Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/20/2006
09:25 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Database Threat Intensifies

Attackers are pulling out the stops to break into Oracle databases

Everyone knows the database holds the crown jewels of the organization, so it's no surprise database attacks are on the rise.

Attackers are using the popular SQL injection, as well as the default passwords in Oracle's database (DBSMNP), buffer overflows, and cross-site scripting to get to database information, says Aaron Newman, co-founder and CTO of AppSecInc. "The ultimate goal of hackers is to break into the database, where anything they want to steal is stored."

Newman, who will give a presentation on database threats and forensics next week called "Oracle Forensics: Collecting Evidence After an Attack" at Oracle OpenWorld, says the inside threat is just as great as the outside one. "A disgruntled DBA or employee is still the bigger threat today," he says.

And studies show users often have access to data resources that don't relate to their jobs, leaving their organizations vulnerable to an inside attack. Secerno, a U.K.-based database monitoring startup, in a new survey found that 41 percent of U.K. employees with access to computer records have access to data they don't need for their jobs. And one in 10 has been tempted to abuse this access, according to the survey.

The number of data records compromised in the U.S. due to security breaches is at 93.7 million since the infamous ChoicePoint breach in February 2005, which exposed 163,000 records according to Privacy Rights Clearinghouse.

Trouble is, while the database threat is increasing, database security is still in its infancy. "Oracle database security today is where network and OS security was three or four years ago," says AppSecInc's Newman.

There aren't many security tools specifically for databases either, he adds. "This market is in its very early stages."

David Aitel, president of Immunity, says the majority of the databases he hacks have default passwords, which makes it simpler to get in. "On 80 percent of my assessments, the default password is still set on at least one database instance on the network."

"Databases are big, complex, third-party components designed for speed, not for security," Aitel says. "But they are almost always behind a firewall. If you can touch a company's databases, they typically have so many other problems that their databases are not on their radar."

And the bad guys are honing in on databases. There have been two Oracle worms this year, and a rootkit was released at Defcon. "You're starting to see those types of tools becoming available for hackers out there to download and start using," Newman says.

And you can't just slap on Oracle patches. It takes about three months to get an Oracle patch fully implemented, because the process is mostly manual, Newman notes. Then the cycle often starts all over again, with new Oracle patches, so your database is almost always vulnerable to some bug. (Oracle's latest patch release contained fixes for over 101 vulnerabilities in its database and other software.)

Forget about encryption as the first step in securing your database, however, he says. "Find all the vulnerabilities and inventory them and lock them down as much as possible," and deploy layers of defense as well.

Newman also recommends real-time database monitoring systems. The last step is possibly encrypting Social Security and credit card numbers or other sensitive data.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Application Security Inc.
  • Immunity Inc. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 9/21/2020
    Hacking Yourself: Marie Moe and Pacemaker Security
    Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
    Startup Aims to Map and Track All the IT and Security Things
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Special Report: Computing's New Normal
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    How IT Security Organizations are Attacking the Cybersecurity Problem
    How IT Security Organizations are Attacking the Cybersecurity Problem
    The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-15394
    PUBLISHED: 2020-09-25
    The REST API in Zoho ManageEngine Applications Manager before build 14740 allows an unauthenticated SQL Injection via a crafted request, leading to Remote Code Execution.
    CVE-2020-15521
    PUBLISHED: 2020-09-25
    Zoho ManageEngine Applications Manager before 14 build 14730 has no protection against jsp/header.jsp Cross-site Scripting (XSS) .
    CVE-2020-26103
    PUBLISHED: 2020-09-25
    In cPanel before 88.0.3, an insecure site password is used for Mailman on a templated VM (SEC-551).
    CVE-2020-26104
    PUBLISHED: 2020-09-25
    In cPanel before 88.0.3, an insecure SRS secret is used on a templated VM (SEC-552).
    CVE-2020-26105
    PUBLISHED: 2020-09-25
    In cPanel before 88.0.3, insecure chkservd test credentials are used on a templated VM (SEC-554).