The week in security: Biggest DDoS ever as piracy linked to malware

A vulnerability in Apple's password-reset functionality sent the company scrambling for a solution, adding two-factor authentication as the US Federal Trade Commission tightened the screws, to the approval of many security experts.

Apple also took a stab at the Yontoo browser plugin, updating its anti-malware system to block the wayward ad-injecting software. Also on the ad front, the online advertising industry took on Mozilla over its decision to block third-party cookies in a future Firefox release – claiming that it will see more ads shown to users.

New malware was targeting point-of-sale software, while also creating problems was a new version of TDL rootkit software, which uses some sneakiness to twist the Chromium Embedded Framework to its own nefarious purposes. And while a study of Melbourne-bought pirated software confirmed it's often a security breach waiting to happen, this sort of thing is happening so often that pirated software isn't the only guaranteed way to get malware: in a climate where many malware strains are proving unstoppable and antivirus software isn't keeping up with new malware, even major Web sites aren't completely free of interference from hackers.

Neither are their emails. With Westpac the latest to be hit by an email scam. Wells Fargo was copping its share of DDoS attacks, while antivirus researchers identified a targeted email attack against Android-using political activists.

Their phones, some warn, may prove to be a cornucopia of information: many smartphones keep traces of files that are stored in cloud-computing services even when they're not supposed to, confirming researchers' warnings that cloud storage services leak data like sieves. Little wonder: Android, researchers have advised, has a target on its back as it becomes the favoured mechanism for cyberattacks.

HP has launched a free service to test some mobile and Web apps for common security issues, while a Forrester Research report suggests that ever more-popular mobile device management (MDM) is a “ http://www.cso.com.au/article/457617/forrester_research_calls_mobile-device_management_heavy-handed_approach_/”>heavy-handed” approach to security that will change the way even laptops are managed.

With Android adware on the rise, it seems some people are willing to support an erosion of privacy in the name of better security. At Harvard University, however, email snooping has many concerned that the line will increasingly be crossed. Certainly, many gang-based cyberattackers are crossing that line – but system administrators can fight back with a number of IT security innovations.

In a week of escalating global security concerns, it was perhaps unsurprising that a NATO study found the Stuxnet malware attack on Iran was an "act of force", although it was held not to have had a serious enough impact to justify a response from Iran. But with enterprises running Java versions that are months out of date and most Java-enabled browsers vulnerable to common exploits and malware-detecting 'sandboxing' proving to be far from foolproof, those seeking to defend against the likes of Stuxnet must keep their wits about them.

The damage from such attacks isn't limited to the immediate results: data breaches can have long-term implications for companies in terms of financial impact and loss of customer trust. Little wonder the UK government is stepping up its defences, with a new cyber-crimes unit called Fusion Cell debuting to allow security experts to monitor cyber attacks in real time.

They would have had quite a show watching the DDoS attack against anti-malware firm Spamhaus, which was hit with what was reportedly the largest DDoS attack ever observed. The attack grew out of a spat between Spamhaus and a Dutch company it had blacklisted, causing delays across the Internet as hackers pummelled the site with 300Gbps of rubbish.

Authorities are still looking into that one, while some noted it highlights the dangers of open DNS servers and others were forecasting such 'mega DDoS' attacks were on the rise. In the meantime, however, a Wisconsin, US man was charged for participating in an Anonymous DDoS attack.

Follow @CSO_Australia and sign up to the CSO Australia newsletter.

Tags securityddos

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-2404

Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-2404

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.