Cyber Security Trend - Annual Review 2014

Size: px
Start display at page:

Download "Cyber Security Trend - Annual Review 2014"

Transcription

1 Cyber Security Trend - Annual Review 2014

2 - Organizations are Centrally Aware of Only 50% of Their Own Website(s); Call for Reconsidering Inventory Management- Executive summary Threats to websites and countermeasures Attacks from the Internet Countermeasures taken by organizations for their websites Threats to endpoints and countermeasures Attacks from the Internet Countermeasures by "people" against malware infection Countermeasures assuming malware infection Case study and issues in incident handling Incident handling by CSIRTs Case study and issues in incident handling Conclusion

3 Executive summary Executive summary Threats to Websites - Organizations are Centrally Aware of Only 50% of Their Own Website(s); Call for Reconsidering Inventory Management - The result from the websites inventory service we provide revealed that organizations are aware and grasp only approximately 50% of sites they own. In the event of a high-risk vulnerability disclosure, an organization should investigate how vulnerable products are used as well as network configuraton such as those products are open to the Internet or not. However, as we would also be in-the-dark for approximately 50% of the company's managed website, that portion of unknown site would unfortunately be excluded from those investigation and remain exposed to the threats. Identifying an organization's precise inventory is the first task in securely managing their website(s). Although it may be common sense, the task is difficult and made even more-so as companies continue to grow in size and complexity. With organizations restructuring and migrating into the overseas market, and cloud services becoming even more widespread, the necessity of reconsidering inventory management of websites is intensifying. - Understanding the Risks of Software Product Support Discontinuation and the Necessity for Product Upgrade - When high-risk vulnerabilities in PHP and Struts2 were disclosed in 2013, we confirmed that the duration between the disclosure and attacks was shorter than similar vulnerability windows in The countermeasure against such attacks is applying security patches promptly to fix the vulnerabilities before attacks begin; however, there may be software products that no longer provide patching support for your websites. Upgrading of software products that lack patching support is necessary to continue obtaining security patches. Upgrading may involve modification of web applications and requires time; therefore, it can be extremely difficult to complete the process within a recent short vulnerability window that is disclosure and attack. Using a Web Application Firewall(WAF) as a temporary solution prior to upgrading your out-of-date products is highly recommended. Threats from Targeted Attacks - Call for Implementation of Operational Systems with Effective Application of Outbound Protection protection Products - As malware infection methods and routes are becoming more and more complex, it is also becoming more difficult to completely prevent malware infections, even if you have implemented inbound protection and endpoint protection aimed solely at preventing malware intrusion and infection. In addition to those protections, outbound protection has become the focus of attention that is a countermeasure on assumption of having internal clients that malware have infected already. Some outbound protection products can perform correlation analysis of traffic to identify clients that unknown malware have infected already. However, this requires human intervention and analysis to determine whether the detected case is legitimate malware or not, since this function does not involve pattern matching. Resolving an incident under such "gray situation" is the new big issue for organizations, and there is a growing need for implementing operational systems with the knowledge and skills to solve this issue. Issues from Computer Security Incident Response Team(CSIRT) Operations - Fusion of Systems and Human Resources, and Continuous Training and Education are Vital in CSIRT Operations - CSIRTs are widely recognized as one of the main security countermeasures. There are two key factors to implementing and operating a CSIRT: 1) Designing and implementing the security infrastructure according to the service scope provided by the CSIRT, and 2) Securing highly specialized human resources. Responding to the recent 2

4 Executive summary sophisticated and complex cyber attacks promptly and accurately is extremely difficult without appropriately combining these key factors. CSIRTs operations require continuous training and education to take on the challenges of maintaining response capability against attacks that are advancing day-by-day. Research outline This report analyzes data which NRI Secure collected in fiscal year 2013(April 1, 2013 to March 31, 2014) through the following security services. Older data is also used in some places in order to analyze the trend in past years. Managed security services - FNC 1 Secure Internet Connection Service An outsourcing service providing security countermeasures required for safe connection between customers' internal networks and the Internet, such as gateways, proxy servers, and remote access. This report summarizes logs from virus check servers for 45 companies, and next generation firewalls for 22 companies among gateway servers managed by the FNC Secure Internet Connection Service. - FNC Secure Web-Net Management Service An outsourcing service providing security countermeasures to protect customers' websites from cyber attack. It monitors security devices such as firewalls, intrusion detection systems(ids2), intrusion prevention systems(ips3), and web application firewalls(waf4) 24/7. This report summarizes logs from WAFs for websites of 29 companies managed by FNC Secure Web-Net Management Service. Security assessment service - Platform Assessment A service which inspects security holes and setting statuses of system infrastructures such as servers and network devices from outside(the Internet) or inside the LAN, and provides the assessment on the risks of detected flaws based on our own criteria. This report summarizes 126 systems on which we carried out the assessment in Web Application Assessment A service which detects hidden security flaws in web applications with considerations to the web application implementation, development languages, and platforms, and reports the assessment on the risks of detected flaws based on our own criteria. This report summarizes 582 systems on which we carried out the assessment in Website Group Inventory Service(GR360) A service which search public websites related to a given organization using our proprietary algorithm, and carry out simple security checks on those discovered sites to determine the overall security level of the website group. This report summarizes 6,216 sites(4,354 domestic sites and 1,862 overseas sites) on which we carried out the simple security checks in Targeted Attack Simulation A service which checks and reports employees' response to targeted s by sending s attached with fake malware and monitors if the employees open the attached file. This report summarizes the result from 98,049 e- mails sent from April 2013 to March * NRI Secure presented a proposal of specific countermeasures with the assessment results to organizations whose systems contained security flaws, and strongly recommended that they apply the countermeasures immediately. As a result, we assume that the most of these websites have applied the appropriate countermeasures and are now secure. 1. Firewall Network Center(our service brand; provides a secure boundary mainly to the internet) 3

5 1. Threats to websites and countermeasures 1. Threats to websites and countermeasures 1.1. Attacks from the Internet The FNC Secure Web-Net Management Service monitors access from the Internet to websites, and logs rogue attempts blocked by the firewalls. Numerous attacks on websites were detected in 2013 as they were in Let us see the overview of attacks on websites in Figure 1 shows the simplified configuration diagram of WAFs that are subject to this summary. Figure 1 Simplified WAF configuration diagram Figure 2 Breakdown of attacks on websites detected by WAFs(n=240,403) Figure 2 shows the breakdown of attacks on websites by the target software components. This reveals 48% of attacks were targeted at web applications. It was followed by web servers, middleware, and then OS s. Detected attacks on web applications were mainly of SQL injection, remote file inclusion(rfi), cross-site scripting(xss), and cross-site request forgery(csrf). There is no major change in the trends. Detected attacks on web servers were mainly on Apache vulnerabilities(cve , CVE ) and inadequate configurations and/or vulnerabilities of IIS. Continuing attacks on vulnerabilities that were disclosed in 2011 indicate there are still many websites running without countermeasures. Attacks on OS s were mainly spying such as port scanning as they had been for past years. These attacks do not directly result in damage. While attacks on middleware made up the smallest part, they mainly targeted vulnerabilities that allowed remote execution of arbitrary code in PHP and Apache Struts 2 that were deployed in a comparatively large number of websites. The overall trend was that the duration between the disclosure of vulnerabilities and detection of attacks on these vulnerabilities was gradually becoming shorter. This trend was also mentioned in the previous report. Let us take the trend in attacks on middleware as an example and look further into the details. 4

