Friday, August 12, 2005

Spyware Targets Businesses

This message contains graphics. If you do not see the graphics, click here to view.
To make sure our email updates are delivered to your inbox, please add newsletter@secureworks.com to your email Address Book. This email was sent to security.world@gmail.com.

August 2005

Spyware authors target businesses
New attacks bypass firewalls to steal identities, drain resources

By Nick Smith, Editor

A couple of months back we told you about ransomware, a new form of spyware that injects websites with malicious code, scans infected PCs for critical files, encrypts them, and then demands a ransom for their decryption.  It was just the latest example of the continuous evolution of spyware attacks � and another good reason for customers to shy away from Internet banking (and e-commerce in general).  


 

Well, it�s happening again.  Now spyware authors are creating code that bypasses anti-virus and firewall configurations, enabling hackers to monitor keystrokes and collect user information directly from corporate networks.  And the result is not just the loss of confidential information, but the draining of system resources and productivity, the creation of more spam, and even the generation of Denial of Service attacks against other businesses � from your system.

How are they doing it?

It�s just one method in an ever-increasing arsenal available to spyware authors, whose tactics are growing in sophistication as they team up with spam artists and botnet lords to steal identities and corporate assets on a larger scale than ever before.  The methods vary--from the annoying, such as popup generators and browser hijackers (which replace your home page with that of a spy site), to the downright malicious, such as keyloggers and drive-by downloading, in which users automatically download spyware by visiting certain sites.  And then there are the search hijackers, which generate results from fraudulent search engines to lead users to illegitimate, spyware-driven sites.  We�ll be looking at these methods (and their countermeasures) in detail in an upcoming white paper that we�ll include in next month�s newsletter.

How can you protect yourself?

1. Intrusion prevention at the network level is the best way to prevent spyware from circumventing your organization�s firewall.
2. Conduct regular vulnerability scans.  New vulnerabilities crop up daily, so once a year scans are not enough.
3.

4.



5.

Switch from Internet Explorer to an alternate browser such as Mozilla's Firefox.
Tighten acceptable use policies for web browsing, email use, IM, and downloading attachments. Prohibit P2P programs like Kazaa, and allow the downloading of reputable search toolbars (e.g., Google, Yahoo) only.
You can use open source programs to supplement your defenses.  Ad-Aware and Spybot Search & Destroy are both free and work like virus scanners.  If you choose to go this route, though, remember two things: you'll have to do it yourself, and you won't have the technical support. 

 

Resources

The FDIC�s recent Financial Institution Letter (FiL) on spyware is essential guidance on the spyware threat.   Check it out here.

  Back to Top
News Roundup

Are your ATM machines secure?  Up to 50% of them aren�t, according to a new Gartner report, opening the way for identity thieves to use account information gained in phishing scams to create counterfeit cards and download huge sums � to the tune of $2.75 billion last year alone.  How is this happening?  Because up to half of ATM machines fail to check the security code in the magnetic stripes on credit cards, leaving banks and credit unions with high withdrawal limits especially vulnerable.  Find out what you can do about it.   

Hackers spear-phish corporate insiders.  We�re all used to mass phishing emails, in which hackers manipulate unsuspecting users into divulging confidential information.  Now phishers are adding to their arsenal by personalizing their emails and targeting specific employees at organizations in attempts to gain access to corporate data.  How are they doing it?  By finding employee information on corporate directories or websites, tailoring the emails to look like (or actually contain) legitimate corporate documents, and then manipulating the users to divulge usernames and passwords on faked extranet sites � or to click on attachments injected with malicious keylogging code (crimeware). How can you defend yourself? 

 

 

Speaking of crimeware, this new breed of phishing appears to be overtaking the traditional social engineering email as the primary vehicle phishers use to steal identities.  The latest Anti-Phishing Working Group report shows that the number of phishing-related Trojans that plant keyloggers to monitor and record access to online accounts has doubled in the last month � more evidence that phishers are adapting quicker than preventative countermeasures.  Read the report.  Read the report. 

Exploring a brave new world?  With users deserting Internet Explorer in droves for alternate browsers such as Firefox, Microsoft hopes to salvage its dominant position in the market with a new version featuring much of the functionality of its competitors.  Internet Explorer 7, now in Beta (it will be available to the public in 2006), features tabbed browsing, improved security, and a phishing filter feature that alerts users when they visit suspicious sites.  But are the changes enough to stem the tide of fleeing IE refugees? Check out the early review here.

TABLE OF CONTENTS
Spyware authors target businesses
News Roundup
Webcast Alert!
Tradeshows and Conferences
Webcast Alert!

Shhh! That�s classified! How to keep your email confidential.
Tuesday, August 16th, at 3 PM Eastern Time

Defining your company's policy on sensitive email is easy - but as everyone knows, the challenge comes with enforcement and prevention of leakage.  Learn how to prevent sensitive information from leaving your network, before it�s too late.

Heavy metal: when bad firewalls rock your hospital
Wednesday, August 31st , 3PM Eastern Time
Many organizations think they're secure just because they have a firewall in place. But a firewall that's incorrectly configured or ineffectively managed is just another piece of iron on your network: heavy metal that leaves you banging your head against the wall. Find out more here. 

Are you missing the boat?  As a newsletter subscriber, you receive timely updates about Internet security every month.  But you might be missing out on our other informative and educational resources.  It�s easy to fix that problem.  Just update your profile to receive webcast invitations, white papers, or email advisories here.

Tradeshows and
Conferences

August 18-20
Community Bankers Association of Ohio: Annual Convention
Toledo, OH 

September 9-12 Pennsylvania Association of Community Bankers Annual Convention Banff
Alberta, Canada 

September 12-15
S1 Catalyst
Tucson, AZ

September 12-13
Western Independent Bankers Technology Summit
Reno, NV

September 14-16 
Michigan Association of Community Bankers Annual Convention
Traverse City, MI

September 22-24
Community Bankers Association of Indiana Annual Convention  
Indianapolis, IN

September 25-27 
IBAT: Annual Convention
Lake Grapevine, TX

 
 
 
Forward to a Colleague
 
11 Executive Park Dr. Atlanta, GA 30329  |  tel 877.905.6661  |  fax 404.728.0144
Join List   Unsubscribe   Privacy Policy � Copyright 2005, SecureWorks, Inc

No comments:

Post a Comment