Page 75 - Cyber Defense eMagazine - September 2017
P. 75

The Race to Claim Victory over Malware

               Whenever  there  is  a  major  cyber  security  incident  (about  every  week  these  days)  the  race
               begins  for  the  security  and  software  industries:  name  the  malware  (ideally  with  a  cool  and
               threatening sounding name), create signatures, patch the newly discovered vulnerabilities, and
               push the patches out to customers as quickly as possible. At that point, security and software
               vendors  like  to  pat  themselves  on  the  back,  and  announce  publicly  how  sophisticated  their
               defenses are because “we caught this one…”.

               But the reality is that most malware damage happens in the days or weeks before this public
               frenzy begins, and when a patch is finally released, it may be weeks, months, or never, before it
               has been implemented by most customers. As we saw with WannaCry, months after Microsoft
               had released a patch to its SMBv1 vulnerability, a shocking number of servers globally were
               unpatched and exposed.

               Even more troubling is that the NSA knew about this vulnerability since at least 2013 (when the
               EternalBlue  toolkit  was  put  together  to  exploit  it),  and  other  nation-state  attackers  may  have
               been exploiting this since 2001, when Windows XP was first released with the vulnerability.

               Protecting Unpatched Systems in the Real World

               Rather than continuing to focus on “best practices” that in reality are often avoided or viewed as
               a liability, it’s time to look for security solutions that accept the piece-meal nature of complex
               networks and legacy systems, but still apply effective security across the boards. The holy grail
               for many security professionals is to have protection that can be applied to systems as they are
               – old or new, patched or unpatched. But, in order for this to happen, there has to be a paradigm
               shift in security thinking.

               For  the  past  25+  years,  most  security  has  been  built  around  a  perimeter  mindset.  The  old
               security adage has been “keep the good stuff in, and keep the bad guys out”. The primary tools
               for this battle were gateway security devices, like firewalls (including IDS/IPS, next-gen firewalls,
               and  web  application  firewalls),  and  growing  lists  of  known  vulnerabilities  used  for  virus
               signatures  and  pattern  matching  to  detect  recurring  malware.  These  gateway  and  list
               approaches  may  have  eliminated  repetitive,  static  threats,  but  they  have  not  kept  up  with
               innovative  and  resourceful  full  hackers  that  are  continually  devising  new  ways  to  elude
               conventional defenses.

               The  latest  wave  of  fileless  memory-based  attacks  are  effectively  invisible  to  conventional
               security  controls.  They  manipulate  legitimate  application  processes  to  corrupt  memory,  and
               hijack control over systems to steal or ransom data, or merely cause painful disruption. Even in
               a mythical world where all servers were immediately patched, these new class of threats would
               fly under the radar of most security tools.

               Because it’s impossible to anticipate and prepare for the infinite amount of unknown and future
               threats, and patching is always slow and reactive, there is a new approach that is garnering
               interest, especially in the ICS space, where legacy systems are a fact of life. Rather than focus
               on  external  threats,  or  holding  together  the  disappearing  network  perimeter,  a  new  class  of


                    75   Cyber Defense eMagazine – September 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   70   71   72   73   74   75   76   77   78   79   80