6 1. Threats to websites and countermeasures Trend in attacks on middleware Remote file inclusion(rfi) targeting PHP RFI is an attack method which sends a malicious URL to the targeted website and make the target website read and execute attack code placed on another server. Vulnerabilities that allow RFI are highly dangerous because the attacker can execute any attack code on the targeted website if the RFI attack is successful. Figure 3 Remote file inclusion attack Vulnerabilities in PHP are often targeted by RFI attacks. We will take CVE and CVE among RFI attacks targeting PHP in 2012 as examples to make a comparison of the duration between the vulnerability disclosure and detection of attacks. An attack method on this vulnerability was disclosed first in May 2012 when the vulnerability was disclosed, and a different attack method was disclosed again a year and half later in November Table 1 shows vulnerability information of PHP(CVE and CVE ). Table 1 PHP vulnerability information(cve and CVE )

7 1. Threats to websites and countermeasures The attack method disclosed in 2012 enabled execution of arbitrary code by passing an argument to a PHP script to attack the vulnerability while PHP was running in a CGI environment. Therefore the general consensus was that this vulnerability had no effect in environments where PHP scripts were not placed in public areas. However, a new attack method was disclosed a year and half later on October 29th This method directly attacked PHP processing system such as "/cgi-bin/php" "/php-cgi/php" even when PHP scripts were not placed in public areas. This enabled attackers to attack more efficiently without need of searching for public PHP scripts. Figure 4 shows the number of detected attacks using new attack code. Figure 4 Number of detected attacks using new method(daily history) The disclosure of the vulnerabilities(and new attack code) was on October 29th 2013 and the attack was detected after 3 days on November 1st. When the given vulnerability was disclosed in May 2012, the first attack was detected 6 days later. This is an example that shows duration between the vulnerability disclosure and detection of attacks is becoming shorter. PHP users with the vulnerable version would have thought "We should not be affected because attackers cannot use the disclosed attack method", and many would have continued using the vulnerable version without upgrading it. This case also shows that even if workarounds or mitigation countermeasures are available, the fundamental solution to vulnerabilities is patching. Attacks on vulnerabilities in Apache Struts 2 Another example is with Apache Struts 2, a popular web application framework. Among vulnerabilities in Apache Struts 2 disclosed in 2013, vulnerability information CVE and CVE disclosed in July are shown in Table 2 and the numbers of detected attacks on these vulnerabilities(daily history) are shown in Figure 5. Table 2 Apache Struts 2 vulnerability information(cve , CVE ) 6

8 1. Threats to websites and countermeasures Figure 5 Number of detected attacks related to CVE and CVE (daily history) High-risk vulnerabilities in Apache Struts 2 that allowed attackers to execute arbitrary code were also disclosed in 2012(CVE , CVE , etc.) The first attacks were detected 8 days after the disclosure of CVE , and 6 days after the disclosure of CVE Exploitation was becoming significantly spontaneous for CVE and CVE shown in Figure 5; the first attacks were detected on the following day of the disclosure. Shorter duration between the disclosure of vulnerabilities and attacks means a shorter grace period to apply countermeasures on websites which deploy the software with the given vulnerabilities. Ideally, the countermeasure should be patch application as described in the example of RFI vulnerabilities in PHP; but can an organization s website catch up with the ever-diminishing windows of vulnerability? 7

9 1. Threats to websites and countermeasures Operational status of middleware Operational status of PHP Our Website Group Inventory Service "GR360" checks vulnerabilities in HTTP servers and middleware running on web servers by performing simple security checks on websites. 6,216 websites underwent simple security checks by GR360 in 2013 and figure 6 summarizes PHP versions running on the websites. Figure 6 Operational status of PHP(n=807) Only PHP 5.3.x and later were supported and PHP 5.2.x and earlier versions were no longer supported when checks were carried out. Figure 6 shows 56% of websites were still running versions that were no longer supported. Vulnerabilities in PHP we have already discussed(cve , CVE ) were in PHP 5.3.x and PHP 5.4.x which were still supported; therefore, it was possible to apply patches supplied by the developer. However, if any vulnerability is found in PHP 5.2.x or earlier, the basic countermeasure would be to upgrade to a supported version on PHP since the developer would not supply the patches. There are 3 types of PHP upgrades; these are major, minor, and point version upgrades. PHP manages its versions with major, minor, and point numbers. Figure 7 PHP versions 8

10 1. Threats to websites and countermeasures New functions are not added in point version upgrades, only in minor and major version upgrades for PHP. For example, the migration guide 3 for the minor version upgrade from PHP 5.2.x to PHP 5.3.x describes changes in functions that are not backward compatible and functions that are not recommended to be used with PHP 5.3.x. In other words, you need to review the effects those changes and new functions may cause to web applications before a minor version upgrade from PHP 5.2.x to PHP 5.3.x, and modify those applications if necessary. You also need to refer to the past migration guides if you are using PHP 5.2.x or earlier. This will add more time required for the upgrade preparation. While the work may be carried out relatively swiftly for point version upgrades which cause less effects on web applications, Figure 6 indicates that upgrades to supported versions of PHP were sluggish even when support for PHP 5.3.x was about to be withdrawn in July Operational status of Struts Among 46 websites running Struts, we found 45 sites with Struts 1 whose support was withdrawn in April A major version upgrade is required from unsupported Struts 1 to supported Struts 2; however, effects on web applications must be confirmed as described in the previous section. Structures of Struts 1 and Struts 2 differ significantly because Struts 2 is based on WebWork, a framework that is different from the one used for Struts 1. Therefore, upgrading from Struts 1 to Struts 2 is not easy. This may be the cause of sluggish migration to the supported version as it is so for PHP. Figure 8 Operational status of Struts(n=46)

11 1. Threats to websites and countermeasures Operational status of HTTP servers(apache and IIS) Figure 9 shows the result of our investigation into operational status of Apache and IIS that are used for web servers. Figure 9 Operational status of Apache(left, n=1052) and IIS(right, n=664) Support for Apache 2.0.x was withdrawn in July 2013 and currently 2.2.x and later are supported; however, 24% of web servers were still running versions of Apache that were no longer supported. With regard to IIS, support for 5.x was withdrawn in July 2010 and currently 6.x and later are supported. Only 4% of web servers were running the unsupported versions of IIS. This is significantly lower than Apache. The support periods of IIS are in sync with the support periods of Windows Server OS s. This encourages the use of supported versions because IIS is subsequently upgraded when users upgrade their Windows Server OS s as support is withdrawn. Also, higher percentages of web servers are running supported versions of software on both Apache and IIS compared to the aforementioned PHP and Struts. This is due to the fact that the effects on web applications and middleware caused by upgrading Apache or IIS are generally less than those caused by upgrading middleware such as PHP and Struts. 10

