Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/24/2018
02:30 PM
50%
50%

Abandoned Websites Haunt Corporations

Websites that never go away continue to bring security threats to their owners, says a new report.

Old Web applications don't go away — they linger and spread security vulnerabilities around their organizations. These "ghost sites" are critical assets for criminals and weaknesses for enterprises, according to a new report by High-Tech Bridge, a Web security company.

The report, "Abandoned Web Applications: Achilles' Heel of FT 500 Companies," found that 70% of the FT 500 can find information for accessing old websites for sale on the Dark Web, and that 92% of externally facing Web applications have exploitable flaws or weaknesses.

While the report looked at the 500 largest companies in both the US and Europe, the largest 500 in the US, specifically, have 293,512 exernal systems accessible from the Internet, 42,549 of which have a live Web application with dynamic content and functionality, it states.

"This means a US company has an average of 85.1 applications that can be easily discovered externally and are not protected by 2FA, strong authentication or other security controls aimed to reduce application accessibility to untrusted parties," the report states.

High-Tech Bridge notes that its research looked only at application infrastructure, not network or control system infrastructure that might be explorable through a tool such as Shodan.

Read more here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:28:28 PM
2FA
This means a US company has an average of 85.1 applications that can be easily discovered externally and are not protected by 2FA,,,, This is interesting. Most internet applications do not use 2FA, it ps not surprising.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:22:45 PM
70%
70% of the FT 500 can find information for accessing old websites for sale on the Dark Web 70% is quite high, it must be quite profitable.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:20:49 PM
Re: Abandoned anything
they still host data that serve in arrows pointing to places I agree, developers may be forgetting citing the access to the data as they forget shutting down the application.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:18:34 PM
Re: Abandoned anything
Homes - subway stations (fascinating) and more always invite BAD somewhere in time. Web site may be good but when accessing in strarbuks it is being exposed to threats.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:15:57 PM
Website is not the problem
Website is not the problem, data behind that are the concern, lots of all web applications access the database without upgraded security measures.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
10/24/2018 | 3:14:55 PM
Abandoned anything
Homes - subway stations (fascinating) and more always invite BAD somewhere in time.  Not surprised about dead websites, they still host data that serve in arrows pointing to places perhaps not accessible directly.
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment:   It's a PEN test of our cloud security.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5124
PUBLISHED: 2020-01-25
An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.50005. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered fro...
CVE-2019-5146
PUBLISHED: 2020-01-25
An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13025.10004. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered fro...
CVE-2019-5147
PUBLISHED: 2020-01-25
An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13003.1007. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from...
CVE-2019-5183
PUBLISHED: 2020-01-25
An exploitable type confusion vulnerability exists in AMD ATIDXX64.DLL driver, versions 26.20.13031.10003, 26.20.13031.15006 and 26.20.13031.18002. A specially crafted pixel shader can cause a type confusion issue, leading to potential code execution. An attacker can provide a specially crafted shad...
CVE-2020-5226
PUBLISHED: 2020-01-24
Cross-site scripting in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script allows error reports to be submitted and sent to the system administrator. Starting with SimpleSAMLphp 1.18.0, a new SimpleSAML\Utils\EMail class was introduced to handle sending emails, implemented as a wrapp...