Wednesday, Oct 20, 2010
HELSINKI — All network security equipment is facing a new kind of online attack, according to Finnish data security vendor Stonesoft.
The company said earlier this week that it has found a new threat category — advanced evasion techniques (AETs) — which simultaneously combine different evasions in several layers of networks and in the process, become invisible for security gear, such as a firewall.
"From the point of view of cybercriminals and hackers, advanced evasion techniques work like a master key to anywhere," said Klaus Majewski, business development chief at Stonesoft.
"Current protection against advanced evasion techniques is next to zero,” he said. “This is a new thing and there is no protection against it currently. It's unlikely that really any network security vendor is aware of such evasions.”
The problem with advanced evasion techniques — tools hackers often use to penetrate network security — is not just new attacks, but that AETs can create millions of combinations from a few dozen different evasions.
Tim Henning, ASACP’s vice president of technology, told XBIZ these evasion techniques are a form of a stealth attack, allowing attackers to bypass most firewalls and intrusion detection and prevention systems without being detected.
“Current security systems don’t have a defense against this,” Henning said. “Most networks have a vulnerability, so it sits there undetected until it finds a way to get into the network and deliver a virus.”
Henning said these evasions have global ramifications from a cyber attack to possibly affecting security, financial, banking networks and online vendors.
For online adult companies, Henning said hackers could grab all of a customer’s information, including credit card numbers and other sensitive material.
Henning urged network owners talk to their department that deals with security on their servers and take the following steps to best protect this kind of attack at the moment:
- Examine your current network
- Ensure your current network secondary defenses are adequate and up to date such as anti- virus and malware solutions. Examine a layered approach to network security if already not in place and if in place ensure it's adequate to best protect your network
- Be watchful for unexplained network events such as server crashes without an explanation being found for the event
- Contact the vendors of your current IDS/IPS (intrusion detection and prevention systems) such as firewalls and ask what they are doing to protect against AETs and what you can do to protect against it until a solution is found and implemented.
“People need to focus on secondary lines of defense,” he said. “If someone does get in, they have other security solutions in place to be able to prevent delivery of a virus.”
Stonesoft has alerted authorities about its findings and it thinks others have also likely found similar technologies.
This article can be found at http://www.xbiz.com/news/126520