19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 8: Network Infrastructure<br />

What you need to know about advanced malware<br />

Advanced malware (also known as advanced<br />

persistent threat or APT) has been all the rage<br />

lately. Such targeted attacks are highly sophisticated<br />

and extremely difficult to detect — that<br />

is, unless you have the proper controls and the<br />

network and/or host layers. I once worked on<br />

a project where a large enterprise was targeted<br />

by a Nation State (presumably because<br />

of the line of work the enterprise was in) and<br />

ended up having over 10,000 Windows servers<br />

and workstations infected by malware. The<br />

enterprise’s big box antivirus software was<br />

none the wiser. The project turned out to be<br />

an extensive exercise in incident response and<br />

forensics. The infection was traced back to a<br />

phishing attack that subsequently spread to all<br />

the systems while, at the same time, installing<br />

password-cracking tools to attempt to crack<br />

the local SAM file on each Windows machine.<br />

This advanced malware infection is just one of<br />

countless examples of new advanced malware<br />

that most organizations are not prepared to<br />

prevent. The obvious solution to prevent such<br />

attacks is to keep users from clicking malicious<br />

links and preventing malware from being<br />

“dropped” onto the system. That’s tough, if not<br />

impossible, to prevent. The next best thing is to<br />

use technology to your advantage. Advanced<br />

malware monitoring and threat protection tools<br />

such as Damballa Failsafe (www.damballa.<br />

com/solutions/damballa_fail<br />

safe.php), Next-Generation IPSs such as<br />

what’s offered by Sourcefire (www.source<br />

fire.com/security-technologies/<br />

network-security/next-generation-<br />

intrusion-prevention-system),<br />

and whitelisting technologies such as Bit9’s<br />

Parity Suite (www.bit9.com/products/<br />

bit9-parity-suite.php) that helps<br />

protect the host are a great way to fight this<br />

threat.<br />

The bottom line: Don’t underestimate the risk<br />

and power of targeted malware attacks.<br />

Here are some common DoS attacks that target an individual computer or<br />

network device:<br />

✓ SYN floods: The attacker floods a host with TCP SYN packets.<br />

✓ Ping of Death: The attacker sends IP packets that exceed the maximum<br />

length of 65,535 bytes, which can ultimately crash the TCP/IP stack on<br />

many operating systems.<br />

✓ WinNuke: This attack can disable networking on older Windows 95 and<br />

Windows NT computers.<br />

Distributed DoS (DDoS) attacks have an exponentially greater impact on their<br />

victims. One of the most famous was the DDoS attack against eBay, Yahoo!,<br />

CNN, and dozens of other websites by a hacker known as MafiaBoy. While<br />

updating this book to the third edition, there was a highly publicized DDoS<br />

attack against Twitter, Facebook, and other social media sites. The attack<br />

was apparently aimed at one user from Georgia (the former Soviet country,<br />

not the state where I live), but it affected everyone using these sites. I<br />

couldn’t tweet, and many of my friends and family members couldn’t see<br />

151

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!