Feeds

Cybercrime – it's the outsiders wot's to blame

Checking out the finances

  • alert
  • submit to reddit

Intelligent flash storage arrays

Outsiders are responsible for the vast majority of cybercrime attacks against companies.

So claims Ubizen, which last week set up a computer forensics bureau in the UK, joining an existing US facility. The IT security firm reports that only one in 50 "incident responses" it handled in recent months was a suspected inside job. And the accusation in that case was not substantiated, either.

So much for received wisdom, then. IT pros are a loyal honest bunch, after all. And that's the line we'll be sticking to, until companies start reporting in-house jobs to the police in meaningful numbers.

The point of entry of crackers into corporate networks is "almost always" Web server vulnerabilities, according to Bryan Sartin, director of technology at Ubizen. Often, attacks on financial institutions can be traced back to colleges and universities. Their substantial bandwidth resources and minimal security spend make them attractive targets in 'stepping stone' attacks. Launching assaults from university networks magnifies the power of attacks while helping crackers to cover their tracks.

In many cases, the source of hostile attacks can be traced to East European countries, Sartin says. In three investigations, Ubizen investigators have traced an attack to the same source IP address. Also the same cracking tools crop up time and again in forensic investigations.

Ubizen cites four main problem areas which leave corporates open to attack, namely: failure to check Web server and Intrusion Detection System logs; weak network level security (generally caused by poor network design); weak application level security; and failure to patch vulnerable systems.

Money is the primary motivation for most of the cybercrime which Ubizen investigates. "Mischief making" is also behind many attacks.

In its forensic work, Ubizen doesn't see much signs of hackers and virus writers (or spammers) working together. However, hackers frequently make use of sophisticated root kits; and Trojans and Sartin notes the increased use by crackers of "anti-forensics" - tools to modify logs and attempts to throw sysadmins off the scent by uploading MP3 files onto compromised machines. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.