Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security IT

Security Industry Faces Attacks It Can't Stop 305

itwbennett writes "The takedown of the Mariposa botnet and so-called advanced persistent threat attacks, such as the one that compromised Google systems in early December, were hot topics at the RSA conference last week. What both Mariposa and the Google attacks illustrate, and what went largely unsaid at RSA, was that the security industry has failed to protect paying customers from some of today's most pernicious threats, writes Robert McMillan. Traditional security products are simply not much help, said Alex Stamos, a partner with Isec Partners, one of the companies investigating the APT attacks. 'All of the victims we've worked with had perfectly installed antivirus,' he said. 'They all had intrusion detection systems and several had Web proxies scan content.'"
This discussion has been archived. No new comments can be posted.

Security Industry Faces Attacks It Can't Stop

Comments Filter:
  • by advocate_one ( 662832 ) on Friday March 12, 2010 @01:25PM (#31454260)

    Traditional security products are simply not much help, said Alex Stamos, a partner with Isec Partners, one of the companies investigating the APT attacks. 'All of the victims we've worked with had perfectly installed antivirus,' he said. 'They all had intrusion detection systems and several had Web proxies scan content.'"

    the "victims" were all running MS Windows...

    • by Z00L00K ( 682162 )

      I must go back to use OS8MT or something even more obnoxious then.

      • by HungryHobo ( 1314109 ) on Friday March 12, 2010 @02:47PM (#31455410)

        Or perhaps stop using losing strategies like Default Permit when it comes to security.

        AV software is just an example of Enumerating Badness which in the long run is a very very bad strategy.

        Penetration testing is useless as anything other than a metric of how well the system is set up.
        If penetration testers check your network and find 100 vulnerabilities and you dutifuly fix them all you're barely more secure than before because the problems that lead to those security holes being there in the first place haven't been addressed and it's almost a certainty that there are many many more.
        It's an example of "Penetrate and Patch" which is a terrible way to do security.

        The problem isn't windows. the problem is that people keep using terrible strategies.
        AV software is useless against a custom virus I write just for attacking your system.
        Blacklists aren't much good since an attacker only has to get through once.
        Penetration testing is cool but it's not a way to secure your network.

        and yet these things are the standard for approaching security.

        • Layered Defenses (Score:4, Insightful)

          by shmlco ( 594907 ) on Friday March 12, 2010 @03:27PM (#31455954) Homepage

          Or we could do true layered defenses in security and redesign the OS to support them. Don't put crap into ring 0 just for "performance" purposes. Use micro-kernels and use messaging systems for interprocess communications. Place OS files into their own, protected partition and control access rigorously. Sign them. Allow unsigned drivers if need be, but sandbox them. Limit "shared" libraries and directories (hello Microsoft and Adobe). Drop legacy application support unless seriously sandboxed in a virtual environment. Heck, sandbox current applications the same way. And so on.

          Today's processors and multi-core systems are fast enough to handle the overhead. Drives are huge. Allocate a full 10% of the processor budget to security. Why should we not sacrifice a few FPS in Quake or Unreal for hardened systems that are much, much, much more resistant to tampering and infection?

          We know what we need to do. Just do it.

      • OS8MT (Score:3, Interesting)

        well, my BIND does announce itself as a win95 Beta version...
        and my semi automated countermesures do ban your IP for 24 hours everytime it detects something I didn't explicitly allow
        and my firewall rules begins by Deny All

        I just love heterogenous IT systems... makes it moderatly harder to penetrate.

        But hey, just a suggestion to all the precedent posts : /sarcasm engaged
        IF OSX IS SO SECURE, WHY NOT MAKE ALL WAN FACING FIREWALLS/PROXIES WITH MACS //sarcasm ends, logic loop detected

    • by sabs ( 255763 ) on Friday March 12, 2010 @01:59PM (#31454698)

      Are you trying to say that Google uses MS Windows for it's websites and database servers?

    • While I think them running Windows helped, can you honestly tell me that the attackers couldn't have gotten in through a hole in Linux, Firefox, Flash, or any of the other openings that every usable computer has? With highly targeted attacks like this there's almost nothing that can fully secure the computer, and those things which could fully secure Linux would fully secure Windows as well.

      For instance, sandboxing the entire OS. Make them use a separate computer when interacting with the internet as a w
  • by al0ha ( 1262684 ) on Friday March 12, 2010 @01:34PM (#31454358) Journal
    The security industry will always be unable to protect everyone 100% of the time. It is impossible to protect the clueless from anything.

