Friday, February 27, 2015

From the breach to the origin of the problem. How to prevent it?

The correct cycle in security is prevention -> Protection -> breach. But as you know, the bad guys usually attack our weakest points. Therefore, we will review the whole proccess, from protection to the security gap, and from there to future prevention measures. Let's begin!

There is malware that can spy on you, even when your device is off. Actually this little worm recently discovered by the folks at AVG hijacks the shutdown process. It leads users to believe that their devices are disconnected, but it only closes unnecessary processes while maintains connectivity and other basic functions in order to communicate with its control center.

After learning of the adware included by Lenovo in their devices (Superfish) that forced the company to  apology twice for it, early this morning the company found out that its website had been hickjacked. The attack was allegedly performed by the cybercriminal group Lizard Squad. The website showed  a "gallery of unhappy young people while the song "Breaking Free" from High School Musical was played in the background." This attack should remind you how important important is to keep a strict control on all services connected to the organization’s network.

Such situation lasted barely an hour. But tomorrow it could be a denial-of-service (DoS) attack. In such case, it would have been nice to have the masterful guide on the classification of DoS attacks released by INCIBE. In fact, you cannot imagine how many types of denial of service attacks do exist.

Moving to protection, don’t you think that the betst protection is a good offense? Coordinated collaboration between several digital protection agencies allow to shut down Ramnit botnet. It operated accross more than 300 different domains and servers. Meanwhile the FBI puts a price on the "head" of developer of the well-known banking Trojan Zeus. Will they prevent future attacks?

Online service administrators are the ones who best can prevent future security issues. Either taking advantage of proactive detection of phishing campaigns installed on their own server, either by checking if their website is vulnerable to any of the Top 10 vulnerabilities this year. These two tutorials by ESET are worth it and will surely keep you entertained this weekend.

It is never too late to lift barriers against the bad boys. In fact the sooner you do, the less you'll be sorry.


Post a Comment