12 1. Threats to websites and countermeasures 1.2. Countermeasures taken by organizations for their websites We have described the usage status of software with targeted vulnerabilities based on attack trends on websites in the previous sections. We will focus on countermeasures taken by organizations for their websites in this section based on the results of our assessment services for corporate websites. Countermeasures for web networks Our Platform Assessment Service consists of remote assessment which is carried out via the Internet through the firewall, and on-site assessment which assesses the system from inside the firewall to check the effectiveness of countermeasures in web networks. Their aims are to assess the resistance against attacks from external networks such as the Internet and attacks from internal networks initiated by malicious insiders or third parties who have overtaken servers. The Platform Assessment Service classifies systems into one of the following three groups according to their risk levels determined by the assessment. "Danger": Systems that can be successfully attacked at any moment. "Warning": Systems that can be successfully attacked under certain conditions. "Safety": Systems that do not have any of the above flaws. Systems we have assessed in the past 5 years are categorized into the above groups and shown in Figure 10. Figure 10 Results of platform assessment(annual history, via firewalls) 11

13 1. Threats to websites and countermeasures The percentage of systems in "Danger" has been declining and the percentage of systems in "Safety" has been increasing since The fluctuation in the percentage of systems in "Danger" from 2010 to 2013 was mainly caused by the DoS vulnerability(cve ) in Apache. There were a large number of websites with this vulnerability at the time of the disclosure in 2011; however, the percentage in "Danger" decreased as countermeasures were gradually applied. Many systems in "Warning" allowed intruders to access and make login attempts with ID s and passwords to management consoles of application servers or remote maintenance services (ssh, etc.) via the Internet. Countermeasures such as source IP address access control or public key authentication should be applied to such vulnerabilities since the system may be abused once the intruder clears ID and password authentication by a brute-force attack. Figure 11 shows the result of on-site assessment in the past 5 years. Figure 11 Results of platform assessment(annual history, not via firewalls) Systems in "Danger" were often using versions of platform products with high-risk vulnerabilities, versions of platform products which were no longer supported, or maintenance services which were set with easily guessable ID s or passwords. Results shown in Figure 10 via firewalls and Figure 11 without firewalls reveal that organizations are still relying heavily on firewalls to protect their systems from attacks via the Internet, and countermeasures are only applied on software that provides public services. Based on the defense-in-depth concept, we recommend our customers to improve their security level on each server in addition to protecting their systems with firewalls. However, Figure 11 indicates organizations cannot get around to improving security level on each of their servers on their own. 12

14 1. Threats to websites and countermeasures Countermeasures for web applications Let us see how countermeasures are applied against attacks on web applications from the results of our Web Application Assessment Service. The Web Application Assessment Service classifies websites into one of the following three groups according to their risk levels determined by the assessment. "Danger": Websites where important information can be illegally accessed. "Warning": Websites with possible information leakage risks while important information could not be accessed. "Safety": Websites which do not have any of the above flaws. Figure 12 shows websites we have assessed in the past 5 years by each of the above categories. Figure 12 Risk levels of websites over 5 years(annual history) While approximately 30% of websites remained in "Danger" as they have been for years, websites in "Safety" increased at the expense of websites in "Warning". Therefore, it can be deemed that safe websites are on the increase as the overall trend. One of the reasons for the gradual increase in safe websites is that technical knowhow of developing safe web applications accumulated in organizations as well. 13

15 1. Threats to websites and countermeasures Figure 13 Risk levels of websites over 5 years(organizations with assessment experience) Figure 14 Risk levels of websites over 5 years(organizations without assessment experience) Figure 13 and Figure 14 show the assessment results from organizations that had undergone the system assessment before and organizations that underwent the system assessment for the first time. Figure 13 shows a gradual increase of websites in "Safety" and a gradual decrease of websites in "Warning". On the other hand, Figure 14 shows websites in "Danger" continuously as high as 50%. Therefore, it is deemed that organizations with repeated assessment experience can accumulate know-how of web application development and are less likely to introduce flaws. However, it is also true that even organizations with assessment experience could not eliminate flaws and 30% of websites are left in "Danger". 14

16 1. Threats to websites and countermeasures Trends in typical flaws The followings are most common among high-risk flaws detected in our Web Application Assessment. Accessing administrative functions by privilege escalation(hereinafter privilege escalation) Spoofing due to insufficient checks(hereinafter spoofing) SQL injection(sqli) Figure 15 shows detected cases for the above flaws plus another major flaw, cross-site scripting(xss), in our Web Application Assessment in the past 5 years. Figure 15 Detected major flaws over 5 years(annual history) While privilege escalation, spoofing, and SQLI decreased by 3% from 2012 to 2013, there has not been any major change in general for years. Reasons how flaws were introduced should be made known among developers and clear countermeasures should be implemented to prevent repeating it in the future especially for these high-risk flaws. Development processes of web applications can be defined as "Requirements(requirements definition)","design", "Implementation(including tests)", "Deployment", and "Operations". Figure 16 shows the processes in which high-risk flaws detected in web application assessment were introduced. 15

17 1. Threats to websites and countermeasures Figure 16 Development processes where high-risk flaws were introduced(annual history) Although there has been no major change over the years, it is clear that approximately 60% of flaws were introduced in requirements definition and design process. Privilege escalation and spoofing were introduced in these processes. If considerations to privilege escalation and spoofing are overlooked in requirements definition and design processes, functions to prevent these flaws are not implemented in the implementation process, and subsequently tests performed by the application developers would not find the flaws. In such a case, privilege escalation and spoofing flaws are finally revealed when web application assessment is carried out just before the release. Many of flaws introduced in requirement definition or design processes are due to lack of ability to clarify the necessary security requirements and issues sufficiently. In other words, this can be avoided by applying design guidelines on security issues, carrying out design reviews by experts, or establishing the necessary environment or system. Flaws introduced in the implementation process are due to overlooking even when the developers understand the necessity of countermeasures and methods. It is difficult to completely eliminate human errors in development comparatively large project. However, mechanical countermeasures such as source code assessment tools are comprehensive and effective for detecting such flaws. Flaws in the implementation process can be dealt with by deploying WAFs. Especially those that can cause disastrous effects such as SQLI, and that are frequently detected such as XSS can both be prevented by WAFs. However, it must be noted that WAFs are not the exhaustive solution for all flaws in the implementation process. Flaws in deployment and operations process are mainly flaws in the platforms, and these are where vulnerabilities of software become especially apparent. Since the duration between vulnerability disclosure and attacks is diminishing as described in the previous section, relying completely on patch application is no longer a realistic solution. WAFs are also effective countermeasures for flaws in this process. Placing WAFs in front of web applications with the signature to detect and block packets containing attack code for the particular vulnerability enables you to promptly apply countermeasures without checking if the patch causes performance degradation or in some cases modifying web applications. This is a great advantage in running public websites. Again, it must also be noted that WAFs are not the exhaustive solution for all attacks. You need to check if a WAF can be used each time when a high-risk vulnerability is disclosed, and apply the patch to eradicate the flaw if a WAF is not the solution for the vulnerability. 16

