Antimalware to the Rescue
Total Page:16
File Type:pdf, Size:1020Kb
MARCH 2014 INFORMATION EDITOR’S DESK: AS MALWARE ADVANCES, SO MUST ECURITY ANTIMALWARE S Insider Edition DEFENSE PLANS FEATURE: PROTECTION FROM ADVANCED MALWARE: WHAT ANTIMALWARE WORKS BEST? TO THE RESCUE InfoSec pros know they must detect and repel advanced FEATURE: HOW malware—but TO PUMP UP YOUR do they know ANTIMALWARE how? DEFENSES EDITOR’S DESK As Malware Advances, So Must HOME EDITOR’S DESK Antimalware Defense Plans WHY YOU MUST Stomping out malware would be lots easier if it just sat still. This Insider REVAMP YOUR BY BRENDA L. HORRIGAN ANTIMALWARE Edition helps make the fight against it more fair. STRATEGY WHAT ADVANCED MALWARE PROTECTION WORKS BEST? PUMPING UP YOUR ANTIMALWARE DEFENSE T’S GETTING HARDER for IT security pros to identify, offers insights on how to best assess the antimalware much less stop, the bad stuff trying to break into products currently on the market, which must include their enterprise. Modern malware is a shape-shifter, a careful weighing of costs and benefits. Finally, Spyro continually changing as it tries to squeeze past the Malaspinas demonstrates how to pump up your antimal- malware protection an enterprise already has in ware arsenal with supplemental products and tactics. place. Lately it’s even grown octopus legs, reaching up to It’s a sad fact of the modern world that, even as more Ithe highest levels of corporate networks but also down enterprises come to depend on antimalware products, into the smartphone of the newest entry-level employee. that protection’s effectiveness is steadily declining. But Advanced malware and its hacker-creators are prob- this doesn’t mean antimalware efforts are for naught: ing your system defenses right now; a revamp of your en- Rather, like modern malware, your efforts must shift and terprise’s antimalware strategies and systems can’t wait. stretch to keep your enterprise security intact. n That’s the message of this Insider Edition, which opens with emerging-technology expert Lisa Phifer on why we must think and strategize differently in order to defeat BRENDA L. HORRIGAN is the associate managing editor for the malware. In part two, Pete Lindstrom of Spire Security Security Media Group. 2 INFORMATION SECURITY INSIDER EDITION / ANTIMALWARE n MARCH 2014 COVER STORY: REVAMP STRATEGY HOME REQUIRED: EDITOR’S DESK WHY YOU MUST A REVAMPED REVAMP YOUR ANTIMALWARE STRATEGY ANTIMALWARE WHAT ADVANCED WHILE IT CONTINUES to fight increasingly clever attacks MALWARE PROTECTION against on-site enterprise infrastructure, new malware is WORKS BEST? STRATEGY taking aim at lower-hanging fruit: under-secured smart- PUMPING UP YOUR Increasingly sophisticated phones, mobile applications, social media and other cloud ANTIMALWARE services. As workers make more extensive use of such DEFENSE malware can divert the perimeter-less platforms, they create rich targets that re- attention of IT departments quire new antimalware protection strategies to mitigate from low-level security gaps. these multifaceted new malware threats. Here’s why you need a Enterprises can defend themselves by understanding these new malware vectors, enforcing application poli- strategy that works on cies, implementing new device-resident and cloud-based all levels. antimalware techniques, and leveraging other security tools. FOLLOWING THE MONEY Far more than fame or hacktivism, the malware industry is driven by financial gain and drawn to low-cost, high- profit attacks. This has been repeatedly proven, as mal- ware migrated from floppy to USB drives, email to Web, By Lisa Phifer browser to PDF, abandoning old haunts to seek out more vulnerable monocultures. 3 INFORMATION SECURITY INSIDER EDITION / ANTIMALWARE n MARCH 2014 COVER STORY: REVAMP STRATEGY “As technology trends such as Web and mobile come development. Attackers are experimenting with what HOME to the forefront, that’s where malware refocuses,” says In- they can do, inside and outside the enterprise. We haven’t EDITOR’S DESK trepidus Group Principal Consultant Zach Lanier. “Mo- yet seen massive self-replicating mobile malware, but we bile convergence creates an interesting opportunity: one think that’s mostly because nobody has hit on a business WHY YOU MUST device that delivers [non-stop] network, Web, media and model for untargeted attacks, beyond toll fraud,” he says. REVAMP YOUR ANTIMALWARE application access. Because there are only so many play- Symantec tracked mobile malware monetization, in- STRATEGY ers—Apple, Google, the WebKit browser engine—a sin- cluding premium-rate SMS trojans, tracking spyware, WHAT ADVANCED gle bug can be leveraged to attack millions of users.” search engine poisoning, pay-per-install/click schemes, MALWARE PROTECTION In fact, cloud services like Google Apps “are a very repackaged adware, and identity theft. According to Prod- WORKS BEST? large data repository for a wide range of companies and uct Manager John Engels, “We used to see these for Sym- PUMPING UP YOUR people,” Cisco Senior Threat Researcher Mary Landes- bian. When iOS changed the landscape, Apple did a