Monday, April 21, 2008

Yet another FUD piece on hackers...

Tippingpoint security experts outline top threats for Asia Pacific region
By Hazimin Sulaiman


"FROM January 21 to March 21, 2008, there have been 3840 attacks specifically targetted to Malaysia," says Rohit Dhamankar, Project Manager, SANS Top 20 Vulnerability List and Senior Manager, Security Research, TippingPoint DVLabs. This trend is worrying with as Dhamankar cites the reported attacks in other Asian countries: China with 25,179,463 attacks, Singapore 4,353 attacks, Indonesia 5,489 attacks, Philippines 20,181 attacks and India 1,701,895 attacks.

From research conducted, it seems that most of the infected systems in Malaysia are compromised by Windows RPC Worms and Web attacks which utilise 'PHP File Include' attacks. The list also includes compromises caused by the SQL Slammer Worm, HTTP Connect Tunnel (Spam), LSASS Active Directory Interface Overflow nad Fusion News Command Injection.The key areas of concern according to Dhamankar would be the network downtime attacks, financially motivated attacks and critical infrastructure (cyber-terrorism and political) attacks.

The modern security model as Tippingpoint proposes, requires security automation. Security automation offers all-round 24 hours per day security and requires network stability, transparency and no impact upon overall performance. TippingPoint is currently conducting seminar series until May, across 11 Asia Pacific countries and cities to create awareness among media and security executives to address the top network attacks and emerging threats and provide security recommendations for comprehensive enterprise defense and risk compliance. Tippingpoint focus is on emerging trends across the threat landscape. The series offer insights into attack techniques used on Web application servers, which are becoming an attractive financial target for criminals due to their accessibility to back-end database servers. Other sophisticated and dangerous attacks targeting critical network vulnerabilities including VoIP and SCADA will be covered. The growing sophistication of cyber threats and system vulnerabilities provides a daunting task for IT administrators working to protect critical data while meeting regulatory compliance.

“The past two years have been a rich play of application vulnerabilities from the server to user perspective,” according to Dhamankar. Attackers Dhamankar says, have started turning towards Web applications for compromise since both open source and custom Web applications have been found to be riddled with numerous vulnerabilities. Web server vulnerabilities have, in turn, fueled the compromise of desktop systems via user application vulnerabilities. It has become an easy trick to take over a Web site or host a malicious Web site remotely and attack any users directed to the site. Tippingpoint also wants to bring to attention the emerging technologies and business trends in information security and their potential business impact.

Neal Hartsell, TippingPoint's worldwide vice president of marketing explains that a more innovative approach platform is required by organizations who want to evolve to better secure their networks.“The three principle concerns of organizations center on keeping bad traffic off the network; controlling who and what accesses the network; and ensuring critical data does not leave the network,” says Hartsell. Hartsell agrees however that, that's a large and seemingly disparate charter, so the question becomes how these topics are related and how they can be addressed through a cohesive network security solution model that is technically and economically viable.

No comments: