Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Security's Top Five Priorities

Portable devices, Web application security are among the issues keeping CSOs awake these days

What keeps you awake at night? If you're a politician, it's campaign funding. If you're a teacher, it's tomorrow's lesson plan. If you're Paris Hilton, it's how to get more cupholders into your convertible.

For security professionals, the awake-at-night issues keep changing. When we did our last "look ahead" story back in December, the industry had not yet been slapped by the TJX breach, Web 2.0 worries, or Gary Min's attempt to steal $400 million worth of trade secrets from DuPont. (See 2007: Trouble Ahead.) Security threats, apparently, are like politically-incorrect comments by Don Imus: There's a new one every few minutes.

And so, in one final nod to Dark Reading's first anniversary this week, we've done some research on security professionals' current concerns, and those they foresee in the immediate future. The following is a synopsis of what we found.

As you'll see, some of the top issues and priorities in IT security have shifted significantly in the scant four months since we last asked this question. We hope you enjoy it. But read it fast -- the next sea change can't be far away.

1. The Portable Problem
Laptops. USB thumb drives. Removable hard drives. PDAs, smartphones, and Apple iPods. No matter what the devices are, they're capable of holding a ton of data, and their capacities grow every day. They can be the getaway vehicles for sensitive data, or the unwary carriers of viruses and other malware.

It's no surprise, then, that removable storage is at the top of the list in almost every security professional's priority list these days. In a survey published yesterday, Centennial Software reported that 38.4 percent of attendees at the recent InfoSecurity Europe conference listed portable media as the number one security issue facing their organization. Viruses finished second at 23.7 percent; spyware garnered 22.3 percent.

"It comes up in every conversation I have with a customer," says Steve Stasiukonis, vice president and founder of Secure Network Technologies, a penetration testing firm. "It doesn't matter if it's stuff being taken out or coming in -- they say they worry 50-50 about both. It's bad if a user brings it in and [pollutes] the network, or worse if they take something out and it gets into the hands of someone who can hurt [them]."

And the problem is becoming more acute all the time. According to a study published two weeks ago by Senforce Technologies, 73 percent of IT professionals say their organization houses critical data on removable devices such as laptops, thumb drives, and iPods. Twenty-three percent of the respondents said their organization had reported a network security breach in the last 12 to 18 months, and another 25 percent said they didn't know whether such a breach had occurred. (See USBs' Giant Sucking Sound.)

2. Web Two Point Zero-Day?
Security experts agree: The corporate network security perimeter has become a pretty tough nut to crack. So, like any good squirrel, the hacking community is putting that nut down in favor of an easier one: the Web-based application.

In tests of some 31,000 Websites last year, the Web Application Security Consortium exposed more than 148,000 vulnerabilities, according to the latest WASC statistics. Despite the recent notoriety of the problem, nearly 85 percent of the sites tested were vulnerable to attacks via cross-site scripting (XSS).

As with portable devices, the problem with emerging Web applications -- sometimes collectively called Web 2.0 -- is that the popularity of the technology is rapidly outstripping the IT organization's ability to secure them. In a study of 1000 workers under the age of 29 conducted by British security firm Clearswift in March, some 42 percent of respondents confessed to discussing work-related issues on social networking sites and blogs.

Researchers also have found plenty of holes in next-generation Web technologies. Fortify Software earlier this month reported a new wave of Internet attacks targeting Web 2.0 sites and the Ajax applications that have helped make them so dynamic. Coined JavaScript Hacking, attackers go after vulnerabilities in major Ajax toolkits, allowing them to pretend to be victimized users and gain access to sensitive information.

3. Attacker Inside!
Corporations have always been concerned about security leaks and insider attacks. But that was before they heard about Vencent Donlan, Roger Duronio, and Gary Min.

In the past several months, the security industry has had an opportunity to see some of the biggest brass balls in the history of corporate theft and sabotage.

Donlan, a former stock options administrator, this week was charged with stealing some $7.7 million in company stock and routing it to an account in his wife's name. (See SEC: WFI Insider Stole $7.7M.) Duronio was convicted of planting a logic bomb in his company because he wasn't happy about his bonus. (See Ex-UBS Sys Admin Found Guilty.) And Min had to rent a storage bin and a separate apartment to house the $400 million worth of data and documents he stole while he worked at DuPont.

These three incidents may not be the biggest insider incidents in history, but with today's laws mandating breach disclosure, they put a new, ugly face on the prospect of such things happening at your company. As a result, many enterprises are taking a harder look at compliance, leak prevention, and end-user monitoring than ever before.

Next Page: Page Two

4. Endpoint End Game
Networks and applications are nice, but most hackers' favorite target is a nice, blissfully-ignorant end user. Whether it's shoulder-surfing at Starbuck's, hijacking a WiFi connection, or entry through an unpatched antivirus application, an attacker's pickings around a single end user are surprisingly good.

Security vendor Promisec yesterday released the results of 193,000 end point audits it has conducted across 32 organizations, and the results are sobering. Here's what it found:

Some 25,090 (13 percent) of the corporate PCs surveyed had unauthorized USB devices attached to them. More than 7,700 (4 percent) of corporate PCs had peer-to-peer (P2P) applications installed, such as KaZaa. About 2,900 (1.5 percent) did not have the latest Microsoft Service Packs, and 3,281 (1.7 percent) had antivirus monitoring and remediation issues.

It doesn't stop there. More than 2,300 (1.2 percent) of the 193,000 audited endpoints were without required third-party desktop security agents, and 1,579 (.82 percent) had unauthorized remote control software such as GoToMyPC. A smaller percentage had unauthorized and unprotected shareware.

Whether it's Cisco's NAC, Microsoft's NAP, or any one of a dozen other endpoint security strategies, corporations need to find a solution, and fast. Otherwise, hackers will continue to see them as big, strong castles -- with lots of open doors.

5. Botnet Bugaboo
When attackers crippled two of the Internet's key Domain Name Service servers in February, it was bad enough. But now experts are telling us that the attack might have been a prologue to a much larger attack, or perhaps even a sales demo for a botnet seller. Those are pretty scary possibilities. (See Fujitsu Softek Eyes Acquisitions and DNS Attack: Possible Botnet Sales Pitch .)

The creation and operation of botnets, experts say, has become big business. BBC News today is reporting that some companies have begun hiring hackers to launch botnet attacks on their competitors, creating spam networks or crippling their rivals' networks with botnet traffic.

And with zero-day vulnerabilities discovered in Microsoft's DNS just a few weeks ago, the botnet threat is greater than ever, experts say.

"Botnets are pervasive on the Internet and use zero-day vulnerabilities, such as Microsoft's DNS vulnerability, to grow their armies," said Ashar Aziz, CEO of security company FireEye. "Botnets enable theft of enterprises' customer data and intellectual property, and can be used to commit fraud and crime on a large scale. Enterprises should be very concerned about brand damage and legal liability due to botnets on their networks." (See DNS Flaw Creates Botnet Threat.)

— Tim Wilson and Kelly Jackson Higgins, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.