Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security IT

The Desktop Security Battle May Be Lost 389

Trailrunner7 writes in with a Threatpost.com article that begins: "For years, security experts, analysts and even users have been lamenting the state of desktop security. Viruses, spam, Trojans and rootkits have added up to create an ugly picture. But, the good news is that the desktop security battle may be over. The less-than-good news, however, is that we may have lost it. Jeremiah Grossman, CTO of WhiteHat Security, said Thursday that many organizations, particularly in the financial services industry, have gotten to the point of assuming that their customers' desktops are compromised. And moving forward from that assumption, things don't get much prettier." It goes on to speculate about home routers being targeted and infected.
This discussion has been archived. No new comments can be posted.

The Desktop Security Battle May Be Lost

Comments Filter:
  • by jemtallon ( 1125407 ) on Friday May 07, 2010 @12:49PM (#32128954) Journal
    If you'd have read the article, you'd know that home networks are the new frontier for hackers and a big reason why security experts are giving up the desktop fight to focus on the network instead. From the article: "... it won’t matter if PCs are disinfected, swapped out, or replaced with iPads, the bad guys are still control because they own the network below." So the old Blame Windows standard won't work in this case.
  • Re:Don't worry! (Score:3, Informative)

    by landoltjp ( 676315 ) on Friday May 07, 2010 @12:52PM (#32128994)
    As much as I'm a fan, t'wont help, according to TFA:

    Botnets are starting to target and infect routers and DSL modems. Scary, and a possible trend. [...] it won’t matter if PCs are disinfected, swapped out, or replaced with iPads, the bad guys are still control because they own the network below

  • by causality ( 777677 ) on Friday May 07, 2010 @01:13PM (#32129338)

    1. it was even in the summary that by now even home routers are targeted by the asshats. I fail to see how a hardened Linux PC helps there.

    A hardened Linux PC makes a fine router. Older hardware will do the job just fine too, so nothing expensive or exotic is required.

  • No-Charge Solution (Score:5, Informative)

    by psbrogna ( 611644 ) on Friday May 07, 2010 @01:16PM (#32129372)
    Other countries seem to be realizing that's it's a much more winnable battle if home users aren't in an MS environment. Isn't this EXACTLY why the Canadian bank recently started handing out Linux Live Boot CDs for their customers to use when banking from home?

    I think this is the article http://linux.slashdot.org/story/10/03/25/2350236/Can-Ubuntu-Save-Online-Banking [slashdot.org]
  • by Dorkmaster Flek ( 1013045 ) on Friday May 07, 2010 @01:37PM (#32129786)

    Telus gave us this really crappy DSL/Wireless router. I never changed the admin password (admin/telus) on it, but I put a wireless password on it.

    To quote the Mythbusters, "Well there's your problem!"

  • by The Moof ( 859402 ) on Friday May 07, 2010 @01:44PM (#32129918)

    Test it for yourself. Write a script on a Linux machine and try to execute it without adding execute permissions. You can't do it.

    $echo 'whoami' > test.sh
    $sh test.sh
    themoof
    $

    Just sayin....

  • by apparently ( 756613 ) on Friday May 07, 2010 @01:56PM (#32130162)

    ^that looks to me more like wondering about a "what if?" hypothetical scenario, not something which actually takes the blame from Windows just yet...

    The article states "These are all reasonable assumptions based on real-world attacks that have been going on for some time now. Attackers have been targeting home networking equipment for a couple of years, using a combination of vulnerabilities in the firmware and hardware to get control of home users' outbound Internet traffic". Links within the original blog post discuss botnets that are already attacking Linux-based routers [computerworld.com]

    There's nothing "hypothetical" about this threat.

  • by Anonymous Coward on Friday May 07, 2010 @02:00PM (#32130208)

    It seems reasonable to assume that most if not all of those IP addresses represent infected machines.

    Sadly, you are wrong. Port scans are almost never malicious.

    In reality, the vast majority of those scans are from automated systems counting worms for non-malicious purposes, curious hackers, researchers, or ISPs maintaining and monitoring their segments.

    Real malware does not bother to scan. It attacks without scanning because it is quicker and no less effective. Instead of waiting for a scan to time out, it launches multiple attack streams and closes down the ones that time out while spawning new ones. Scans are essentially wasted resources from the point of view of a malware author, recent malware does not bother.

    When you see single port hits, or multiple simultaneous selective port hits, you are probably seeing malware. Nmap scans and portwalking scans, nope, that's just some poor schmuck at the NOC trying to find out which IPs are customer nodes and which ones are the equipment his predecessor installed without documenting it.

  • Mod Parent Up. (Score:5, Informative)

    by aztracker1 ( 702135 ) on Friday May 07, 2010 @02:01PM (#32130230) Homepage
    I don't generally post this kind of thing, but please mod the parent up. I cannot stress enough how false assumptions are generally bad in terms of security. Yes, Linux is being attacked (successfully), as is Mac OSX. The attacks on home routers are particularly heinous as most people do not update/upgrade the firmware ever, and more of it is based on common Linux underpinnings.
  • by Mad Merlin ( 837387 ) on Friday May 07, 2010 @02:12PM (#32130442) Homepage

    *slap*

    It's x86_64 or x86. There's no such thing as x64.

  • Re:Mod Parent Up. (Score:5, Informative)

    by dwillden ( 521345 ) on Friday May 07, 2010 @02:31PM (#32130772) Homepage
    People don't upgrade the firmware in big part because firmware updates are not released. I've had my current Netgear router for over two years. There has not been one firmware update released. And the router management page even has a fairly prominent link to look for updates. If the router manufacturers don't post updates, how can the end users install them?
  • by Hizonner ( 38491 ) on Saturday May 08, 2010 @12:25AM (#32136280)

    You can have filenames; you just keep them in a namespace that's accessible only to the user (or the user's file manager or whatever). If you have a CLI, you type "program <filename>", and the CLI runs an instance of that program and gives it a capability to that file, rather than passing it the name. If you have a GUI, you probably do something like dragging the file onto the program, and the UI creates an instance of the program and passes it the capability.

    You're correct that most programs wouldn't be able to have their own open dialogs. They'd have to rely on capabilities passed in from the user's file manager. Probably you'd express that by dragging again. That's actually more "desktop" than having an open dialog anyway.

    You could support thumbnails by having a little program that generated a thumbnail from a file and did nothing else. Since you can prevent that program from leaking the information from the files, it's relatively safe to have the file manager call it with a read-only capability to every file in turn, and display the results.

    The same applies to things like indexers. Although they'd be relatively powerful and dangerous, they wouldn't be remotely as dangerous as the simplest program in today's OSes, because you could prevent them from leaking the information to anyplace other than their indexes.

    If you want to insert a file into a document, that looks like another drag operation. You drag the file into an existing instance of a program, rather than onto a factory icon.

    It's pretty easy not to pass the same capability to multiple programs or instances of the same program (and pretty easy for them to detect it if you do, assuming they have write access to the file, or assuming you have a reasonable set of locking primitives).

    Yeah, you'll lose some memory to separate instances. You can share all the program text, but the heap is gonna suck up space. It would presumably pay to be economical about building huge "dynamic" structures every time anybody ran your program. On the other hand, think of all the space you won't be wasting on every program having its own open dialog...

    Capdesk isn't really unpleasant conceptually, if you want a toy example.

    It's not free, and it can't be invisible to the user, but it's not so horrible as all that.

"No matter where you go, there you are..." -- Buckaroo Banzai

Working...