Building A Better Toolset

IN the last year, information security researchers have warned black hat activity had shifted from digital vandalism to financially motivated attacks. Once motivated by curiosity or the desire to gain notoriety, attackers are now driven by profit. Today’s most ominous threats are designed to gather financial information. In the last half of 2006, the Symantec security response organization observed increases in adoption of targeted-threat techniques, such as polymorphics and rootkit technologies, and reported 54 percent of the attack code was designed to harvest sensitive or proprietary information.

Hacking isn’t a kid’s game anymore. It’s big business. Professional hackers are now organized career criminals that launch narrowly focused targeted attacks in order to hold for ransom, destroy or steal information—all with financial profit in mind. Security industry research firm Gartner has identified targeted attacks as the top security threat facing businesses in the next two years. In its 2006 Cyberthreats Hype Cycle, Gartner predicts by 2008 nearly 40 percent of organizations will be targeted by financially motivated cybercrime and urges businesses to invest in preventative measures.

Slow to Act
The targeted-attack threat is real, but it has yet to garner serious attention from CSOs. Enterprises face an ever-changing set of computer and information security issues due to the dynamic nature of today’s threats and the increasing dependence on technology as a business enabler. In confronting the cyberthreat challenge, enterprises have been successfully mitigating the traditional threat environment with firewall, anti-virus patching and other practices. The management of these security technologies is providing reasonable safeguards against traditional attacks. But, even a flawless implementation of security will leave an enterprise susceptible to new or unknown vulnerabilities. An organization also can be exposed to external threats—the window of time between a patch’s release and application.

Regrettably, it’s difficult for security officers to justify spending more money on information security. It has been nearly two years since Zotob’s impact prompted industry experts to advocate the use of some form of traffic inspection that filters for illegitimate transactions. Although Zotob’s vulnerability-to-exploit cycle should have been a wake-up call for enterprise security officers. Symantec Research Labs documented 2,249 new vulnerabilities in the first half of 2006, up 18 percent over the second half of 2005. This is the highest number ever recorded for a six-month period.

A review of data illuminates why security officers have not felt compelled to address the targeted attack threat. Targeted attacks are custom-built, narrowly focused exploits that target specific companies or industries. Security research companies have not defined a targeted-attack signature. In spite of record-level vulnerability statistics, there is no identifiable attack behavior to defend against. Targeted attacks are typically the product of social engineering, constructed using insider information, making the level of customization almost impossible to detect with conventional security products. The concept is so vague that security officers have a difficult time factoring the potential of a targeted attack in a risk assessment process.

A Classic Example
Targeted attacks can lead to exposure of mission-critical business data or customer-sensitive information and inflict serious damage to corporate reputation. Perhaps the best illustration of a targeted attack occurred at TJX, the parent company of T.J. Maxx, Marshall’s and HomeGoods stores. On Jan. 17 the retailer said that computer systems storing credit card, check and merchandise return transaction data were compromised. In a recent SEC filing, TJX disclosed that more than 45 million credit and debit card numbers may have been stolen from its systems over an 18-month period, making it the single largest customer data breach to date.

A classic targeted attack example, TJX doesn’t know whether there was one continuous intrusion or multiple, separate breaches of its data security. It is the stealthy nature of targeted attacks that is so dangerous. The attacker employs exploit techniques designed to both evade detection and cover tracks.

Cybercriminals want to operate under the radar. The crimeware programs used in a targeted attack are too valuable to waste on an attention-grabbing event. Major outbreaks get detected too soon, trigger mass patching by users and investigations by law enforcement agencies. Cybercriminals are more apt to craft a slow and stealthy attack designed to install malicious code on a select set of targeted machines.

Evolution of Exploit Frameworks
Cybercriminals increasingly rely on powerful exploitation frameworks to launch attacks. Free tools like Metasploit and commercial tools like CORE IMPACT and Immunity CANVAS have revolutionized attacker methodology. Previously, upon finding a vulnerability, the attacker either had to create custom exploit codes from scratch or scour the Internet to find such codes to exploit the hole. Today, instead of scraping together individual exploits, integrated exploit frameworks include numerous exploits to compromise target systems.

One property of exploit tools is separation of the exploit from the payload. An exploit is the software taking advantage of a flaw, letting the attacker load and execute a program of the attacker's choosing. The code triggered by the exploit is known as the payload. Traditional attacks tightly bundled exploits and payloads together. An attack might exploit a database buffer overflow with the purpose of adding the attacker as a user to the local administrators group. But, with this tight integration, the attacker was stuck with the payload attached to the exploit for the specific vulnerability.

Taking the payload from one attack and embedding it with another exploit required deep technical knowledge and serious coding skills. To remedy the situation, today's exploit frameworks include an arsenal of different exploits and payloads, each offering a different effect. So today, the attacker can use a tool like Metasploit to choose an exploit, such as a buffer overflow in lsass.exe. Then, the attacker can choose from more than a dozen different payloads. Metasploit packages the payload with the exploit and then launches it at the target.

The real effect of these frameworks reverberates through the industry. Developers who create fresh exploits for new flaws don't have to reinvent the payload wheel every time. They can focus their time on perfecting exploits and quick production. Moreover, those developers who focus on payloads can now zoom in on the production of high-quality payloads.

