Feeds

Cybercrime – it's the outsiders wot's to blame

Checking out the finances

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Outsiders are responsible for the vast majority of cybercrime attacks against companies.

So claims Ubizen, which last week set up a computer forensics bureau in the UK, joining an existing US facility. The IT security firm reports that only one in 50 "incident responses" it handled in recent months was a suspected inside job. And the accusation in that case was not substantiated, either.

So much for received wisdom, then. IT pros are a loyal honest bunch, after all. And that's the line we'll be sticking to, until companies start reporting in-house jobs to the police in meaningful numbers.

The point of entry of crackers into corporate networks is "almost always" Web server vulnerabilities, according to Bryan Sartin, director of technology at Ubizen. Often, attacks on financial institutions can be traced back to colleges and universities. Their substantial bandwidth resources and minimal security spend make them attractive targets in 'stepping stone' attacks. Launching assaults from university networks magnifies the power of attacks while helping crackers to cover their tracks.

In many cases, the source of hostile attacks can be traced to East European countries, Sartin says. In three investigations, Ubizen investigators have traced an attack to the same source IP address. Also the same cracking tools crop up time and again in forensic investigations.

Ubizen cites four main problem areas which leave corporates open to attack, namely: failure to check Web server and Intrusion Detection System logs; weak network level security (generally caused by poor network design); weak application level security; and failure to patch vulnerable systems.

Money is the primary motivation for most of the cybercrime which Ubizen investigates. "Mischief making" is also behind many attacks.

In its forensic work, Ubizen doesn't see much signs of hackers and virus writers (or spammers) working together. However, hackers frequently make use of sophisticated root kits; and Trojans and Sartin notes the increased use by crackers of "anti-forensics" - tools to modify logs and attempts to throw sysadmins off the scent by uploading MP3 files onto compromised machines. ®

Beginner's guide to SSL certificates

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.