good ANTIMALWARE man says. “Rather than trying to penetrate one [business] job of building in [malware deterrents] such as sandbox- DEFENSE at a time, cloud is an avenue of attack to penetrate many. ing and AppStore review. Now Android is picking up Increased return on investment means making money where Symbian left off because it’s open, with alternative with less effort—cloud attacks are a natural progression distribution paths that are a recipe for more challenging of that.” malware.” Similar trends have been seen in malicious activity on LOOKING FOR LOOPHOLES: social networks such as Facebook. “[Social media] mal- MOBILE MALWARE AND SOCIAL MEDIA ware tends to be user-focused: looking to gain access to Size and popularity are not the only draws. Commingled the user’s account or credentials,” Cisco’s Landesman personal and business use, real-time communication, says. “Today’s biggest enterprise threats don’t evolve from bring-your-own consumerization, and little or no IT con- social networks, but at some point, those could morph trol combine to make any discovered vulnerabilities more into more targeted attacks.” readily exploitable. For now, social media attacks tend to be untargeted. Lookout Principal Engineer Tim Wyatt has examined M86 Security Labs reports that Facebook scams surged in thousands of mobile applications from Apple’s AppStore, recent years as attackers searched for new ways to con- Google’s Android market and unofficial markets. “We’re vince thousands to click on malicious links. From “like- still seeing the start-up phase of smartphone malware jacking” and “comment-jacking” to photo tagging and 4 INFORMATION SECURITY INSIDER EDITION / ANTIMALWARE n MARCH 2014 COVER STORY: REVAMP STRATEGY rogue applications, social engineering tricks snared users thousands of victims. Shortened links, trend tags, and HOME into pay-per-click or pay-per-install scams—some lead- direct messaging further increase the odds of following EDITOR’S DESK ing to malware like the Koobface botnet Trojan. Facebook tweets to malware. itself scans over a trillion clicks per day, blocking more As more businesses use Twitter to track industry WHY YOU MUST than 200 million posts and messages carrying malicious news and communicate with customers, associated risk is REVAMP YOUR ANTIMALWARE links. growing. Not only do less than one-quarter of enterprises STRATEGY block Twitter, but “companies cannot assume they don’t WHAT ADVANCED SOCIAL MEDIA SECURITY RISKS have a social networking presence,” Cisco’s Landesman MALWARE PROTECTION For IT groups scrambling to stop malware on so many says. “Nothing from a technology standpoint will solve WORKS BEST? different fronts, deciding which threats to tackle can be this. You’re better off having practices in place to deter- PUMPING UP YOUR a challenge. The best place to begin is by understanding mine what’s being said about your company and your ANTIMALWARE emerging malware: targeted platforms, exploited vulner- tone and action plan should a social networking crisis DEFENSE abilities, and jeopardized business assets. develop.” Such practices might involve rapidly detecting “Recently, the biggest threats have not attacked com- and reporting tweets that reference your brand but carry puters—they’ve attacked people,” says Symantec Security links leading to malware. Response Director Kevin Haley. “We’re seeing [email] Facebook too has been plagued by phishing attacks. spam drop as attackers move to social media. Factors in- However, Facebook tends to be more personal, result- clude shutdown of major botnets, growing ineffectiveness ing in individual rather than business risk. But millennial of spam, and natural migration to new vectors. Technol- expect to use Facebook and other social networks 24/7: ogy itself hasn’t changed that much; social engineering Over half of surveyed college students said they would not got better and toolkits made malware easier.” even consider taking a job with an employer that banned To date, social media malware has gotten the big- access. Rampant password reuse and bring-your-own de- gest bang by aiming at Facebook, Twitter, and YouTube. vices also mean credentials gleaned by Facebook malware For example, Twitter’s brevity, anonymity, and real-time could well play a role in corporate account break-ins. communication have fostered many hacks since 2007— some involving account compromise, others malware WORKFORCE AND MALWARE MOBILITY dissemination. The two are intertwined, as legitimate In fact, consumer mobile network attack rates are sky- and fraudulent top-followed accounts are used to phish rocketing, driven largely by employee-owned devices. 5 INFORMATION SECURITY INSIDER EDITION / ANTIMALWARE n MARCH 2014 COVER STORY: REVAMP STRATEGY According McAfee Senior Architect Igor Muttik, these four percent, compared to risk of clicking on a phishing HOME unmanaged smartphones and tablets pose real enterprise link at 36 percent. EDITOR’S DESK risk. Tim Armstrong, a researcher for Kaspersky, believes “Mobile devices are no longer just phones; they are a tipping point has been reached for Android malware.