News
News
11/21/2005
07:49 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
Repost This

Hackers Hitting Popular Apps

Cybercriminals have shifted targets. Until recently, hackers went after operating systems and Internet services like Web servers and E-mail servers. In 2005, they took aim at software applications and set Internet security back six years.

Cybercriminals are stepping up their efforts to hack popular software applications and network devices, where efforts to close operating-system vulnerabilities have had little impact.

At a London press conference on Tuesday, the SANS Institute and government representatives from the United States and the United Kingdom plan to release a report on the 20 most critical Internet security vulnerabilities for 2005.

The computer security research organization's report reveals that cybercriminals have shifted targets. Over the past five years, most hackers went after operating systems and Internet services like Web servers and E-mail servers. In 2005, they took aim at software applications.

The applications under fire span a variety of operating systems. They include enterprise backup software, anti-virus software, PHP applications, database software, peer-to-peer file sharing software, DNS software, media player software, IM software, and Internet browsers.

The second major finding of the report is that vulnerabilities in network operating systems such Cisco's Internetwork Operating System (IOS), which powers most of the routers and switches on the Internet, represent a significant threat.

"The bottom line is that security has been set back nearly six years in the past 18 months," Alan Paller, director of research for the SANS Institute, says in an E-mail. "Six years ago, attackers targeted operating systems and the operating system vendors didn't do automated patching. In the intervening years, automated patching protected everyone from government to grandma. Now the attackers are targeting popular applications, and the vendors of those applications do not do automated patching."

Security experts credit Microsoft's efforts to improve its software with forcing hackers to look for lower hanging fruit. "Part of the reason we're seeing a more of the attacks go against things other than the Windows operating system is that the Windows operating system has gotten better," says John Pescatore, VP and research fellow for information security at market research firm Gartner.

Gerhard Eschelbeck, chief technolgy officer and VP of engineering of vulnerability-management company Qualys Inc. says some credit goes to Microsoft and some goes to overall improvements in patching behavior. Patching as soon as possible is critical: As Eschelbeck notes in "The Laws Of Vulnerabilities," a study released by Qualys in November, 80% of exploits are available within the first 19 days after the disclosure of a critical vulnerability.

Patching has its limits, however. Ira Winkler, author of "Spies Among Us" and global security strategist with CSC Consulting, says attacks against vulnerabilities that can be repaired by patching represent less than a third of hacking attacks. "When the Department of Defense did studies on the matter, they found that actually these attacks account for only 30% of hacking," he says. "Attacks against configurations, essentially poor system hardening, account for 70% of successful attacks. And that means that automated patching probably won't help."

The vulnerability of backup systems, in particular, puts businesses at great risk because backup software provides one-stop shopping for critical corporate data. As the SANS report points out, "An attacker can leverage these flaws for an enterprise-wide compromise and obtain access to the sensitive backed-up data."

And criminals are doing just that: Exploits for many of these vulnerabilities have been publicly posted and are in use today.

What's significant about the SANS report, says Pescatore, "is that the most dangerous attacks are the targeted attacks that are going after specific vulnerabilities at specific companies."

Mark Richmond, network systems engineer for U.S. District Court, Eastern District of California, says it's widely recognized that cybercrime has been become increasingly professional. "The coordination of attacks over the last few years seems to be increasing," he says. "There are cooperative arrangements between various groups, formal or information, that seem to be facilitating the use of networks and computers for criminal activities."

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.