Vulnerabilities / Threats

11/9/2018
01:00 PM

What You Should Know About Grayware (and What to Do About It)

Grayware is a tricky security problem, but there are steps you can take to defend your organization when you recognize the risk.
2 of 8

Grayware May Collect Sensitive Information
Grayware may well perform legitimate tasks, but there's a price to be paid, often in terms of the information the software captures as it's doing its jobs. Not every case is as obvious as the Persian Stalker Telegram grayware identified by Cisco Talos, but the information gathered can take a number of forms.
Some grayware can gather information openly within its application code, and the odds are good that your users have agreed to the action. All you (and they) have to do is read paragraph 321, subsection c, of the license agreement, and it's right there. Other grayware may leave tracking cookies sprinkled about, use single-pixel embeds, or simply forget to mention the keylogger they carry with them. In any of these examples, though, sensitive information is leaving the organization without permission - and that's a problem.
(Image: Free-Photos VIA Pixabay)

Grayware May Collect Sensitive Information

Grayware may well perform legitimate tasks, but there's a price to be paid, often in terms of the information the software captures as it's doing its jobs. Not every case is as obvious as the Persian Stalker Telegram grayware identified by Cisco Talos, but the information gathered can take a number of forms.

Some grayware can gather information openly within its application code, and the odds are good that your users have agreed to the action. All you (and they) have to do is read paragraph 321, subsection c, of the license agreement, and it's right there. Other grayware may leave tracking cookies sprinkled about, use single-pixel embeds, or simply forget to mention the keylogger they carry with them. In any of these examples, though, sensitive information is leaving the organization without permission and that's a problem.

(Image: Free-Photos VIA Pixabay)

2 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
peternjohnson
100%
0%
peternjohnson,
User Rank: Apprentice
12/4/2018 | 9:16:04 AM
Horrible slideshow format negates taking anything serious from darkreading!
These "slideshows" are a horiible waste of time and energy, I mean what is this, facebook clickbait???

How can we download a PDF or something that is useful?

 
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11506
PUBLISHED: 2019-04-24
In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to Expo...
CVE-2019-8991
PUBLISHED: 2019-04-24
The administrator web interface of TIBCO Software Inc.'s TIBCO ActiveMatrix BPM, TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric, TIBCO ActiveMatrix Policy Director, TIBCO ActiveMatrix Service Bus, TIBCO ActiveMatrix Service Grid, TIBCO Silver Fabric Enabler for ActiveMatrix BPM, and TIB...
CVE-2019-8992
PUBLISHED: 2019-04-24
The administrative server component of TIBCO Software Inc.'s TIBCO ActiveMatrix BPM, TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric, TIBCO ActiveMatrix Policy Director, TIBCO ActiveMatrix Service Bus, TIBCO ActiveMatrix Service Grid, TIBCO ActiveMatrix Service Grid Distribution for TIBC...
CVE-2019-8993
PUBLISHED: 2019-04-24
The administrative web server component of TIBCO Software Inc.'s TIBCO ActiveMatrix BPM, TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric, TIBCO ActiveMatrix Policy Director, TIBCO ActiveMatrix Service Bus, TIBCO ActiveMatrix Service Grid, TIBCO ActiveMatrix Service Grid Distribution for ...
CVE-2019-8994
PUBLISHED: 2019-04-24
The workspace client of TIBCO Software Inc.'s TIBCO ActiveMatrix BPM, TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric, and TIBCO Silver Fabric Enabler for ActiveMatrix BPM contains vulnerabilities where an authenticated user can change settings that can theoretically adversely impact oth...