Perimeter
10/2/2012
07:43 PM
Rich Mogull
Rich Mogull
Commentary
50%
50%

The World Ended And No One Noticed

Not a single breach among the many in the past two weeks did enough damage to trigger an alarm

Catastrophic denial-of-service attacks by a foreign power against our largest financial institutions. An actively exploited 0day vulnerability in the world's most-used Web browser. The infiltration of one of technology's largest consumer and enterprise software vendors, resulting in the hijacking of their infrastructure to distribute digitally signed malicious software. The deep compromise of a major supplier of control software to utilities providers -- one with remote access to its customers control systems. New vulnerabilities in Java affecting all major platforms. The release of a tool that, for $20, can rapidly crack one of the most popular types of virtual private networks. The breach of an extremely common open-source Web application tool's servers and insertion of back doors.

All in two weeks.

If I wrote those words even a few years ago, everyone would assume they were a work of fiction or a desperate cry for attention from a delusional media whore. These days, they are so mundane as to barely garner a retweet. They are the equivalent of the local evening news filled with stories of poisoned restaurants, killer playground equipment, and kidnapped Chihuahuas. They register attention for a few hours, then fade into footnote.

Some of the stories above resulted in at least a modicum of attention from mainstream media, but it's clear that society, and even the infosec community, has mostly moved onto other things in the span of days, or even hours. Not that the conversation is dead; I'm sure we'll see plenty of conference presentations and blog posts on the Adobe breach, in particular, but nothing will really change, and no one will care outside the ever-present echo chamber.

Why? Because not a single one of these events resulted in enough loss to shift the needle. Not one of them resulted in enough damage, on a wide enough scale for anyone to change what they're doing. Society sacrificed a few lambs (or even wolves) and moved onto the next day.

And of even more interest (at least to me), none of this could have been stopped by those funny things we call "best practices."

The DDoS attacks? All major financial institutions already have basic DDoS protections. The IE 0day? No way to patch, and it was being exploited before any IPS had signatures. Malware signed with Adobe signatures? Yep -- AV seemed to do real well against that one in the targeted organizations. The SCADA hack? Well, let's just say best practices in that industry aren't necessarily the same as anyone else, barring a time machine set for 1989. Using PPTP? The best practice was that a long passphrase was still safe to use. PHPMyAdmin? Again- for users of the product, maybe only deeper outbound filtering than what's common today would have caught it.

Note that we hard-core, self-designated elite pundits could come up with all sorts of ways to stop the attacks, as long as someone else is paying for it. We know how to "do security right" and stop nearly all of these incidents, but not in any cost-effective way.

Our commonly accepted best practices, as recorded in books, codified in standards, and taught in our classes, are clearly dead. They fail to withstand the slightest digital hip check. But it doesn't matter, since clearly they are good enough to keep our overall losses, as an industry and a society, within acceptable levels. The math is easy -- we will never spend more than the absolute minimum needed to keep losses below the arbitrary line of acceptable.

There are plenty of targeted, sophisticated attacks, with victims prepared and naive alike. There is plenty of low-level crime. Some die, some live. But, overall, in the big picture, losses are still within the range of acceptable. And until that changes, nothing else will.

Rich Mogull is is founder of Securosis LLC and a former security industry analyst for Gartner

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.