18 1. Threats to websites and countermeasures Figure 17 Security countermeasures for each website development process Importance of website inventory - First step in security Extremely high-risk vulnerabilities in Struts 1(CVE ) and OpenSSL(CVE ) were disclosed in quick succession in April System managers must have agonized over how to investigate whether their systems were affected by the vulnerabilities. Investigation into whether a vulnerability affects your system involves determining whether an attack on the vulnerability would be successful. There are 2 items to be investigated here. First, you would need to identify the systems where the vulnerable version of the software was deployed e.g.you can limit the investigation to web systems for Struts 1; however, you would need to expand the investigation scope to include mail servers and network devices for OpenSSL. Second, you need to understand the network configuration. For example, if you assume the threats to be "attacks via the Internet", systems with the vulnerable software that are not affected are those that are also unreachable from the Internet. Therefore, you need to know the configuration information to understand the effects of the vulnerabilities in addition to whether or not your organization is using the vulnerable version of software. Many organizations had trouble in collecting information such as the version of software while they were aware that they were using Struts 1 and/or OpenSSL, or even the software configuration itself in this particular case. The vulnerabilities also attracted media attention and the news on the dangers of these vulnerabilities reached system managers relatively quickly as well as the general public. However, the media does not always collect accurate information and report the true risk level of vulnerabilities. Collecting vulnerability information and determining the risk level triggers investigation into the effects, and how promptly the investigation starts determines the risks of attacks. We felt this high-profile incident impressed upon organizations "to be proactive" in collecting vulnerability information and determining risk levels. The problem was made worse by organizations not centrally understanding all of their public websites(in many cases). Website management methods vary depending on organizations. Websites are often implemented and managed centrally by the system department, or they are implemented and managed by concerned departments individually and the department in charge of security oversees the status. However, such rules in organizations are not always correctly observed. Our Website Group Inventory Service(GR360) searches organizations' websites using our proprietary logic to make an inventory. Figure 18 shows the ratio of the number of websites of which the managing organizations were centrally aware, and the number of websites which were discovered by GR360(that organizations were not aware of) in Organizations were only aware of less than 50% of(their) websites. 17

19 1. Threats to websites and countermeasures Figure 18 Results of GR360(n=5338 sites) There are many reasons for websites straying from the organizations' rules. One is the spread of cloud services. Nowadays, the infrastructure for easily implementing websites by any number of non-technical departments is commonly ready at-hand; therefore, websites can be created within a short time as long as one has the motivation. Another reason can be acquisitions and entering overseas markets. Websites that were implemented by the acquired company may have slipped through the net during the acquisition process, or an overseas base of a Japanese organization may have implemented websites using a local vendor. Over 50% of websites would not even appear on the list even when the aforementioned investigation is launched due to a disclosure of high-risk vulnerabilities. Although it is unlikely that all of them are in danger, the risk is not low when the vulnerabilities are of major software such as Struts and OpenSSL; therefore, some websites are certainly left open to attacks. Vulnerabilities in such websites of which organizations are not aware, would not have been managed thus vulnerabilities are highly likely present. Clarifying the management object is the first task we need to carry out before applying security countermeasures to websites. Although it sounds like common sense, it is a difficult task as the organization grows larger and more complex. It is often felt that solutions for protecting websites from attacks on vulnerabilities can only be provided by technical aspects; however, they are not always technical matters. This may be our blind spot when considering security countermeasures for corporate websites. This case was an example to show the importance of inventory management such as understanding the presence of them and collecting information on software running on them, in website security management. 18

20 2. Threats to endpoints and countermeasures 2. Threats to endpoints and countermeasures 2.1. Attacks from the Internet The most common attack methods to infect clients with malware are via websites and s. For infection via websites, the attacker prepares a website with attack code or malware and redirects the target user to the illegal website. The attacker infects the client by exploiting vulnerabilities in the web browser's plug-ins while the targeted user is viewing the website. This method is also called a drive-by download attack. For infection via s, the attacker sends an with a malware attachment to the target user or an with a URL to redirect the user to an illegal website. The aim here is also to infect the client with the malware. This section focuses on these two attack trends. Detection status of malware infection via websites Figure 19 shows the monthly history of the number of detected malware in 2013(April 2013 to March 2014) on the virus check server provided by our FNC Secure Internet Connection Service. The traffic between the corporate clients and websites flowed through the virus check service. Figure 19 Number of malware detected by the virus check server(monthly history) The majority of detected malware was Trojan and Exploit types. The total number of detected malware declined when the number of detected Trojan malware declined from July to October. On the other hand, the number of detected Exploit malware increased gradually from September and became almost as much as the Trojan malware. 19

21 2. Threats to endpoints and countermeasures Figure 20 Number of Trojan malware detected by the virus check server(monthly history) Figure 20 shows a breakdown of Trojan malware detection. The most of detected malware was Trojan(Iframe), Trojan(JS), Trojan(Script), and Trojan(Redirector). They all were attack methods used for drive-by download; this suggests that the detected packets were Iframe or JavaScripts to infect Trojan malware rather than packets with Trojan malware itself in the web browsing traffic. These packets were redirecting users to the attackers' sites using Iframe or JavaScript. Trojan(Iframe) malware was particularly popular. Analysis on detected URLs revealed that many websites were legitimate but attackers embedded with Iframe to redirect users to other websites. Since inline frames can be hidden, malicious contents can be downloaded while users were unaware. With regard to Trojan(JS) malware, there also were many cases of tampered legitimate websites where attackers embedded with obfuscated JavaScript. JavaScript redirected users to attackers' websites that were equipped with an easy-to-use exploitation tool called Blackhole Exploit Kit in many cases. Obfuscated JavaScript is known to be used often to redirect users to attackers' sites with Blackhole Exploit Kit; however, disabling JavaScript on the browser is not a realistic solution since many of recent websites cannot be displayed properly without enabling JavaScript. In conclusion, web infection is often carried out by attackers' tampering with legitimate websites and redirecting visiting users to other malicious sites. Figure 21 shows the monthly history of the number of Exploit malware detected by the virus check server. 20

22 2. Threats to endpoints and countermeasures Figure 21 Number of Exploit malware detected by the virus check server(monthly history) The most detected malware was "Exploit.Agent.AK" that exploited vulnerabilities in Java and spread mainly in Japan from September Next is Blackhole Exploit Kit that had been detected continually since February 2012 indicating it was popularly used by attackers as an easy-to-use exploitation tool. CVE is the sum of Exploit malware that exploited vulnerabilities disclosed in Table 3 is a list of vulnerabilities summed in CVE Table 3 List of vulnerabilities summed in CVE

23 2. Threats to endpoints and countermeasures All of these vulnerabilities allowed execution of arbitrary code while browsing a website. Figure 21 shows a growth of CVE in February The most of these exploited the vulnerability of CVE IE is the most common browser deployed in organizations as we will describe later. An increased number of packets to infect malware that targets vulnerabilities in IE tend to be detected as shown whenever a high-risk vulnerability that allows arbitrary code execution is disclosed and attack code is published. Vulnerabilities in browser plug-ins that are commonly used in organizations such as Adobe, Flash, and Java are also targeted in the same way when they are disclosed. Attacks on the CVE vulnerability were detected on the 9th day of the disclosure; this shows quick response was required. However, applying patches to IE in organizations is not always easy since IE may be used in business systems. In such a case, they have to rely entirely on the virus check function as the countermeasure against the malware infection via websites. Even when a high-risk vulnerability is disclosed in the browser in use, prohibiting whole Internet web browsing activity is impossible because of the way business operations are carried out today. Also operational countermeasures such as prohibiting access to sites that are irrelevant to the business is not effective since tampering legitimate websites is becoming common. Organizations which cannot apply patches immediately should consider a workaround such as preparing an alternative browser to view websites on the Internet. Detection status of malware infection via s Let us examine the trend in malware infection via s that is another attack method aiming at infecting clients with malware. Figure 22 shows the monthly history of the number of malicious attachments detected by the virus check server provided by our FNC Internet Connection Service. Figure 22 Number of malware attachments detected by the virus check server(monthly history) 22