Detecting a Targeted Attack
The problem with commonly deployed security tools is the reliance on signatures or rules. In order for a security tool to stop an attack, it requires specific knowledge about the attack, such as an exploit signature. Customers often have to wait days or weeks to get a working signature for a new exploit, leaving the network exposed to anyone with malicious intent. But in the current threat environment, attackers are often one step ahead of the products designed to thwart them.

The challenges facing information security teams are daunting. Targeted threats can lead to exposure of mission-critical or customer-sensitive data and can inflict serious damage to a corporate reputation. A growing number of data security standards and regulations can result in sanctions, fines and civil liability if a targeted attack is successful. In this gathering storm, where attack activity is motivated by financial gain, security teams need purpose-built tools to combat targeted threats.

Anomaly-based threat detection offers the most effective solution for addressing the targeted threat dilemma. At the core of this new threat detection technology are anomaly-based algorithms used to identify emerging threats. Four types of anomaly detection are used in commercially available solutions.
• Protocol detects packets that are too short, have ambiguous options or violate specific application layer protocols. It is most useful for detecting host-level attacks.
• Rate-based detection shows floods in traffic using a time-based model of normal traffic volumes. Most useful for detecting denial-of-service attacks.
• Relational or behavioral detection shows changes in how individual or groups of hosts interact with one another on a network. For example, a normally quiet host that starts connecting to hundreds of hosts per second on the SQL port indicates a worm. It is useful for a variety of threats, from worms and malware to insider misuse.
• Statistical detection shows changes in normal content usage by identifying deviations in each application traffic, flow direction and packet size. It is most useful for identifying unknown, application-layer exploits.

Not all anomaly-based security solutions are created equal. Capabilities are largely a function of supported algorithms. When evaluating new solutions, it is important to discern the type of threats the products are designed to detect. In order for an anomaly-based detection solution to proactively identify zero-day worms, malware, acceptable-use policy violations and insider misuse, the product should employ a multi-algorithm approach.

There's both an art and a science to applying anomaly detection. Effective use of the technology by security vendors requires deep experience with networks, threats and the appropriate anomaly-detection algorithms for a given threat model. When done well, anomaly detection is effective in finding and foiling network-borne threats and should be part of everyone's security tool set.

Specialized Attack Techniques
Cybercriminals find the victims by diligently profiling hosts to identify large and vulnerable targets. There are numerous techniques used to spawn a targeted attack:

Bots. A bot (short for robot) is a computer where a worm or virus has installed programs that run automatically and allow cybercriminals complete access and control. Cybercriminals use viruses or other bots to search for vulnerable computers where they can load programs or store data. A botnet is a collection of infected machines that can be centrally controlled and used to launch simultaneous attacks. Spammers, hackers and other cybercriminals are acquiring or renting botnets, making it harder for authorities to track down the real culprits.

Keylogging. These programs covertly recover keys typed by a computer user. The program either stores the data for later access or secretly sends the information to the author. The advantage of a keylogger program is a cybercriminal does not need to trick a user into supplying sensitive information.

Bundling. This entails embedding a virus or spyware to a benign or legitimate download, such as a screensaver or a game. When the computer user downloads and installs the legitimate file, they also are unwittingly installing the criminal program.

Denial of service. An attack specifically designed to prevent normal functioning of a computer network or system, it also prevents access by authorized users. A distributed denial-of-service attack uses thousands of computers captured by a worm or Trojan to send a landslide of data in a very short time. Attackers can cause denial-of-service attacks by destroying or modifying data or by using zombie computers to bombard the system with data until its servers are overloaded and cannot serve normal requests.

Packet sniffers. These are software programs that monitor network traffic. Attackers use packet sniffers to capture and analyze data transmitted via a network. Specialized sniffers capture passwords crossing a network.

Rootkit. This is a set of tools used by an intruder after hacking a computer. The tools allow the cybercriminal to maintain access, prevent detection, build hidden backdoors and collect information from compromised computers.

Spyware. Spyware is software that gathers information without the user’s knowledge. Spyware is typically bundled covertly with another program. The user does not know installing one also installs the other. Once installed, the spyware monitors user activity on the Internet and transmits information in the background to someone else.

Social engineering. Social engineering is not limited to cybercrime, but it is an important element of cyberfraud. Social engineering tricks deceive the recipient into taking an action or revealing information. The reasons given seem legitimate, but the intent is criminal. Phishing is an obvious example—a certain percentage of users will respond unthinkingly to a request that appears to be from a legitimate institution.

Worms and Trojans. A Trojan is a malicious program unwittingly downloaded and installed by computer users. Some Trojans pretend to be a benign application. Many hide in a computer’s memory as a file with a nondescript name. Trojans contain commands a computer automatically executes without the user’s knowledge. Sometimes, it can act as a zombie and send spam or participate in a distributed denial-of-service attack. It may be a keylogger or other monitoring program that collects data and sends it covertly to the attacker. Worms are wholly contained viruses that travel through networks, automatically duplicate and send programs to other computers.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3