Best Review

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 25 July 2013

Advanced Persistent Threats Rare, But We're Still Unprepared

Posted on 12:25 by Unknown

Image via Flickr user youngthousands

Yesterday, Fortinet released a new report on Advanced Persistent Threatsthe big, scary attacks that haunt the dreams of security wonks. The good news is that APTs and their tactics are still rare, but the bad news is that organizations need to do more to protect themselves.

"Companies still aren't getting the message about protecting themselves or mitigating the risks of APT," Fortinet 's security strategist Richard Henderson told SecurityWatch. "They're not doing a good enough job keeping their infrastructure patched and up to date."

APTs are perhaps the most methodical attacks out there, sometimes running for months or years. Fortinet 's report says, "an APT is typically stealthy, ongoing and intends to steal information that the attacker finds important." These multi-step attacks, like Flame and Stuxnet, are in sharp contrast to the scatter-shot approach of most attackers that are designed to reach as many victims as possible.

However, Fortinet reports that many APTs make use of known vulnerabilities, many of which may have been addressed in software updates. Despite this, Henderson explained that companies and even governmental organizations are still moving too slowly to patch their systems, worried that they'll break a piece of in-house infrastructure.

"They put these patches through exhaustive testing procedures," said Henderson. "Five or ten years ago that wasn't a big deal, but we're seeing criminals of all stripes rolling these [vulnerabilities] into their exploit kits as soon as they can get their hands on the data."

What's the Solution?
If sensitive information is properly controlled and encrypted, then even the scope of an APT attack could be greatly curtailed. "Well, if you can only focus on one thing [like encryption], you'll do a very good job of mitigating the chance of that data ever leaving your network."

That said, patching known security holes is vital. Henderson told SecurityWatch that organizations should not just apply patches "willy-nilly," but invest in the staff and the resources to stay secure. "If the patch was to interfere with something, that type of downtime could have huge financial impact," Henderson conceded. "But what's the cost of a penetration? Of cleaning up a data breach or a rampant malware attack?"

Henderson continued, "whenever there's a security patch, they really should be dropping everything to them into play as fast as they can."

The Bad Guys Are Catching On
Fortinet says that at least for now, nation states are the only groups with that can afford to use the methodical APT approach. Doing so requires patience, funding, and a staff of experts across a number of fields. This is in contrast with most cyberattacks, which usually focus on quick, money-making successes across a wide swath of victims.

"Joe Schmo hacker hasn't latched on to this idea," said Henderson. That said, Joe hacker is getting access to more advanced tools all the time, and the ideas from APTs are no doubt trickling down.

"Some of these guys have become very adept at following what other groups are doing and trying to roll those strategies into their own malware delivery mechanisms," said Henderson. "They're not there yet, but I would not be surprised to see a particularly intelligent group try to make money doing the same kind of things [as APTs]."

Henderson pointed to increasingly complex exploit kits with simple, point-and-hack interfaces. There's also a wealth of personal information on sites like LinkedIn and Facebook that are perfect for social engineering. "Open source intelligence could be a bigger deal than espionage, so why not start to take advantage of that?" Henderson asked.

While Henderson seemed broadly optimistic about the future of online security, even as attacks become more complex, his parting wisdom was a little bleak. "We're at the point where visiting a webpage will infect a machine," he said. "Treat every email in your inbox as suspectno matter what."

Image via Flickr user youngthousands.


Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in News | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • RGT Force Feedback Pro Clutch Edition
    The RGT Force Feedback Pro Clutch Edition wheel and pedal set gives you the features and customization tools you want for a realistic racing...
  • France Drops Internet Disconnection From '3 Strikes' Piracy Law
    France has struck down the port...
  • Intel 335 Series 180GB SSD
    Intel has had a prominent role in the consumer solid-state drive (SSD) market since it launched its 80GB X25-M solid-state drive back i...
  • Microsoft Ending MSN TV Sept. 30
    Time to give the bad news to gr...
  • Accounting Software: Tips for First Time Users
    If you're like most business owners, you prefer to focus on the things that got you started satisfying clients, making a quality produc...
  • Tech Made in the U.S.A.
    Desktops ...
  • Brother MFC-9130CW
    Projectors PCMag.com provides up...
  • Epson Artisan 730
    Epson touts the Epson Artisan 730 ($199.99 direct) as an all-in-one for the photo hobbyista more accurate description than you might as...
  • The 5 Best Scanners for Macs
    OB Roundup As a Mac owner, ...
  • Review: Nikon Coolpix S6500
    Introduction Nikon's Coolpix S6500 combines Wi-Fi connectivity with a 12x optical zoom lens and a 16 million pixel sensor, all of which ...