24 2. Threats to endpoints and countermeasures There was a surge in the number of Exploit and Trojan malware detections in May The number of detections decreased slightly afterwards; however, no major change occurred in the second term from October onwards. Trojan s that increased in May had a subject "Your Wire Transfer XXXXXXXX canceled" and attached with a compressed file called "payment receipt gbk-75.zip". Also, many Exploit s had a subject "Your transaction is completed" and attached with a Word file called "receipt doc". As you can see from the subjects and file names, s looked as if they were about bank transfer notices; however, recipients would be infected with a malware called ZeuS if they opened the attachment in both cases. Once infected with ZeuS, the clients can be controlled by attackers via C&C servers on the Internet. ZeuS is aimed at stealing online banking account information or modifying the recipient and amount in the course of transfer, and it has been causing huge financial damage worldwide in the recent few years. A specialized malware development tool(zeus Builder) for ZeuS is available; therefore, the malware can be developed easily without development skill. There are numerous versions of the development tool and subsequently there are numerous subspecies. We can observe wide varieties of ZeuS and ZeuS related malware since they are detected every month and their signature names vary each time. Figure 23 Number of types of malware with the same signature name detected by the virus check server for different duration(annual comparison) Figure 23 shows an annual summary of how long malware with the same signature name was detected. This graph indicates that the same malware was not used long, and attackers disposed of malware after a short time and created subspecies one after another. As the development costs are reduced by the readily available development tool, attackers dispose of malware quickly and generate subspecies to avoid detection by anti-virus software. This trend may continue into the future. 23

25 2. Threats to endpoints and countermeasures 2.2. Countermeasures by "people" against malware infection If attackers continue to dispose of malware quickly to avoid detection by anti-virus software, we need countermeasures on the assumption that s with malware will reach the recipients. However, clients are not infected by the malware unless the recipients execute the attached file. Although we cannot overlook the possibility where attack s directly target vulnerabilities in software such as Outlook, as long as domestic attacks are concerned, most attack s are attached with document files that attack vulnerabilities in Office or Adobe on the client, or executable files that infect malware without attacking vulnerabilities. Today, it is an undeniable fact that "people" in organizations are the last line of defense against malware infection via s. We have been offering the targeted training service that provides simulated experience of targeted attacks since After a series of targeted attacks on domestic companies and government agencies in 2011, an increasing number of organizations are introducing annual targeted training. Targeted training has become popular and many organizations carry out the training with hands-on education that sends fake attack s to employees in a given organization(figure 24). Figure 24 Overview of targeted training Targeted training has another effect as a drill. Training is to repeat basic learning and operations to improve certain ability. The targeted training is designed to prevent employees from executing the attachment file and being infected by malware in the event of their receiving attack mails that may have the same or similar subject, sender, type of attachment file, or attachment file name. In other words, training is a form of education to improve employees' abilities. On the other hand, the definition of drill has clearly the different purpose though it is sometimes used as a synonym of training. In addition to improving individuals' ability, drills are also activity to verify the plan. For example, an organization that has laid down a rule to "Contact the helpdesk if you receive any suspicious " can use the targeted training to confirm if its employees actually escalate the matter to the helpdesk upon receipt of the training , and to provide employees opportunities to reflect on their action if they executed the attachment file. Enabling organizations to verify their plans and rules is the advantage of the simulation program. 24

26 2. Threats to endpoints and countermeasures Whether the employees observe the rules or not is qualitative. On the other hand, whether they open the attached file or not can be countermeasured quantitatively. Also, comparing the number of attached files opened by employees proved that simulation training definitely improves employee resistance to targeted attacks. Since many organizations have deployed the targeted training as malware infection countermeasures, we consider that the effectiveness of such training have been widely recognized. Assuming such training is effective, how often should it be carried out for maximum effect is the question. Figure 25 Comparison of opening ratio in the targeted training Figure 25 compares the percentages of employees who opened attached files from the fake attack s of organizations that underwent the targeted training in 2013 for the first time and organizations which underwent the training in 2012 and The training was repeated multiple times in a year and the figure shows the percentages for the first time and second time to compare the results. The result shows that the opening ratio decreased as the targeted training was repeated, and also the open ratio can be reduced further by repeating the training twice in a year. It is predictable that repeating training will increase the effects. However, we consider too many would have adverse effects. Effects of action to improve awareness are known to diminish as the target gets habituated to it. It is necessary to vary the contents based on the attack trend to avoid the employees feeling used to it, and also it is important to keep it occasional enough to avoid their feeling of "Oh no, not more training!". According to the questionnaire we carried out to the employees, the response was always positive for the annual training while the response varied by organizations for more than once a year. It is difficult to suggest how many times the training should be repeated in a year; however, we recommend at least once a year, and each organization can determine when and how often based on the post training questionnaires. 25

27 2. Threats to endpoints and countermeasures Figure 26 Response to suspicious s Figure 26 shows the results of questionnaires to organizations which underwent the targeted training in 2012 and An increasing number of employees answered they would delete the s if they receive suspicious e- mails rather than consulting the colleagues or superiors. It is deemed that more employees were taking initiative in responding to suspicious s as the targeted training was repeated. Although 20% of employees answered to consult the department in charge, many commented they did not know the department in charge, or the contact details of it. While it is important not to open suspicious s, the organization would not know if they are under targeted attacks if the employees delete them without reporting it to the department in charge. We felt many organizations had not clearly established rules for what to do if employees received suspicious s or opened attached files even when they have rules for what to do in the event of malware infection. Determining whether suspicious could be a real attack or not does require a certain degree of IT knowledge. Considering the recent attack trends, it is essential to clarify the rules for what to do on receipt of suspicious e- mails and establish the contact to avoid confusion. However, even if the organization has established the rules and contacts, the employees would still be confused if they do not know of their existence. It is effective to display the rules where employees may see often to permeate the information. As it has been discussed, "people" in organizations are indeed the last line of defense against malware infection via s; however, it is difficult to make the opening ratio 0% even with continual targeted training because these attacks use social engineering. Also, as it has been described at the beginning of this section, malware infection may occur via websites or s. Rather than the traditional targeted attack that sends s to targeted organizations, we started to hear about a passive attack method called "Watering Hole" in The attackers tampered with websites that were likely to be accessed by employees of targeted organizations and lied in wait for access from those employees. This proves that all attackers have to do is to use new methods to attack the targeted organizations even if the opening ratio of targeted s becomes 0%. Improving employees' resistance against targeted s reduces the risks of malware infection. However, this countermeasure alone is not enough. Since targeted attacks emerged, complete prevention of malware infection was said to have become impossible. Therefore, it is necessary to implement countermeasures assuming that malware infection will occur, and an increasing number of organizations are implementing such countermeasures. Let us focus on this issue in the next section. 26