    AntiVirus is imperfect as it relies on signatures and known processes, and will always be imperfect. Same with IDS and the lot of it.

    In my opinion, as long as the security industry, and end-users as a whole, continue with the thought that end-user basic security ignorance is OK, things will never get better. The sooner all end users are clued-in instead of clueless, the sooner we may have a ray of hope.
    • Indeed, it's like saying "Despite everyone wearing seat belts, people still die in head-on collisions. Clearly the auto industry just isn't doing enough..."

      (There, even worked in a good car analogy for y'all!)

      • Maybe it's more like saying, "Despite everyone wearing seat belts, people still die in head-on collisions. Clearly we should be considering more public transportation."?
        • Microsoft would put it this way:

          "Despite everyone wearing seat belts, people still die in head-on collisions. Clearly we should be driving your car for you".

    • The security industry will always be unable to protect everyone 100% of the time. It is impossible to protect the clueless from anything. ...

      The sooner all end users are clued-in instead of clueless, the sooner we may have a ray of hope.

      Did you miss the bit in the summary where they mentioned Google? Now it is possible that Google had no anti-virus, no IDS and doesn't monitor in and outbound web traffic for potential threats, but I think it unlikely.

      I find it hard to imagine that a firm which can to all int

    • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Friday March 12, 2010 @01:47PM (#31454544)

      The security industry will always be unable to protect everyone 100% of the time.

      The problem is that they haven't even hit the 50% mark. They cannot even, reliably, detect threats that are over a year old.

      AntiVirus is imperfect as it relies on signatures and known processes, and will always be imperfect.

      Exactly. Which is why that needs to change. Instead of trying to chase the latest variant of a threat, why not save time and effort and identify the LEGITIMATE files? Then, if something is trying to write a file to the OS portion of your drive, and that file is not recognized, it should block it (and MAYBE allow the user to override it after a few hoops and maybe online comparisons with the latest threat databases).

      In my opinion, as long as the security industry, and end-users as a whole, continue with the thought that end-user basic security ignorance is OK, things will never get better.

      I think it is different. The "security industry" depends upon the ignorance of users and the continuation of those users being infected.

      It is not in the "security industry"'s best interest to commit to real improvements in security.

      • So you want to go to a permissions based security model? Something along the lines of what Android does? So when you install the app, it'll tell you every permission that it has, and if you don't agree with them, it doesn't install (Or possibly gives you the option of running in a reduced permissions mode, if the developer allowed it). It's a lot of overhead, but most definitely could have some interesting results in combating these kind of threats. Then again, something like this would need to be intro
      • Then, if something is trying to write a file to the OS portion of your drive, and that file is not recognized, it should block it (and MAYBE allow the user to override it after a few hoops and maybe online comparisons with the latest threat databases).

        Microsoft more or less tried something like this with UAC on Vista, didn't they? Granted, it doesn't matter that much unitl you fix all the other security holes, but the point is that average joe users don't want it, and they make up the majority of the (non-open source) users. It seems to me that asking "Are you sure" before installing software is a good thing, but the marketplace apparently disagreed.

        And the fact is, you can say "They'll learn their lesson after they get infected," but the truth is ver

      • by vadim_t ( 324782 )

        Exactly. Which is why that needs to change. Instead of trying to chase the latest variant of a threat, why not save time and effort and identify the LEGITIMATE files? Then, if something is trying to write a file to the OS portion of your drive, and that file is not recognized, it should block it (and MAYBE allow the user to override it after a few hoops and maybe online comparisons with the latest threat databases).

        And just how is that going to work?

        The main threat are executables. You could require signatu

        • Data must be cleanly separated from executable code, thus the Von Neumann architecture used today is not up to the task. Harvard architecture is much more secure by default by not mixing instructions and data. Sure, some processors today implement some simple version of this through a bit, that is set when this space is for data only and cannot be executed (NX or DX bit in some processors, for example in Intel Xeon lines starting with Harpertown), it is a good start, but I think there should be a more cle

    • The security industry will always be unable to protect everyone 100% of the time. It is impossible to protect the clueless from anything.

      There's definitely some truth to that. However, I think the security industry is still open to criticism specifically because they're telling the clueless, "Without us you're screwed, but if you buy our product, then you don't need to worry. We have you covered."

      The problem is, if you're careful and know what you're doing, you don't really need all of these products on your computer. If you're careless and don't know what you're doing, then this products don't quite solve the problem. In most cases, it

    • by mcgrew ( 92797 ) *

      AntiVirus is imperfect as it relies on signatures and known processes

      I wouldn't say "imperfect", I'd say "flawed". The industry needs to rethink its methodology and come up with something that actually works. User education would be a start, but even that's not enough.

