigate to the root of the attack site's directory.

In some cases, I've seen attackers who were dumb enough to allow directory browsing -- which exposed the entire collection of stolen credentials to anyone who took the file name from the URL. One particular attacker left his exploit kit in the directory -- along with the address he was having the credentials emailed to. Not very smart.

But where does casual browsing of the attacking site begin to go too far?

If the attacker is storing the stolen credentials or credit card numbers alongside his phishing pages, then do not view them. You don't want the FBI knocking on your door asking what you did with the 1,500 credit card numbers you downloaded. And don't go looking for a way to delete the data, either -- you could end up destroying critical evidence that could be used to legally go after the attacker.

For targeted spear-phishing attacks, contact your local FBI office. They may help you to take the site offline and, hopefully, track down the source of the attack. You can also approach your hosting provider to get the site taken offline, which many will do immediately when they realize what's being hosted on their servers. Ideally, the hosting provider will lock the accounts and prohibit access, while preserving the data for investigation by law enforcement.

What about malware and botnets? There has been some interesting research during the past several years into botnet communications and how they can be controlled and even taken over. In 2008, European researchers learned how the Storm botnet communicates and developed an effective attack to disrupt its peer-to-peer (P2P) botnet communications.

If I know how to disrupt a botnet -- making it effectively useless -- should I do it? Not necessarily. In fact, Jose Nazario, a security researcher with Arbor Networks, told Dark Reading, "This has been a taboo subject of exploration, as people do not want to mess with other peoples' PCs by injecting commands."

He's right. Injecting commands into a botnet could have undesired effects -- from the loss of simple connectivity to serious data loss.

However, botnet research like this can be used for good, under the right circumstances. Twice in the past six months (read "Microsoft, Researchers Team Up And Tear Down Major Spamming Botnet" and "Another Botnet Gets Dismantled, But This Time With Arrests)," large botnets have been targeted and taken down as a joint effort by researchers (including those above), private companies (including Microsoft), and law enforcement. By obtaining court orders to monitor the botnet operations and its controllers, researchers were able to gain enough information to help law enforcement arrest three Mariposa botnet hunters.

Next time you consider turning the tables on the attackers, step back and remember you're becoming an attacker yourself -- and could quickly get into hot water, both with your employer and the law.

Instead, take the time to learn how tools like OSSEC HIDS and its active response capabilities can automate blocking attacker IPs without any fuss. Just remember to whitelist your critical servers first.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.