Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

11/29/2018
05:25 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Anti-Botnet Guide Aims to Tackle Automated Threats

The international guide is intended to help organizations defend their networks and systems from automated and distributed attacks.

The Council to Secure the Digital Economy (CSDE) and Consumer Technology Association (CTA) today announced the International Anti-Botnet Guide, a new publication intended to help organizations block botnets and other automated, distributed cyberattacks.

USTelecom and the Information Technology Industry Council (ITI) were also involved in building the guide, which is the product of nine months of collaboration. IT stakeholders can use the guide for basic and advanced practices to reference when defending against bots. These aren't mandates or requirements, the guide points out. IT and security leaders can use them according to the circumstances, processes, and teams specific to their organizations.

No single stakeholder controls the connected economy, where bots have been both damaging and expensive. As the number of people, businesses, and devices grow, so does the potential for botnets to drive phishing, ransomware, distributed denial-of-service (DDoS_ attacks, and other digital threats. With the Internet of Things (IoT) poised to reach 20 billion devices by 2020, the global cost of cybercrime could reach trillions of dollars, researchers state in their report. Botnets are a driver of these losses.

"The botnet threat is more severe today than at any previous point in history," researchers point out, referring to threats ranging from the Storm Worm botnet of 2007 to the 2016 Mirai botnet that gained access to nearly 400,000 devices, including video cameras and recorders. While most botnets don't quite reach this scale, smaller attacks can disable websites and services, spread disinformation on social networks, and distribute ransomware.

"A host of bad actors are exploiting a target-rich attack surface," said Robert Mayer, senior vice president of cybersecurity at USTelecom, at an event held for the report today. Two elements are needed to "address this plague," he added: government and industry players working together, and all ecosystem stakeholders adopting measures to make the Internet resilient.

It's a threat that poses myriad challenges throughout the IT ecosystem. Report writers argue infrastructure providers could do more to protect customers, and smaller providers need guidance and resources. Increased software security drives bad actors to build more complex exploits. Many connected devices aren't built, configured, or installed with security in mind.

"There is no higher cause we all share than to address the challenges of our digital economy," said Jonathan Spalter, president and CEO at USTelecom. "We understand this is a shared responsibility across our industries ... a compliance-led regulatory model is not going to get us closer to the security that we all seek. This is proof of concept that industry ... is ready to lead."

Dean Garfield, president and CEO of ITI, emphasizes the need to get everyone on the same page sans regulation.

"The threat is asymmetric," he says of botnets, which are constantly evolving. "If you define a solution that's fixed in time, it's unlikely to be as flexible and fluid as the threat."

The botnet mitigation guide breaks its practices down into five types of provider, supplier, and user stakeholders in these categories: infrastructure, software development, devices and device systems, home and small business systems installation, and enterprises.

As an example of the guidance provided in the report, consider its subsection on botnet risk and mitigation among cloud and hosting providers, as part of its infrastructure section: "Because cloud networks are decentralized, they can typically withstand the disruption of numerous network components," experts explain. "This architectural feature makes the cloud more resilient to highly distributed botnets and provides additional mitigation capabilities."

Cloud services offer an added layer of security outside the ISP's infrastructure, they continue, and this protection is increasingly handy as the scale of botnet attacks continues to escalate.

Overall, for infrastructure providers planning to defend against bots, the guide advises first identifying which assets need to be defended and the potential vulnerabilities leaving them exposed. Companies should stay up to date on exploits for each flaw they identify. As for advanced practices, they add, infrastructure providers with access to more resources may have security researchers on hand to analyze heuristics and behaviors to detect malware.

There are additional baseline and advanced practices for signature analysis, heuristic analysis, behavioral analysis, packet sampling, and honeypots under the "Detect Malicious Traffic and Vulnerabilities" section for infrastructure providers, as well as similar levels of guidance for mitigating against distributed threats with filtering, traffic shaping, blackholing, sinkholing, scrubbing, and BGP flowspec. Stakeholders across categories can find similar detailed guidance.

Related Content:

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
thepkiguy
50%
50%
thepkiguy,
User Rank: Author
12/10/2018 | 5:42:00 PM
IABG Announcement
Great to see the creation of this IABG to provide another tool to the arsenal of fighting botnets. Organizations unfortunately are ill-prepared for an attack and wait until it's too late to find out how to mitigate the risk.
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19797
PUBLISHED: 2019-12-15
read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write.
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.