    • Re: (Score:2, Insightful)

      by pastafazou ( 648001 )
      In my opinion, as long as the security industry, and end-users as a whole, continue with the thought that end-user basic security ignorance is OK, things will never get better.
      Just wait until YOU have kids. You'll go off to work, secure in the fact that you're an enlightened end-user as far as security goes, and when you get home from work, you'll see how much damage kids can cause in the 2 hours between the end of their school day and the end of your work day.
      And, when that happens, just let me say i
    • People modding this insightful should get a clue-stick. The best defense is relying on systems that have more security build in, not on the end user. The end user will always be clueless and rightfully so. The end user has stopped being computer fanatic for almost 2 decades. And there is a lot of things that can be improved. Buffer overruns should be a thing of the past, applications should not start out with permissions that lie outside their intended use (MS implemented that for IE, which was a seriously

    • The security industry will always be unable to protect everyone 100% of the time.

      ...sort of like how the TSA and the government cannot provide 100% security from gangsters/drugdealers/terrorists/. I think that the posted topic reads like the common hysterical notion of, 'Why can't X protect me from dangerous stuff all of the time?'

      To address the main topic: How have security firms 'failed'? Billions of dollars flow about the internet on a daily basis without a hitch. Huge amounts of data is seen by th
  • Virus (Score:3, Funny)

    by mcgrew ( 92797 ) * on Friday March 12, 2010 @01:34PM (#31454368) Homepage Journal

    If the "M" virus hits the RSA conference, it it the MSRA virus?

  • failed? (Score:4, Interesting)

    by Lord Ender ( 156273 ) on Friday March 12, 2010 @01:35PM (#31454378) Homepage

    the security industry has failed to protect paying customers from some of today's most pernicious threats

    This is a terribly ignorant statement. The security has actually succeeded in protecting paying customers from all but the most pernicious threats. IT security is about reducing risk, and that's what it does--successfully.

    • It is an ignorant statement but not for the reason you cite and the sentence should read; "Microsoft has failed to protect paying customers from some of today's...". The security industry can do little when given such a crap foundation to work from.
      • Well, given enough funding, IT Security could keep even Windows boxes to extremely low risk levels. Most companies, however, simply decide that $x dollars is enough to spend on Security, and so the Security team tries to get the most bang for that buck. You can block 99% of malware with a reasonable amount of security expense. To get to 99.9%, you will need to double or triple the cost. 100% is not possible, and most companies accept the risk that small amounts of malware get through.

  • In summary; (Score:5, Insightful)

    by Stumbles ( 602007 ) on Friday March 12, 2010 @01:36PM (#31454396)
    The Microsoft operating system has been, always will be insecure. No amount of anti this, anti that or how update date your windows box is; it is not safe to use for any kind of sensitive data.
  • by jollyreaper ( 513215 ) on Friday March 12, 2010 @01:39PM (#31454432)

    Film at 11.

    One thing that shouldn't surprise me anymore but keeps surprising me is that it seems like the more money you pay for software, the more half-assed it is. You get an off-the-shelf product like Quickbooks, it's impressive. You look at stuff that's industry-specific, specialized software that doesn't have a lot of competition, it costs thousands and feels primitive in comparison. It must be the lack of competition means there's no real reason to improve the product beyond what it already does.

    I'm sure there are some exceptions to my experience, naturally. But these niche applications generally seem to be very expensive and primitive.

    • Re: (Score:3, Interesting)

      I'm sure there are some exceptions to my experience, naturally. But these niche applications generally seem to be very expensive and primitive.

      Back before beowulf clusters were common and most all supercomputers were priced in the 9 digits there was a phrase well known in the community - "Supercomputing is a synonym for unreliable computing."

      In other words, if the market is small you suffer from all kinds of problems because there aren't enough users to generate enough bug reports and despite the high per unit pricing, volume is so low that there isn't enough money to pay for all the Q&A beyond the core functionality.

    • Re: (Score:3, Insightful)

      by ehud42 ( 314607 )
      You get a consumer car like a Honda Insight, it's impressive. You look at [race cars] that's industry-specific, specialized hardware and software that doesn't have a lot of competition, it costs thousands and feels primitive in comparison. It must be the lack of competition means there's no real reason to improve the product beyond what it already does. Fixed that for you. When Quickbooks can handle the multi-million transaction ledger of an publicly traded enterprise come back and try again.
  • by Jazz-Masta ( 240659 ) on Friday March 12, 2010 @01:39PM (#31454434)

    The dark side of computer "security" pays far better than the good side. I was contracted to setup a number of servers for a company, and as it turned out, they were part of this "dark side." I told them I had an ethical conflict, and decided to remove myself from the situation about 2 hours into it.

