Vulnerabilities / Threats
3/10/2014
06:42 AM
Tim Wilson
Tim Wilson
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%

Defending Against Targeted Attacks Requires Human Touch, Speakers Say

Targeted attacks involve a human element that can be detected and stopped, speakers say at Dark Reading event

BOSTON -- SECURITY Conference 2014 -- Targeted attacks tend to be tailored individually, giving them an almost human quality that can be fingerprinted and prevented, according to speakers here on Thursday.

In a live event presented by Dark Reading and InformationWeek and sponsored by Trend Micro, keynote speakers and panelists offered a look at targeted attacks and how to defend against them.

While traditional cyberdefenses have generally focused on building a shield against mass-produced malware, targeted attacks are frequently unique and require a different sort of defense, the speakers said.

"We encourage enterprises to refocus their attention on who the attacker is, rather than just the methods they use," said keynote speaker George Kurtz, CEO and co-founder of CrowdStrike, which offers big data analysis and attribution services. "What we always say is that [enterprises] don't have a malware problem -- they have an adversary problem."

Trend Micro's J.D. Sherry pointed out that while targeted attacks tend to be tailored to the victim, they aren't always sophisticated. "In fact, most of these attacks are actually not very advanced," he said. "Many of them involve vulnerabilities that are years old and that could have been prevented if the victims had just stayed up-to-date with their patches."

Ninety-nine percent of targeted attacks are manually operated, which gives them an almost human quality that is quite different from mass-produced malware, said Harry Sverdlove, CTO of Bit9. "To detect this sort of attack usually means correlating several events on your network," he said.

Targeted attacks require a series of steps that can be stopped if they can be recognized, said Tim "TK" Keanini CTO at Lancope. "The bad guy has to pull off an entire process that may involve four to eight steps without being detected," he said. "And if they are detected, they have to start all over again. Interrupting this 'kill chain' is the key to increasing the attacker's cost and making it more difficult to complete the process."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.