Vulnerabilities / Threats
7/25/2013
06:37 AM
John H. Sawyer
John H. Sawyer
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%

How Attackers Target And Exploit Critical Business Applications

Applications such as ERP and CRM make businesses go, yet are often left unpatched and vulnerable

[The following is excerpted from "How Attackers Target and Exploit Critical Business Applications," a new report posted this week on Dark Reading's Applications Security Tech Center.]

Most enterprises rely on a few critical business applications for their day-to-day operations. Many of these applications are well-known, off-the-shelf or cloud-based products. Because of their critical nature and the value of the data contained within them, they are a prime target for attackers.

So why don't we hear more about attacks against enterprise resource planning systems, sensitive e-commerce and business-to-business applications, and customer resource management systems? The primary reason is that enterprises don't see them as being insecure. Also, their complexity makes it difficult to effectively monitor them and detect a compromise.

Even if such systems could be easily monitored, the collective experience in the 2013 Verizon Data Breach Investigations Report tells us that it would probably take months for anyone to notice the breach. Further, notes the report, notification is more likely to come from a third party than from internal monitoring.

But attackers are targeting these systems, and security professionals will need to up their game as targeted attacks and corporate espionage become more prevalent.

In the white paper "Forgotten World: Corpo-rate Business Application Systems," authors Alexander Polyakov and Val Smith say, "These days the majority of companies have strong security policies and patch management as it applies to standard networks and operating systems, but these defenses rarely exist or are in place for ERP-type systems. An attacker can bypass all company investments in security by attacking the ERP system."

It's the very nature of ERP and other enterprise apps that makes them so appealing to attackers.

These systems are complex, customized applications that house the inner workings of the business itself. In order to work effectively, these mega business applications typically have connections into, and receive input from, many different applications and servers throughout the enterprise. These systems are not turnkey, almost always requiring some type of middleware glue from a consulting company. All of these factors make for a-difficult- to-secure and nearly impossible-to-patch system.

Even if these systems were easy to patch, the vulnerabilities would likely go unnoticed because companies are often afraid to perform vulnerability scans on them: There are too many unknowns in how the systems would handle such a scan, and they don't want to impact business operations.

Part of the pushback that occurs around scanning running applications is that those organizations with a strong focus on application security have tended to throw their resources at the front-end of the application life cycle, says John Weinschenk, CEO of Cenzic. While that may be the most cost-effective method of addressing application security, the truth is that it doesn't address the realities of applications running in a production environment

"When you look at an enterprise, traditionally how they have handled application security has been focused at the pre-production level," he says. "But with every company that's been hacked that you've seen in the paper recently, its always the production applications that got hacked."

While this fear of scanning operational applications may be understandable to a point, it leaves some of your most critical systems at risk.

To read more about the challenges of maintaining and securing critical business applications -- and how attackers exploit those applications -- download the free report.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
anon6678820158
50%
50%
anon6678820158,
User Rank: Apprentice
7/29/2013 | 1:09:25 AM
re: How Attackers Target And Exploit Critical Business Applications
Firms have to evaluate the IA issues of the system they are buying into. No longer can company's trust that a vendor will secure their data. IT security should be involved in the vetting process for these systems.
anon7187962634
50%
50%
anon7187962634,
User Rank: Apprentice
7/26/2013 | 6:50:11 AM
re: How Attackers Target And Exploit Critical Business Applications
It's funny, I'm no longer working for a firm that was having MAJOR issues with CRM security (actually, the mass-emailing program). Since CRM is deemed (incorrectly) a "Marketing Application," IT always ignored it as much as possible. We became blacklisted because of insecure sending of emails, and the dipsh*t IT person said, "Well, why don't we just ad an 's' to our urls to make them read 'https' and then we'll be 'secure'."

With morons like that - and the continued thinking that CRM is somehow 'safe' because it's just a Marketing app - it's no wonder that CRM poses a threat.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3562
Published: 2014-08-21
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.

CVE-2014-3577
Published: 2014-08-21
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-...

CVE-2014-5158
Published: 2014-08-21
The (1) av-centerd SOAP service and (2) backup command in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary commands via unspecified vectors.

CVE-2014-5159
Published: 2014-08-21
SQL injection vulnerability in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary SQL commands via the ws_data parameter.

CVE-2014-5210
Published: 2014-08-21
The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) remote_task or (2) get_license request, a different vulnerability than CVE-2014-3804 and CVE-2014-3805.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.