Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/9/2018
01:00 PM

What You Should Know About Grayware (and What to Do About It)

Grayware is a tricky security problem, but there are steps you can take to defend your organization when you recognize the risk.
2 of 8

Grayware May Collect Sensitive Information
Grayware may well perform legitimate tasks, but there's a price to be paid, often in terms of the information the software captures as it's doing its jobs. Not every case is as obvious as the Persian Stalker Telegram grayware identified by Cisco Talos, but the information gathered can take a number of forms.
Some grayware can gather information openly within its application code, and the odds are good that your users have agreed to the action. All you (and they) have to do is read paragraph 321, subsection c, of the license agreement, and it's right there. Other grayware may leave tracking cookies sprinkled about, use single-pixel embeds, or simply forget to mention the keylogger they carry with them. In any of these examples, though, sensitive information is leaving the organization without permission - and that's a problem.
(Image: Free-Photos VIA Pixabay)

Grayware May Collect Sensitive Information

Grayware may well perform legitimate tasks, but there's a price to be paid, often in terms of the information the software captures as it's doing its jobs. Not every case is as obvious as the Persian Stalker Telegram grayware identified by Cisco Talos, but the information gathered can take a number of forms.

Some grayware can gather information openly within its application code, and the odds are good that your users have agreed to the action. All you (and they) have to do is read paragraph 321, subsection c, of the license agreement, and it's right there. Other grayware may leave tracking cookies sprinkled about, use single-pixel embeds, or simply forget to mention the keylogger they carry with them. In any of these examples, though, sensitive information is leaving the organization without permission and that's a problem.

(Image: Free-Photos VIA Pixabay)

2 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
peternjohnson
100%
0%
peternjohnson,
User Rank: Apprentice
12/4/2018 | 9:16:04 AM
Horrible slideshow format negates taking anything serious from darkreading!
These "slideshows" are a horiible waste of time and energy, I mean what is this, facebook clickbait???

How can we download a PDF or something that is useful?

 
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Planned vacation simulation
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10100
PUBLISHED: 2019-07-15
couchcms 2 is affected by: Web Site physical path leakage. The impact is: disclosure the full path. The component is: includes/mysql2i/mysql2i.func.php and addons/phpmailer/phpmailer.php. The attack vector is: network connectivity.
CVE-2019-10100
PUBLISHED: 2019-07-15
borg-reducer c6d5240 is affected by: Buffer Overflow. The impact is: Possible code execution and denial of service. The component is: Output parameter within the executable.
CVE-2019-10103
PUBLISHED: 2019-07-15
Saleor Issue was introduced by merge commit: e1b01bad0703afd08d297ed3f1f472248312cc9c. This commit was released as part of 2.0.0 release is affected by: Incorrect Access Control. The impact is: Important. The component is: ProductVariant type in GraphQL API. The attack vector is: Unauthenticated use...
CVE-2019-10103
PUBLISHED: 2019-07-15
libmspack 0.9.1alpha is affected by: Buffer Overflow. The impact is: Information Disclosure. The component is: function chmd_read_headers() in libmspack(file libmspack/mspack/chmd.c). The attack vector is: the victim must open a specially crafted chm file. The fixed version is: after commit 2f084136...
CVE-2019-10103
PUBLISHED: 2019-07-15
Slanger 0.6.0 is affected by: Remote Code Execution (RCE). The impact is: A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is: Message handler & request validator. The attack vector is: Remote unauthenticated. The fixed version is: after ...