How Attackers Target And Exploit Critical Business Applications
Applications such as ERP and CRM make businesses go, yet are often left unpatched and vulnerable
[The following is excerpted from "How Attackers Target and Exploit Critical Business Applications," a new report posted this week on Dark Reading's Applications Security Tech Center.]
Most enterprises rely on a few critical business applications for their day-to-day operations. Many of these applications are well-known, off-the-shelf or cloud-based products. Because of their critical nature and the value of the data contained within them, they are a prime target for attackers.
More Security Insights
- Forrester Study: The Total Economic Impact of VMware View
- Securing Executives and Highly Sensitive Documents of Corporations Globally
- Simple, Effective Patch Management: From Dilemma to Done Deed
- Thwart off Application-Based Security Exploits: Protect Against Zero-Day Attacks, Malware, Advanced Persistent Threats
So why don't we hear more about attacks against enterprise resource planning systems, sensitive e-commerce and business-to-business applications, and customer resource management systems? The primary reason is that enterprises don't see them as being insecure. Also, their complexity makes it difficult to effectively monitor them and detect a compromise.
Even if such systems could be easily monitored, the collective experience in the 2013 Verizon Data Breach Investigations Report tells us that it would probably take months for anyone to notice the breach. Further, notes the report, notification is more likely to come from a third party than from internal monitoring.
But attackers are targeting these systems, and security professionals will need to up their game as targeted attacks and corporate espionage become more prevalent.
In the white paper "Forgotten World: Corpo-rate Business Application Systems," authors Alexander Polyakov and Val Smith say, "These days the majority of companies have strong security policies and patch management as it applies to standard networks and operating systems, but these defenses rarely exist or are in place for ERP-type systems. An attacker can bypass all company investments in security by attacking the ERP system."
It's the very nature of ERP and other enterprise apps that makes them so appealing to attackers.
These systems are complex, customized applications that house the inner workings of the business itself. In order to work effectively, these mega business applications typically have connections into, and receive input from, many different applications and servers throughout the enterprise. These systems are not turnkey, almost always requiring some type of middleware glue from a consulting company. All of these factors make for a-difficult- to-secure and nearly impossible-to-patch system.
Even if these systems were easy to patch, the vulnerabilities would likely go unnoticed because companies are often afraid to perform vulnerability scans on them: There are too many unknowns in how the systems would handle such a scan, and they don't want to impact business operations.
Part of the pushback that occurs around scanning running applications is that those organizations with a strong focus on application security have tended to throw their resources at the front-end of the application life cycle, says John Weinschenk, CEO of Cenzic. While that may be the most cost-effective method of addressing application security, the truth is that it doesn't address the realities of applications running in a production environment
"When you look at an enterprise, traditionally how they have handled application security has been focused at the pre-production level," he says. "But with every company that's been hacked that you've seen in the paper recently, its always the production applications that got hacked."
While this fear of scanning operational applications may be understandable to a point, it leaves some of your most critical systems at risk.
To read more about the challenges of maintaining and securing critical business applications -- and how attackers exploit those applications -- download the free report.
Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.