Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

The Latest Wave of Cyberattacks On the West Is Coming From the Middle East 56

Daniel_Stuckey (2647775) writes "A hacker group from the Middle East known as Molerats attacked a wide range of major public sector organizations over April and May, including the BBC and a smattering of European governments, researchers revealed today. The latest attacks, which sought to establish espionage operations on targets' digital infrastructure, took place between 29 April and 27 May, according to security technology vendor FireEye. The Molerats' actions have added weight to concerns around growing cyber capability stemming from the Middle East. Yet researchers are somewhat perplexed as to the motivation of the perpetrators, whose targets included both Israel and Palestine, as well as Turkey, Slovenia, Macedonia, New Zealand and Latvia. The hackers also went after government bodies in the U.S. and the UK."
This discussion has been archived. No new comments can be posted.

The Latest Wave of Cyberattacks On the West Is Coming From the Middle East

Comments Filter:
  • by jd ( 1658 ) <imipak@ y a hoo.com> on Tuesday June 03, 2014 @01:07AM (#47152477) Homepage Journal

    ...why?

    Your outermost gateway should be a simple NAT/port-forwarder/load balancer and a honeypot server. Web traffic goes to the front-end servers, all else goes to the honeypot server. There should be no live DNS. Computers don't need readable names, strings are often where mistakes are made and replying to an IP doesn't require name resolution. The NAT/load balancing would be per-inbound-packet at this level, not per-session or per-time-interval. That means attacks on server resources (if they get through at all) are divided across your cluster evenly. Buys the machines time to detect and counter the problem.

    Your front-end servers should be not much more than static content delivery systems, proxying the rest through your outer defences. OpenBSD is ideal for this - fast, simple, bullet-proof. Middle level defences should be a very basic firewall (maximum stability and maximum throughput) and an Active NIDS running in parallel (so as not to slow down traffic).

    Inside that, you have at least two load-balancers, one on hot standby, farming dynamic requests to mainline servers. Mainline servers have no static content, only dynamic content. If dynamic content changes slowly (eg: BBC), have a cache server sitting in front of the actual content server. No point regenerating unchanged content.

    Content servers send through another firewall (it can also be simple) to your database servers. Unrelated data should be on distinct servers for security and seek time. Since the content servers are read-only, they need hit only database cache servers with actual databases behind those. If you absolutely have to have FQDNs, zone transfer the critical stuff. Bounce all other DNS requests via the internal network to the regular DNS source. That way, your at-risk gateway doesn't contain stupid holes in the wall.

    The internal corporate network would have a firewall and switch linking up to the content servers and cache servers, then a different firewall to the database servers. These would be heavier-duty firewalls as the traffic is more complex. Logins of any kind should be permitted only over an IPSec tunnel. All unused ports should be closed.

    For the outermost systems, logins should be by IPSec only from a cache server. (Content servers have three Ethernet connections, none going to the firewall.)

    This arrangement will take punishment. The arrangements where everything (database included) is in the DMZ with no shielding against coding errors, THOSE are the ones that fall over when people sneeze.

    Ok, so my topology would cost a few thousand more. To Amazon, the BBC, any of the online banks, any of the online nuclear power stations - a few thousand might be spent on an executive lunch, but considerably more than a few thousand would certainly be spent and/or lost in a disaster. My layout gives security and performance, though the better corporate giants might be able to do better in both departments.

    Doesn't matter if they can. What matters is that nobody at that level should be less secure than this. This is your minimal standard.

  • Election Time (Score:5, Interesting)

    by Nyder ( 754090 ) on Tuesday June 03, 2014 @04:06AM (#47152961) Journal

    I'm guessing it's election time and people need to justify their budgets and keep other things out of the lime light.

    "See, them lousy middle east terrorist types are hacking our computers, you need me to run for office and give the NSA power to do anything." - Any Politician in the USA/UK today.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...