Categories

  • Best Review
  • Electronic Review
  • News
  • Review
  • Tutorial

Blog Archive

  • ▼  2013 (500)
    • ▼  July (353)
      • Haswell vs. Ivy Bridge: A Look at Old and New
      • Seagate Unleashes New Ultrathin Hard Disk Drive
      • Glidecam HD-2000
      • Ask Alex: When to Send a Thank-You Email
      • HBO GO, WatchESPN Added to Apple TV
      • Toshiba 39L2300U
      • Panasonic TC-P50ST50
      • New Rules on Kids' Online Privacy Require Adults t...
      • HP LaserJet Enterprise 700 Printer M712dn
      • Viber Updates Windows Phone 8, Desktop Apps
      • From GPS to Watches: Killed by the Cell Phone
      • Panasonic TC-P60ST50
      • Microsoft Tips Windows 8.1 Preview, Smaller Window...
      • Sharp Introduces First THX-Certified, 70-Inch 4K HDTV
      • HP LaserJet Enterprise 700 Printer M712dn
      • At Apple, Steve Jobs' Legacy Lives On
      • Aereo Expanding to Chicago in September
      • IBM Acquires Cloud-Computing Firm SoftLayer
      • Bitdefender's Wildly Different Antivirus Tools Bot...
      • New Dropbox Platform Syncs App Data
      • Digital Storm Virtue
      • Facebook App Beta Testing; Verizon LTE Almost Fini...
      • Why Instagram Videos Stink
      • Intel Lifts the Curtain on Thunderbolt 2
      • Tribeca Film Festival Breaks Out From the Screen
      • Canon Color imageClass MF8280Cw
      • Samsung's 55-Inch Curved OLED Now Selling for $13,000
      • France Drops Internet Disconnection From '3 Strike...
      • How to Turn on Two-Factor Authentication for Facebook
      • Panasonic TC-P65ST50
      • HP LaserJet Enterprise flow MFP M525c
      • Digital Storm Virtue
      • Apple's Cheap Shot Bodes Ill for Company
      • Global LCD TV Shipments Fall for First Time Ever
      • Sony Unveils $2,000 Digital Binoculars With Image,...
      • How to Turn on Two-Factor Authentication For Your ...
      • Seiki SE39UY04
      • Report: Google Developing Android-Powered Game Con...
      • Facebook's New Swedish Data Center Goes Live
      • Nokia Chat Beta for Lumia Phones Goes Global
      • Chromium-Based Opera 15 Arrives on Windows, Mac
      • Yelp Expands Into Food Delivery
      • Seagate Slim for Mac
      • Facebook App Beta Testing; Verizon LTE Almost Fini...
      • Memjet C6010 Powered by Memjet
      • Buying an HDTV: Frequently Asked Questions
      • Comcast Boosts Xfinity Parental Controls
      • Bringing the Checkout Counter to You
      • Advanced Persistent Threats Rare, But We're Still ...
      • GoPro Hero3 Black Edition
      • Mobile Threat Monday: Android Spamware, In-App Bil...
      • Dell B1165nfw Mono Laser Multifunction Printer
      • Amazon Launches Jet City Comics With George R.R. M...
      • Samsung PN60F8500
      • What Is a Resilient City?
      • Sony Action Cam
      • And Now: Frickin' Laser TVs
      • Infographic: The Future Is in the Cloud
      • $3,500 Asus 4K Monitor Now Up for Pre-Order
      • Ubisoft Database Hack; NYC Gets .nyc; Tesla Petiti...
      • Tech Made in the U.S.A.
      • Samsung CLP-680ND
      • Crowdfunding For Environmental Change
      • Drift Innovation HD Ghost
      • Report: Apple, TWC Nearing Deal for Apple TV Progr...
      • Microsoft Opens Build; Nvidia Shield Delayed; FTC ...
      • Your All-in-One Guide to Super Bowl XLVII
      • Researchers Demo 3D Printing of Liquid Metal
      • Infographic: Digital Attacks! Protect Yourself Aga...
      • Hisense 55K610GW
      • Brother MFC-9130CW
      • Samsung PN60F8500
      • Drift Innovation HD Ghost
      • Major Microsoft Shakeup Rumored for Thursday
      • It's Not the iWatch, Deneve May Have Other Designs...
      • Porn Spam on YouTube: The Struggle Against Interne...
      • Are Dual-Boot Android and Windows Laptops Viable?
      • Sony's Howard Stringer to Retire in June
      • Intel 335 Series 180GB SSD
      • Samsung Acquires Boxee for Reported $30M
      • MSN TV Shuttering; Samsung Shares Dip; Apple App S...
      • Apple TV or Bust
      • Samsung PN64F8500
      • GoPro Hero3 Black Edition
      • Are Dual-Boot Android and Windows Laptops Viable?
      • Brother MFC-9330CDW
      • ADV: The Antispyware Center from PCMag.com
      • Nokia Lumia 1020; Garmin HUD Displays Directions; ...
      • NASA to Search for Life on Mars in 2020
      • Report: SSD Prices On the Rise Due to Tight Supply
      • Samsung PN60F8500
      • Lenovo Desktops Scale Down for Small Biz
      • Android Master Key Bug Not a Risk if You Stick Wit...
      • Get Organized: 4 Tips for Organizing iPhone Apps
      • Hisense 50K610GW
      • Netflix, CBS Renew Streaming Deal, Add New Shows t...
      • Sony Action Cam
      • New Dropbox Platform Syncs App Data
      • Is This the New LG Optimus G2?
      • Brother MFC-9340CDW
    • ►  June (147)
Powered by Blogger.

About Me

Unknown
View my complete profile