Vulnerabilities / Threats
2/7/2012
05:12 AM
Quick Hits
Quick Hits
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%
Repost This

How (And Why) Attackers Choose Their Targets

To build a sure defense, you need to know what makes you a juicy target. Here are some tips

[The following is excerpted from "How (and Why) Attackers Choose Their Targets," a new report posted this week on Dark Reading's Vulnerability Management Tech Center.]

Every day, we hear another story about a company whose sensitive data has been breached. Press releases, tweets, customer support email, and followup articles all provide insight into the kind of information that’s been compromised, the company’s plans to investigate, and how affected parties can protect themselves. But what’s almost never shared—unless the attacker spreads the word—is how and why the target was chosen and which methods and tools were used.

To effectively fend off attacks and protect our data systems, we must determine how hackers identify their targets and exploit weaknesses to extract data. We must also understand what motivates hackers.

Verizon’s 2011 Data Breach Investigations Report found that 92 percent of data breaches studied stemmed from external agents, 17 percent from implicated insiders, 9 percent from multiple parties and fewer than 1 percent from business partners.

There is no single method used to identify and compromise vulnerable targets. Much like rock stars and CEOs, each attacker has a unique style and process. However, some methods are simply more successful than others and thus tend to be used more often.The 2011 Verizon Data Breach Investigations Report found that 50 percent of breaches studied resulted from some form of hacking, 49 percent incorporated malware, 29 percent involved physical attacks, 17 percent resulted from privilege misuse, and 11 percent employed social tactics.

To identify vulnerable hosts, an attacker will begin scanning for a specific set of vulnerabilities known to be exploitable and prevalent in the wild. And, much like security industry professionals discuss best practices, attackers share knowledge about how quickly each finds targets vulnerable to specific attacks.

Many scripts and scanners are used to find and exploit vulnerabilities—the MySql 5 Enumeration script from Blackhat Academy, for instance, is used to automatically exploit SQL injection flaws. It is trivial to wrap this script with a scanner that spiders a provided URL list and tests for SQL injection flaws. This type of attack targets a known type of vulnerability rather than a specifically known application flaw. These attacks allow a hacker to exploit flaws a company isn’t even aware of and thus probably won’t have an immediate fix for.

To learn more about how attackers find vulnerabilities and choose the organizations they want to go after, download the full report on how hackers choose their targets.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web