Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

CrowdStrike Turns Security Fight Toward Attacker

CrowdStrike Falcon platform is first to focus on the source of the attack, rather than stopping malware

In medicine, there are two types of treatment: those that treat the symptoms and those that cure the disease. Many doctors -- and most pharmaceutical companies -- devote the majority of their time toward managing and relieving symptoms, rather than stopping a disease at its source.

Enterprise security professionals -- and most security vendors -- are in this same mode today. We focus a great deal of attention on technical analysis of malware and security events, but precious little time asking questions about who the attackers are or why they are targeting us. As a result, enterprises have built defenses that are somewhat effective in preventing the symptoms of an attack -- but the attackers themselves work in a relatively safe environment where it is unlikely they will be identified and even less likely they will suffer any consequences of their actions.

A week ago, I had a chance to meet with George Kurtz, co-founder and CEO of CrowdStrike, about the rollout of Falcon, the company's new platform for identifying and responding to the sources of targeted attacks. Falcon is the realization of CrowdStrike's concept of "Active Defense," which involves not only identifying the malware, but identifying its source and then taking steps to make the attacker's life more difficult. CrowdStrike calls this "raising the adversary's costs" -- the company does not use terms such as "strike back" or "hack back," which sometimes involve tactics that cause enterprises to get into legal problems. CrowdStrike's defenses are designed to frustrate attackers within legal limits.

CrowdStrike has been talking about Active Defense for more than 18 months now, but last week's announcements were the first real chance for the industry to see how this concept would be manifested in a product. In a nutshell, Falcon is a cloud service that correlates intelligence and security events in real-time from a global network of agent applications -- CrowdStrike calls them "sensors" -- that are deployed to endpoints and devices. By storing and analyzing a vast amount of event data gathered from all of these sensors, CrowdStrike has created a massive intelligence repository that is constantly mined, and advanced analytics are used to reveal threat intelligence insights that may escape currently available anti-malware and threat intelligence products and services.

In the future, CrowdStrike plans to instrument the event data so that it can be shared, enabling enterprises to share information on new attacks and respond more quickly to them, Kurtz says.

Running on top of the Falcon platform are two applications: CrowdStrike Threat Protect and CrowdStrike Adversary Intelligence. Threat Protect uses the CrowdStrike sensors to identify the adversary's mode of operation and create a profile that can be matched up with known attacks and attackers. Instead of focusing on only the malware itself, Threat Protect identifies mission objectives of the adversary leveraging the Kill Chain model and provides real-time detection by focusing on what the attacker is doing, such as reconnaissance, exploitation, privilege escalation, lateral movement, and exfiltration. It also records this activity with CrowdStrike's Activity Flight Recorder (AFR) technology so that the attacks can be analyzed at a later date.

Adversary Intelligence Intelligence is a Web-based intelligence subscription service that provides strategic analysis and customized views of advanced attacker activity. CrowdStrike says it can provide an extremely granular view into specific adversary campaigns and use that data to proactively defend against future attacks.

Just how effective the Falcon platform and applications will be remains to be seen. CrowdStrike is approaching the malware problem from an entirely new direction, and at this point, there's no way to predict what the bad guys' reaction will be. But the fact that a company is focusing on the source of the problem -- the attacker -- rather than simply treating the malware seems like a step in the right direction. Finding a cure usually starts with asking the right questions and coming up with a plan to fight the infection at its source, rather than just treating the symptoms. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29040
PUBLISHED: 2021-05-16
The JSON web services in Liferay Portal 7.3.4 and earlier, and Liferay DXP 7.0 before fix pack 97, 7.1 before fix pack 20 and 7.2 before fix pack 10 may provide overly verbose error messages, which allows remote attackers to use the contents of error messages to help launch another, more focused att...
CVE-2021-29041
PUBLISHED: 2021-05-16
Denial-of-service (DoS) vulnerability in the Multi-Factor Authentication module in Liferay DXP 7.3 before fix pack 1 allows remote authenticated attackers to prevent any user from authenticating by (1) enabling Time-based One-time password (TOTP) on behalf of the other user or (2) modifying the othe...
CVE-2021-29047
PUBLISHED: 2021-05-16
The SimpleCaptcha implementation in Liferay Portal 7.3.4, 7.3.5 and Liferay DXP 7.3 before fix pack 1 does not invalidate CAPTCHA answers after it is used, which allows remote attackers to repeatedly perform actions protected by a CAPTCHA challenge by reusing the same CAPTCHA answer.
CVE-2021-22668
PUBLISHED: 2021-05-16
Delta Industrial Automation CNCSoft ScreenEditor Versions 1.01.28 (with ScreenEditor Version 1.01.2) and prior are vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code.
CVE-2021-29039
PUBLISHED: 2021-05-16
Cross-site scripting (XSS) vulnerability in the Asset module's categories administration page in Liferay Portal 7.3.4 allows remote attackers to inject arbitrary web script or HTML via the site name.