28 2. Threats to endpoints and countermeasures 2.3. Countermeasures assuming malware infection As malware infection methods and infection routes are becoming more complex, it is difficult to prevent malware infection damage in the organization completely; even if you have implemented inbound protection and training against targeted s that are aimed at preventing malware intrusion and infection. In addition to these, implementation of outbound protection has become the focus of attention that is a countermeasure on assumption of having internal clients that malware have infected already. One of the effective outbound protection methods against malware infection is detecting and blocking C&C traffic(communication often used by attackers to control malware infected clients), identifying the compromised client using the detection result, and removing the malware. This section describes the countermeasure that assumes malware infection using the outbound protection deployed in our FNC Internet Connection Service as an example. We are promoting implementation of next generation firewalls as one of the outbound protection methods, and monitoring highly dangerous control packets transmitted by malware infected clients(figure 27). Figure 28 shows the number of times we detected control traffic from October 2013 to March Figure 27 Point of attack observation 27

29 2. Threats to endpoints and countermeasures Figure 28 Number of times highly dangerous malware control traffic was detected by next generation firewalls (monthly history) Although our FNC Internet Connection Service provides thorough inbound protection mainly with virus check servers(proxy and ), we still detect control traffic from compromised clients certain times every month. Control traffic detected in 2013 included ZeroAccess that was known to be used as P2P malware for click fraud and bitcoin mining. Malware ZeroAccess has been observed worldwide in recent few years. There may be various reasons why such well known malware was able to infect internal clients. It could have been a highly sophisticated detection avoidance technique within the malware to evade inbound protection or a compromised client was physically taken into the office. Even when malware evaded inbound protection, its control traffic was detected by the next generation firewall at outbound protection using pattern matching in this case. Thus we were able to minimize the damage by identifying the compromised client and immediately notifying the client user. However, ingress and outbound protection relying on pattern matching cannot detect new subspecies and unknown malware for which pattern files have not been created yet. In order to provide countermeasures against such unknown malware whose behavior such as characteristics of control traffic is unidentified, some security products are equipped with functions to identify clients that may have been infected with unknown malware by performing correlation analysis on client packets. 28

30 2. Threats to endpoints and countermeasures Figure 29 Number of clients that may have been infected with malware(monthly history) Figure 29 shows the number of clients that may have been infected with malware observed by next generation firewalls. Although correlation analysis does not always identify malware infection, it is possible that it detects clients infected with unknown malware that cannot be identified by pattern matching anti-virus software in early stage. In addition, our malware specialists perform further correlation analysis on these detection results using various event logs to identify clients that are likely to be infected with malware and raise an alert for the client users as necessary. As you see, many of products that are regarded as effective for outbound protection can provide opportunities to organizations to detect malware that cannot be detected by pattern matching. However, this inevitably requires human intervention to determine whether the detected case is malware or not since this method does not involve pattern matching. How can we divide gray matter into black and white? This is the pressing issue for organizations. The next chapter describes this issue using our CSIRT activities as an example. 29

31 2. Threats to endpoints and countermeasures [Column] Migration status of Windows XP and IE6 in organizations Support for Windows XP was withdrawn on April 9, It was extensively reported by media since Windows XP OS was widely used in organizations over a long time. We carried out a questionnaire on Windows XP migration for the "Organizations Information Security Status Investigation". Approximately 30% of organizations answered to "continue using Windows XP even after the support is withdrawn" to show the migration to new OSes is not progressing. The questionnaire was carried out half a year before the withdrawal between August 29 and October 4, What happened to migration of Windows OS s and browsers in organizations afterwards? We summarized access logs on our websites provided for organizations to find out the answer. Figure 30 shows the history of the breakdown of browsers in use in organizations and Figure 31 shows the history of the breakdown of OS s in use in organizations. Figure 30 History of the breakdown of browsers in organizations Figure 31 History of the breakdown of OS s in organizations The use of IE6 decreased to approximately 7% by April Also the use of Windows XP decreased to approximately 23% that was much less than the value we obtained through the questionnaire. With regard to the relationship between browsers and OSes in use, approximately 16% of users continued to use Windows 30

32 2. Threats to endpoints and countermeasures XP as of April 2014 despite having upgraded their browsers from IE6. Their upgrading the browsers suggested they were aware of the danger of using software with vulnerabilities; however, they may not have been able to also upgrade OSes for some reason such as costs and time. This research was conducted using logs from our Internet websites for organizations. Clients with IE6 and Windows XP appearing on the graph were able to connect to the Internet. High-risk vulnerabilities were discovered in all versions of IE including IE6 in April 2014; therefore, users must have known that attacks on these vulnerabilities could succeed at any time if they continue to use the browsers and Windows XP after support was withdrawn. Damage mitigation countermeasures on the client or other devices should be deployed proactively while software upgrade is not possible. 31

33 3. Case study and issues in incident handling 3. Case study and issues in incident handling 3.1. Incident handling by CSIRTs According to the "Organizations Information Security Status Investigation 2013" that we carried out between August and October 2013 with system managers and security manager in organizations' information system departments, 20.5% of these organizations had already established a CSIRT(Computer Security Incident Response Team), and 1.8% were considering doing so. This is approximately 27 times more than the same research in This indicates that the importance of CSIRTs has been gradually realized as a major part of security countermeasures in organizations. Figure 32 shows examples 5 of services provided by a CSIRT. Figure 32 Examples of services provided by a CSIRT An organization that provides part or all of these services and is responsible for responding to security incidents is called a CSIRT. Among those, the core of the post-incident service is incident handling. Incident handling mainly consists of detection, triage, and response stages as indicated in Figure 33. Figure 33 3 steps in incident handling 5. Source: CERT/CC Handbook for Computer Security Incident Response Teams(CSIRTs) 32

34 3. Case study and issues in incident handling These steps can all be covered by the internal CSIRT; however, detection requires design, implementation, and operation of security devices to detect events and triage requires design, implementation, and operation of the mechanism to summarize and analyze the detected events. Smoothly performing these tasks requires specialist knowledge and technique concerning security; therefore, covering everything by the internal CSIRT may be difficult in some organizations. Such organizations can consider outsourcing to security vendors' MSS(Managed Security Service) or SOC(Security Operation Center) services. They can also enjoy benefits of using external services such as installing detection devices, monitoring events, determining whether attacks were successful, and advice on necessary response. Our FNC service established a CSIRT called NCSIRT(NRI Secure Technologies Computer Security Incident Response Team) in 2007 and it has been providing security monitoring and incident handling services for our customers' systems. Let us focus on issues in incident handling based on data and case study information that we have obtained through the NCSIRT Case study and issues in incident handling This section describes the specific operational issues at work places that emerged through activities of our CSIRT called NCSIRT that has been providing services internally and externally. We will focus on incident handling that is the most important element among numerous CSIRT functions. We will describe issues in CSIRT operations that were revealed through actual activities of our NCSIRT from collecting security events, analyzing data, investigating the effects, to examining the response. We hope these results will help organizations to see the required elements to acquire ability to carry out even more motivated incident response. Issues in incident handling NCSIRT provides high-level real-time analysis especially correlation analysis called SIEM(Security Information and Event Management) on communications logs and security events from security devices provided by our Managed Security Service such as firewalls, IDSes, IPSes, WAFs, URL filters, and anti-virus software. The main objective of deploying SIEM is minimizing the costs of event analysis and the time to find incidents by summing a large number of events and automating the analysis. Even if you have established a CSIRT and the system to collect numerous events, you would not be able to provide prompt response to a security incident and would allow the damage to spread unless the time to investigate each event can be reduced. Figure 34 shows an incident response flow using SIEM as an example. 33

