Vulnerabilities / Threats

10/24/2018
02:30 PM
50%
50%

Abandoned Websites Haunt Corporations

Websites that never go away continue to bring security threats to their owners, says a new report.

Old Web applications don't go away — they linger and spread security vulnerabilities around their organizations. These "ghost sites" are critical assets for criminals and weaknesses for enterprises, according to a new report by High-Tech Bridge, a Web security company.

The report, "Abandoned Web Applications: Achilles' Heel of FT 500 Companies," found that 70% of the FT 500 can find information for accessing old websites for sale on the Dark Web, and that 92% of externally facing Web applications have exploitable flaws or weaknesses.

While the report looked at the 500 largest companies in both the US and Europe, the largest 500 in the US, specifically, have 293,512 exernal systems accessible from the Internet, 42,549 of which have a live Web application with dynamic content and functionality, it states.

"This means a US company has an average of 85.1 applications that can be easily discovered externally and are not protected by 2FA, strong authentication or other security controls aimed to reduce application accessibility to untrusted parties," the report states.

High-Tech Bridge notes that its research looked only at application infrastructure, not network or control system infrastructure that might be explorable through a tool such as Shodan.

Read more here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
10/24/2018 | 3:14:55 PM
Abandoned anything
Homes - subway stations (fascinating) and more always invite BAD somewhere in time.  Not surprised about dead websites, they still host data that serve in arrows pointing to places perhaps not accessible directly.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:15:57 PM
Website is not the problem
Website is not the problem, data behind that are the concern, lots of all web applications access the database without upgraded security measures.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:18:34 PM
Re: Abandoned anything
Homes - subway stations (fascinating) and more always invite BAD somewhere in time. Web site may be good but when accessing in strarbuks it is being exposed to threats.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:20:49 PM
Re: Abandoned anything
they still host data that serve in arrows pointing to places I agree, developers may be forgetting citing the access to the data as they forget shutting down the application.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:22:45 PM
70%
70% of the FT 500 can find information for accessing old websites for sale on the Dark Web 70% is quite high, it must be quite profitable.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:28:28 PM
2FA
This means a US company has an average of 85.1 applications that can be easily discovered externally and are not protected by 2FA,,,, This is interesting. Most internet applications do not use 2FA, it ps not surprising.
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3483
PUBLISHED: 2019-03-25
Mitigates a potential information leakage issue in ArcSight Logger versions prior to 6.7.
CVE-2019-3484
PUBLISHED: 2019-03-25
Mitigates a remote code execution issue in ArcSight Logger versions prior to 6.7.
CVE-2019-6240
PUBLISHED: 2019-03-25
An issue was discovered in GitLab Community and Enterprise Edition before 11.4. It allows Directory Traversal.
CVE-2015-3953
PUBLISHED: 2019-03-25
Hard-coded accounts may be used to access Hospira Plum A+ Infusion System version 13.4 and prior, Plum A+3 Infusion System version 13.6 and prior, and Symbiq Infusion System, version 3.13 and prior. Hospira recommends that customers close Port 20/FTP and Port 23/TELNET on the affected devices. Hospi...
CVE-2015-3954
PUBLISHED: 2019-03-25
Hospira Plum A+ Infusion System version 13.4 and prior, Plum A+3 Infusion System version 13.6 and prior, and Symbiq Infusion System, version 3.13 and prior give unauthenticated users root privileges on Port 23/TELNET by default. An unauthorized user could issue commands to the pump. Hospira recommen...