Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Defending Against Targeted Attacks Requires Human Touch, Speakers Say

Targeted attacks involve a human element that can be detected and stopped, speakers say at Dark Reading event

BOSTON -- SECURITY Conference 2014 -- Targeted attacks tend to be tailored individually, giving them an almost human quality that can be fingerprinted and prevented, according to speakers here on Thursday.

In a live event presented by Dark Reading and InformationWeek and sponsored by Trend Micro, keynote speakers and panelists offered a look at targeted attacks and how to defend against them.

While traditional cyberdefenses have generally focused on building a shield against mass-produced malware, targeted attacks are frequently unique and require a different sort of defense, the speakers said.

"We encourage enterprises to refocus their attention on who the attacker is, rather than just the methods they use," said keynote speaker George Kurtz, CEO and co-founder of CrowdStrike, which offers big data analysis and attribution services. "What we always say is that [enterprises] don't have a malware problem -- they have an adversary problem."

Trend Micro's J.D. Sherry pointed out that while targeted attacks tend to be tailored to the victim, they aren't always sophisticated. "In fact, most of these attacks are actually not very advanced," he said. "Many of them involve vulnerabilities that are years old and that could have been prevented if the victims had just stayed up-to-date with their patches."

Ninety-nine percent of targeted attacks are manually operated, which gives them an almost human quality that is quite different from mass-produced malware, said Harry Sverdlove, CTO of Bit9. "To detect this sort of attack usually means correlating several events on your network," he said.

Targeted attacks require a series of steps that can be stopped if they can be recognized, said Tim "TK" Keanini CTO at Lancope. "The bad guy has to pull off an entire process that may involve four to eight steps without being detected," he said. "And if they are detected, they have to start all over again. Interrupting this 'kill chain' is the key to increasing the attacker's cost and making it more difficult to complete the process."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19040
PUBLISHED: 2019-11-17
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring.
CVE-2019-19041
PUBLISHED: 2019-11-17
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by th...
CVE-2019-19012
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
CVE-2019-19022
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
CVE-2019-19035
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.