35 3. Case study and issues in incident handling Figure 34 Incident response flow using SIEM As you can see, using a SIEM allows you to gather events from various security devices to one place for easy analysis. However, analysis would be too time-consuming if the volume of collected events is too large. The total number of events taken into our SIEM in 3 months from January to March in 2014 was approximately 17 billion. After taking the large number of events into SIEM, the SIEM extracts alert events that are likely to lead to an incident. NCSIRT automatically extracts high-risk events as alert by mechanically separating the events taken into SIEM by the security analysis criteria created by our analysts. The analysts then analyze the extracted alert event as the subject to triage. According to our record, 493 events were subjected to triage out of all the events taken into SIEM in the above period. 34

36 3. Case study and issues in incident handling Figure 35 High-risk alert extraction by SIEM These alert events contain obvious attacks, harmless false positive cases, and gray events that could not be determined to be attacks or false positives. Figure 36 shows the breakdown of all 493 events mechanically extracted by SIEM's. As you can see, approximately 55% was gray. Figure 36 Breakdown of high-risk events mechanically triaged by SIEM(n=493) 35

37 3. Case study and issues in incident handling Basically, mechanical extraction by SIEM cannot accurately extract high-risk alerts. We have been endeavoring to improve detection accuracy by cross-device and cross-customer correlation analysis and introducing a mechanism to detect new attack methods into detection rules as the preparation to incident response; however, there are still alerts that require human-intervention and analysis. Therefore, NCSIRT carries out the second level analysis on the gray events. Security analysts with wide and highly specialized knowledge manually analyze the events on this level rather than the mechanical process on SIEM. Figure 37 shows alerts that were subjected to the manual analysis by our security analysts categorized into attack types. Figure 37 Events triaged by security analysts in attack types(n=271) As shown in Figure 37, manually analyzing alerts in incident handling requires wide-ranging expertise according to the provided CSIRT functions such as knowledge in web applications and client security such as malware infection, in addition to infrastructure such as networks and servers. The final "response" step determines the attack status and the effects of events identified by the triage, and examines the final countermeasures and applies them. If NCSIRT detects an attack on a website that requires urgent attention, it comprehensively examines whether or not to block the attack packets with considerations to the website configuration(network configuration, web server application configuration, etc.), and blocks the attack packets if necessary. Such response also applies to attacks on endpoints such as malware(virus) attacks on client PCs. Countermeasures are considered on a case-by-case basis such as blocking attack packets(c&c traffic, etc.), scanning viruses, isolating the network that contains the client in question, etc. Even a small part of CSIRT activities and incident handling involves system related aspects such as implementing and operating a high-level analysis platform such as a SIEM and/or creating security analysis rules for SIEM, as well as the human resource related aspect such as securing highly specialized human resources. Responding to the recent sophisticated and complex cyber attacks promptly and accurately is extremely difficult without appropriately combining these two CSIRT aspects. 36

38 3. Case study and issues in incident handling Specialized security skills in demand As it has been discussed, those in charge of incident response in organizations must have various specialized knowledge required by the scope of their CSIRT functions. It requires a tough mentality to respond to alerts and incidents that occur day and night while continuously improving your own skills to combat increasingly sophisticated and complex attacks. The role was filled by system or network staff when information security was not discussed as an independent issue However, information security became an independent issue and shortages of InfoSec human resources in organizations became apparent as attacks became more sophisticated and complex, and security incidents that impacted these businesses occurred one after another. According to our research, the "Organizations Information Security Status Investigation 2013", 85% of organizations felt shortages of human resource for information security. Also, the organization s belief in the "development of internal human resources and employee training" as one of the most important security countermeasures increased from 28% in the previous year to 40%(3rd to 1st in the list). And the reasons were because they felt InfoSec HR shortages were "skill shortages in security personnel"(47%), followed by "significant increase in security related operations"(40%). This seems to suggest shortages of personnel with knowledge and experience to cover the aforementioned wide areas of security even if the organization manages to appoint/hire security personnel. What are the necessary roles in incident response? Which skills are required to each role? As it was mentioned in the beginning of this section, events that may lead to incidents must be detected as early as possible, then passed on to the triage and response stages. These tasks require the following roles. Network Security Engineer Operate and manage systems and networks from the viewpoint of detecting attacks. Incident Handler Respond swiftly in the event of an incident. Apply countermeasures and perform recovery in liaison with system and/or network managers. Forensic Analyst Find the evidence in the systems and/or networks in the event of an incident and preserve it appropriately. Malware Analyst Analyze malware, find the attack method, and determine the countermeasure. Also, investigate unknown malware based on the trace found in the systems and/or networks. It should be noted that the necessary human resources are not those who can examine these things at just the desktop but those who can actually investigate hands-on. Even if you are leaving investigation and response to security vendors or system management vendors, the person in charge should have enough knowledge to be able to talk with the vendor in the same language. Otherwise, the organization would not be able to determine if the vendor's investigation or work is appropriate. Learning from incident impact investigation and policy examination The common denominator among incident handling activities is that you must have in-depth understanding of the targeted system and surrounding system configurations before examining the countermeasures; therefore, it is important to have various configuration information beforehand. It takes time before determining the countermeasures, resulting in the damage to spread, or even effective countermeasures may not be found if you do not have such information. Also, the organizational system and response flow should be predetermined to make all decisions swiftly within the limited time. Therefore, it is extremely important that the organization is "prepared" to take a series of actions in an emergency situation, for example, by carrying out operational drills. Our NCSIRT obligates all members involved in the given operations to take part in an operational drill which has been modeled after a real incident. 37

39 3. Case study and issues in incident handling Figure 38 Operational drill scenario The program is aimed at all members to be able to provide incident response at a certain level. The contents are reviewed every year based on feedback from the participants to improve the effectiveness and keep the program close to the real attack trends. In addition, all members have participated in the security training course by SANS Institute, the major security training organization in the US to improve their skills, and all have acquired high-level GIAC certificates. CSIRTs' activities must be continuous. We would say that their most difficult and most important mission is to maintain their response level to ever-advancing attacks through drills and continuous training. 38

40 4. Conclusion 4. Conclusion We saw numerous website defacement incidents including the homepage of a major automobile manufacturer in 2013 aiming at malware distribution. These incidents were the result of attacks on vulnerabilities in software products used in the websites. Viewers with old versions of vulnerable software such as Java could be infected with malware only by accessing these websites and their account information stolen as they enter it to use online banking or web services. Also, support for widely used and long-lived Windows XP was withdrawn in April However, approximately 20% of clients were still using Windows XP to access the Internet even after April Since security patches will no longer be released for Windows XP, it may become the target for attackers in the future. As support for Windows XP was withdrawn, support for software products running on it such as Java is being withdrawn as well. The possibility of malware infection in the aforementioned websites will further increase if such unsupported software is left unpatched and upgrading is not applied. Organizations must recognize that they would be targeted by attackers if they continue to use vulnerable software products that are no longer supported. However, findings in our report suggest sluggish progress in applying countermeasures because applying such countermeasures on information systems that grow with the business would incur substantial costs and they simply do not know where exactly to begin the process. And again, risks of attacks will only increase if such issues are left unaddressed. We hope this report will be useful for applying countermeasures against such security risks. 39