    The problem is, other than the coders and the boss, many people do not know they are working for these companies. This particular company had about 15 people. 3 were in the know, the other 12 were support for shipping, gathering information, making contacts, and advertising, etc. When dealing with spyware/malware, there is a lot of butt covering, and evasion.

    The programmers in particular were amazing coders, some of the best that graduated at the same university I went to. This is how I got contacted to help. Only after we started talking did I realize what they were all about. The pay was almost double what they would have made at a legitimate company.

  • by spinkham ( 56603 ) on Friday March 12, 2010 @01:43PM (#31454486)

    There is no perfect security, offline or online.
    I like to say there are 3 main types of attacks:

    • Bots, worms, and other randomly spewed attacks.
    • Industry targeted attacks. An attacker wants to compromise a bank, any bank, and will go for the easiest target
    • Comany or resource targeted attack. An attacker wants access to you specifically.

    We have mechanisms that are pretty good at class 1. We can shore up our defenses enough to not be the low hanging fruit to get some protection against level 2.

    Level 3 is only starting to enter the public eye. There is no defense that will withstand a well funded targeted attack. The best you can do is make it too difficult for most attackers, and monitor and clean up after the really good ones.

    This is true for airline security, concert security, bank security, web site security, and network security. There is no impenetrable defense for any of these. You minimize the risk as much as you can, then build your systems so they can be effectively monitored and rebuilt/restored in case of attack.

    • While there's no such thing as perfect security, there is definitely security that is about 20 times harder to penetrate than your typical bank website. Either that, or the various government spy agencies such as the NSA are in real trouble. Do those organizations get beaten at their own game? Absolutely. But it's a rare occurrence at best.

      What I think you meant to say was "There's no security good enough to deter most criminal organizations available at a price that companies are willing to pay."

      • If security is that difficult, then why haven't all the banks been emptied by now?

        • Re: (Score:3, Informative)

          by spinkham ( 56603 )

          Because they are monitored and recovered.

          Fraud happens all the time, but the banks have developed heuristics to stop it before too much money is lost. Often transactions can be rolled back and accounts frozen before the money disapears, but not always.

          Banks do lose huge amounts of money however, much of it through credit card fraud. That's the reason credit card interest rates are as high as they are. Customers are willing to pay those rates for easy access to money, so there is no incentive for US banks

      • by spinkham ( 56603 )

        Here's how our most sensitive secrets are protected: Air gapped, behind massive physical security including guys with M-16s.

        Our nukes are especially well protected, and a study of how they do it is quite telling.
        A google search for "nuclear security air force" reveals a lot about the good and bad of the approach, including some high profile failures.

        Note that they are not doing business or interfacing with the public on a regular basis. Airgaps are great until you actually want to give things to some peopl

  • by v1 ( 525388 ) on Friday March 12, 2010 @01:45PM (#31454514) Homepage Journal

    That's what makes "spear-phishing" so ridiculously dangerous - if the attacker is spending his entire day on you specifically, you're going to need a little more than an off-the-shelf unmonitored solution. And if you're a "high visibility target" then you are going to need even more, defense in depth and a dedicated team for your security. It's not reasonable to expect "but I installed Norton!" to come from a CEO of a big company for example. Bigger assets require better, customized defenses.

    Bigger targets attract more than script kiddies and people that are buying hacking kits. They attract entire groups and organizations of highly skilled and specialized hackers that know how to analyze your defenses, have experience getting around all but the industrial grade security tools, and can customize their work and cover their tracks.

    It's no different than complaining that neighborhood security is a mess because your padlock didn't keep your bike from getting stolen. If you have a really nice bike, and a smart thief really wants it, you'd better have something better than a crappy $7 masterlock on it. You can't blame the lock if the bike gets stolen. You were using the wrong tool for the job and the outcome should come as no surprise. You were expecting way too much (security) from way too little.

    • So do people constantly attack Bill Gates accounts? I mean he is like the most obvious target in the world. And besides its not like he'd miss a million dollars if you managed to get to it. It would be like a trophy. Can you even monitor 40+ billion dollars? Can you really monitor a billion anything?
      • > So do people constantly attack Bill Gates accounts?

        They probably try, but there is also the matter of attack surface. Gates has no reason to have much of any. There is also the fact that, while far from my favorite person, he is not an idiot. The same cannot be said for the C-level execs of many large businesses with very large attack surfaces.

