Vulnerabilities / Threats
7/25/2013
06:37 AM
John H. Sawyer
John H. Sawyer
Quick Hits
50%
50%

How Attackers Target And Exploit Critical Business Applications

Applications such as ERP and CRM make businesses go, yet are often left unpatched and vulnerable

[The following is excerpted from "How Attackers Target and Exploit Critical Business Applications," a new report posted this week on Dark Reading's Applications Security Tech Center.]

Most enterprises rely on a few critical business applications for their day-to-day operations. Many of these applications are well-known, off-the-shelf or cloud-based products. Because of their critical nature and the value of the data contained within them, they are a prime target for attackers.

So why don't we hear more about attacks against enterprise resource planning systems, sensitive e-commerce and business-to-business applications, and customer resource management systems? The primary reason is that enterprises don't see them as being insecure. Also, their complexity makes it difficult to effectively monitor them and detect a compromise.

Even if such systems could be easily monitored, the collective experience in the 2013 Verizon Data Breach Investigations Report tells us that it would probably take months for anyone to notice the breach. Further, notes the report, notification is more likely to come from a third party than from internal monitoring.

But attackers are targeting these systems, and security professionals will need to up their game as targeted attacks and corporate espionage become more prevalent.

In the white paper "Forgotten World: Corpo-rate Business Application Systems," authors Alexander Polyakov and Val Smith say, "These days the majority of companies have strong security policies and patch management as it applies to standard networks and operating systems, but these defenses rarely exist or are in place for ERP-type systems. An attacker can bypass all company investments in security by attacking the ERP system."

It's the very nature of ERP and other enterprise apps that makes them so appealing to attackers.

These systems are complex, customized applications that house the inner workings of the business itself. In order to work effectively, these mega business applications typically have connections into, and receive input from, many different applications and servers throughout the enterprise. These systems are not turnkey, almost always requiring some type of middleware glue from a consulting company. All of these factors make for a-difficult- to-secure and nearly impossible-to-patch system.

Even if these systems were easy to patch, the vulnerabilities would likely go unnoticed because companies are often afraid to perform vulnerability scans on them: There are too many unknowns in how the systems would handle such a scan, and they don't want to impact business operations.

Part of the pushback that occurs around scanning running applications is that those organizations with a strong focus on application security have tended to throw their resources at the front-end of the application life cycle, says John Weinschenk, CEO of Cenzic. While that may be the most cost-effective method of addressing application security, the truth is that it doesn't address the realities of applications running in a production environment

"When you look at an enterprise, traditionally how they have handled application security has been focused at the pre-production level," he says. "But with every company that's been hacked that you've seen in the paper recently, its always the production applications that got hacked."

While this fear of scanning operational applications may be understandable to a point, it leaves some of your most critical systems at risk.

To read more about the challenges of maintaining and securing critical business applications -- and how attackers exploit those applications -- download the free report.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
anon6678820158
50%
50%
anon6678820158,
User Rank: Apprentice
7/29/2013 | 1:09:25 AM
re: How Attackers Target And Exploit Critical Business Applications
Firms have to evaluate the IA issues of the system they are buying into. No longer can company's trust that a vendor will secure their data. IT security should be involved in the vetting process for these systems.
anon7187962634
50%
50%
anon7187962634,
User Rank: Apprentice
7/26/2013 | 6:50:11 AM
re: How Attackers Target And Exploit Critical Business Applications
It's funny, I'm no longer working for a firm that was having MAJOR issues with CRM security (actually, the mass-emailing program). Since CRM is deemed (incorrectly) a "Marketing Application," IT always ignored it as much as possible. We became blacklisted because of insecure sending of emails, and the dipsh*t IT person said, "Well, why don't we just ad an 's' to our urls to make them read 'https' and then we'll be 'secure'."

With morons like that - and the continued thinking that CRM is somehow 'safe' because it's just a Marketing app - it's no wonder that CRM poses a threat.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2808
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a rel...

CVE-2014-9713
Published: 2015-04-01
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.

CVE-2015-0259
Published: 2015-04-01
OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage.

CVE-2015-0800
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2...

CVE-2015-0801
Published: 2015-04-01
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.