41 - Organizations are Centrally Aware of Only 50% of Their Own Website(s); Call for Reconsidering Inventory Management- Writing and data preparation Supervision Atsushi Fukao Sukehiro Nishita Ryosuke Hatsugai Takehiro Kyoyama Kensuke Masaki Masato Yamane Hiroyuki Oki Masanori Iwahara Kenta Kakei Peter Vu Koutaro Kando Yukinori Hashimoto Takaaki Kimura Jun Odashima This research is an autonomous endeavor by NRI Secure Technologies, Ltd. in order to promote security countermeasures in corporate and public organizations. NRI, the NRI logo, NRI Secure Technologies are the trademarks or registered trademarks of Nomura Research Institute. Company names, product names, and logos mentioned in this report are the trademarks or registered trademarks of their respective owners in Japan and other countries. The source data in this research cannot be provided. NRI Secure Technologies, Ltd. holds the copyright of this report. Mention our company name and the name of our research "" when reproducing or quoting part of this report. Also in such a case, please notify us.(phone: , [email protected]) The following actions are prohibited. Modifying part of or all of data. Selling or publishing this report. Reproducing or quoting without stating the source. Contents of this report are subject to change without prior notice.

42 Tokyo Sankei building Otemachi Chiyoda-ku, Tokyo Japan tel: URL: Copyright C 2014 NRI SecureTechnologies, Ltd. All rights reserved.

Cyber Security Trend - Annual Review 2012

Cyber Security Trend - Annual Review 2012 Cyber Security Trend - Annual Review 2012 Cyber Security Trend - Annual Review 2012 - Inventory and measures for websites dispersed worldwide - Executive Summary 1. Threats of the Internet - Web Network

More information

Cyber Security Trend - Annual Review 2013

Cyber Security Trend - Annual Review 2013 Cyber Security Trend - Annual Review 2013 - Better response to cyber attacks and triaging gray events - Executive summary... 2 1. Threats of the Internet - web network... 4 1.1. Attacks from the Internet...4

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Guidelines for Web applications protection with dedicated Web Application Firewall

Guidelines for Web applications protection with dedicated Web Application Firewall Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Technical Standards for Information Security Measures for the Central Government Computer Systems

Technical Standards for Information Security Measures for the Central Government Computer Systems Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...

More information

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Recommended Practice Case Study: Cross-Site Scripting. February 2007 Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

10 Things Every Web Application Firewall Should Provide Share this ebook

10 Things Every Web Application Firewall Should Provide Share this ebook The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security

More information

Defending Against Cyber Attacks with SessionLevel Network Security

Defending Against Cyber Attacks with SessionLevel Network Security Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Advanced Persistent Threats

Advanced Persistent Threats White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

Why The Security You Bought Yesterday, Won t Save You Today

Why The Security You Bought Yesterday, Won t Save You Today 9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Unknown threats in Sweden. Study publication August 27, 2014

Unknown threats in Sweden. Study publication August 27, 2014 Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large

More information

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Web Security. Discovering, Analyzing and Mitigating Web Security Threats Web Security Discovering, Analyzing and Mitigating Web Security Threats Expectations and Outcomes Mitigation strategies from an infrastructure, architecture, and coding perspective Real-world implementations

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

Countermeasures against Bots

Countermeasures against Bots Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer

More information

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer

More information

IBM Protocol Analysis Module

IBM Protocol Analysis Module IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THREAT VISIBILITY & VULNERABILITY ASSESSMENT THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

Nessus and Antivirus. January 31, 2014 (Revision 4)

Nessus and Antivirus. January 31, 2014 (Revision 4) Nessus and Antivirus January 31, 2014 (Revision 4) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 A Note on SCAP Audits... 4 Microsoft Windows Defender... 4 Kaspersky

More information

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle

More information

Introduction: 1. Daily 360 Website Scanning for Malware

Introduction: 1. Daily 360 Website Scanning for Malware Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

Penetration Testing Service. By Comsec Information Security Consulting

Penetration Testing Service. By Comsec Information Security Consulting Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your

More information

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer

More information

Concierge SIEM Reporting Overview

Concierge SIEM Reporting Overview Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts

More information

Symantec Endpoint Protection Analyzer Report

Symantec Endpoint Protection Analyzer Report Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

Security Event Management. February 7, 2007 (Revision 5)

Security Event Management. February 7, 2007 (Revision 5) Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST

More information

Spyware. Summary. Overview of Spyware. Who Is Spying?

Spyware. Summary. Overview of Spyware. Who Is Spying? Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

NSFOCUS Web Vulnerability Scanning System

NSFOCUS Web Vulnerability Scanning System NSFOCUS Web Vulnerability Scanning System Overview Most Web application systems are tailor-made and delivered in source codes by Customer Benefits Accurate Analysis on Website Vulnerabilities Fast scan

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with

More information

Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012

Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012 Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012 IT SECURITY CENTER (ISEC) INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN Initiative for Cyber

More information

Client logo placeholder XXX REPORT. Page 1 of 37

Client logo placeholder XXX REPORT. Page 1 of 37 Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company

More information

WEB APPLICATION VULNERABILITY STATISTICS (2013)

WEB APPLICATION VULNERABILITY STATISTICS (2013) WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

Endpoint Security: Moving Beyond AV

Endpoint Security: Moving Beyond AV Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

FSOEP Web Banking & Fraud: Corporate Treasury Attacks FSOEP Web Banking & Fraud: Corporate Treasury Attacks Your Presenters Who Are We? Tim Wainwright Managing Director Chris Salerno Senior Consultant Led 200+ penetration tests Mobile security specialist

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]

More information

Top 5 Essential Log Reports

Top 5 Essential Log Reports Top 5 Essential Log Reports Version 1.0 Contributors: Chris Brenton - Independent Security Consultant - [email protected] Tina Bird, Security Architect, PGP Corporation Marcus J Ranum, CSO, Tenable

More information

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Managing Web Security in an Increasingly Challenging Threat Landscape

Managing Web Security in an Increasingly Challenging Threat Landscape Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.

More information

Network Security Audit. Vulnerability Assessment (VA)

Network Security Audit. Vulnerability Assessment (VA) Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.

More information

Developing A Successful Patch Management Process

Developing A Successful Patch Management Process Developing A Successful Patch Management Process White Paper FoxGuard Solutions, Inc. August 2014 Introduction Almost every day, new vulnerabilities are discovered and disclosed to software vendors, who

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

The Web AppSec How-to: The Defenders Toolbox

The Web AppSec How-to: The Defenders Toolbox The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008 Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise

More information

Endpoint Security Management

Endpoint Security Management Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect

More information

USM IT Security Council Guide for Security Event Logging. Version 1.1

USM IT Security Council Guide for Security Event Logging. Version 1.1 USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Cisco IPS Tuning Overview

Cisco IPS Tuning Overview Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information