    • >That's what makes "spear-phishing" so ridiculously dangerous - if the attacker is spending his entire day on you specifically, you're going to need a little more than an off-the-shelf unmonitored solution.

      Not to mention AV programs simply scan for yesterday's threats. I think we bank too much on them as proactive protection. Locking down your desktops, adhering to the principle of least user access, and not using software that is full of exploits is a much smarter way to go.

  • The most wide spread vulnerability to internet activity today is not something that can be fixed with an anti virus program, or any kind of program for that matter. When it comes down to it, the primary vulnerability is the meat bag sitting at the keyboard. People are stupid. They don't mean to be. They don't try to be. Still, they are (myself included on plenty of occasions). As a result, all a successful hack has to rely on is convincing a large number of stupid people to do something stupid. That's reall
    • > At best, those who are less stupid than others need to work (and sometimes
      > fight) to protect the stupid people from themselves.

      Who decides who is stupid?

  • by smooth wombat ( 796938 ) on Friday March 12, 2010 @01:48PM (#31454552) Journal
    e (damn /. and its short subject field).

    Our state CISO [pennlive.com] was fired when he got back from the conference because he spoke about a hacking incident to the state's DOT site which allows one to schedule driver's exams. Apparently, it was initially presumed the attack came from Russia but was later found to have come from Philadelphia where a driving school had exploited a vulnerability in the web site to schedule more driving tests than there were allotted slots.

    By exploiting this vulnerability, the driving school was able to close all available slots EXCEPT for the school so everyone else had to wait up to 6 weeks to schedule a test.

    He was a scheduled presenter with over 24 years in IT in both the public and private sector. He was recognized, according to the RSA schedule, as "one of the most high-profile experts in the field of securing the data of American citizens today."

    As you read the comments after the article, it's clear that some folks with knowledge of the subject insist he went out of bounds on the subject while others consider what he did to be a normal part of the IT security process.

    I'm only posting this as it does relate to the overall RSA conference. Note that the web site indicated will probably prevent reading the article after a certain time has passed so read it now. In addition, here are two other sites which talk about the firing:

    Site one [scmagazineus.com]

    Site two [threatpost.com]

    Further, here is an article [techtarget.com] which talks to the firee after he became the state's first CISO and what he had to contend with.
  • Fast moving exploits blow right past these security products. The whole industry is based on "identify new threats, develop a detection routine, include it in the next update". So from the time the "assault" starts there's the time it takes for someone to find it and report it to the security product company. Then there's the time it takes for that company to analyse the threat and code a detection - and then there's another delay while customers wait for the next update cycle to come along.

    That's easily t

  • You can have your shit locked down 6 billion ways to Sunday.
    The minute you introduce the human element into it, you have a massive security hole that can be patched, but NEVER closed.
    You can train and train and train. Ennui sets in and their brains shut off after a while.
    You can have the most draconian policies regarding proper usage. People will still circumvent it, accidentally or deliberately.
    You can fire people. It just creates ill will and the damage is already done.
    And, if it happens to be the owner

  • If you read "The Cuckoo's Egg", you will be both charmed and horrified about how quaintly computer security was regarded by the United States government in the early years of the Internet. The insane thing is that despite all the time that has passed since then, we still have lone basement hackers discovering tears in the fabric of the Internet like when Dan Kaminsky found his DNS flaw.

    I believe the Chinese attack on Google has finally woken up a lot of very important people. I was stunned that Hillary Clin

  • We should feel lucky we don't have Cylons yet. They hacked 5 layers of firewalls in a matter of several minutes...and it took many episodes and a reboot via hot skin job sticking things into her arm before they finally removed all trace of the virus.
  • NO technology will do your thinking for you. NO product will protect you if you don't know enough to protect yourself. Antiviruses, deep packet inspection, intrusion detection, etc: they are all useless - worse than that: they are expensive useless, designed more to make somebody else money that to protect the end user. The ONLY thing that will protect you is knowledge. When will people learn that if they want the benefits of modern technology, understanding it is not optional?
  • Or Apple... or Mozilla...

    The biggest security problems are operating systems and applications that build in "exploit me harder" APIs and user interfaces like ActiveX and 'Open "Safe" files after downloading'.

    Microsoft is the poster boy for this, with justification, but every browser company is guilty to some extent. There are no exceptions.

  • ... to act as a deterrent. The Mariposa perps face a maximum of six years under Spanish law. That's small enough to shrug off as the cost of doing business.

Keep up the good work! But please don't ask me to help.

Working...