Story image

The Zero Day challenge

11 Jan 13

Just how lucrative is the internet crime market? Very; information is digital gold and hackers can get paid up to $200 per password.

Indeed, ‘Black hat’ hackers are becoming incredibly sophisticated at finding new vulnerabilities and exploiting them before the security community can react.

It can take less than a second to compromise a single machine and may take up to several days to come up with a patch.

Compromised machines aren’t just theoretical. They’re a reality. An entire underground economy has risen around compromised machines.

Access to ‘owned’ servers, services for launching phishing schemes, rental botnets for spam runs, and malware creation services are all advertised for a fee. These in turn support a marketplace for stolen identities, compromised bank accounts and credit card numbers.

Take, for example, the recent case of the Grum spam botnet that was eventually taken down in mid-July 2012.

This botnet housed over 136,000 internet addresses, could send up to 18 billion spam emails a day and by advertising rogue pharmacies and DHL delivery notifications, had collected up to 1.3 million orders with customer information on its control server .

To service this underground economy, the hacker isn’t usually after the data on the computer, but the computer itself and the ability to control it. It could be used as a platform for launching criminal attacks on other, higher-value computers.

It won’t happen to me....really?

Like many of us, you may also think, ‘this won’t happen to me’ or ‘why would they target me’?

Businesses and individuals who are complacent about their security constitute the bread and butter of the organised crime underworld.

Take for instance the recent security breach at the White House at the end of September 2012, where it was reported that hackers linked to China’s government has broken into a system used by White House military for nuclear commands.

In recent times, there have been a few notable zero day exploits, such as the serious new zero day vulnerability in the Internet Explorer (IE) in September 2012. A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.

There are zero days between the time the vulnerability is discovered and the first attack.

Meeting the Zero Day Challenge

A conventional reactive security stance, based on packet filters and signatures, is powerless against a new generation of sophisticated zero day attacks.

What’s required are two pillars: Application proxy firewalls and a multi-faceted detection strategy, termed ‘intelligent layered security’.

Understanding how these defenses work separately and in concert is the key to understanding how true zero day protection can be achieved.

Application Proxy Firewalls are designed to recognise good traffic, allow it, and block everything else. This approach blocks whole classes of attacks.

To obtain this level of protection, an application proxy firewall doesn't simply look at the packet as it flies by. It disassembles the packet, rebuilds and re-sends it. It’s called a ‘proxy’ because it handles the connections on behalf of the source and destination machines.

At the endpoints, the session proceeds as though each machine is communicating directly with the other. In fact, each is communicating with the firewall.

More on the proxy firewall

The critical security difference between a packet-based and application proxy firewall is understood by considering at the seven- layer OSI model.

A packet inspection firewall can only take action based on the first three layers of the model. By comparison, an application proxy firewall has the capability to inspect all seven layers and take action based on the topmost (application) layer, where most zero day threats reside.

The intelligent layered security approach allows a firewall to deliver the full zero day protection of an application proxy, with limited impact on network performance.

Depending on the port and protocol, only a few checks are needed for most packets.

While there are no automated tools or documented steps for cleanup after a zero day attack, the best defence against such attacks is ensuring that systems are tested within a Metasploit framework (an open source attack simulator) and using application proxy firewalls with intelligent layered security.

Red Hat names local APAC innovation award winners
ANZ Bank and NZ Customs Service were honoured as Red Hat Innovation Awards APAC 2018 Winners in A/NZ.
IP theft: A global issue catching NZ businesses off guard
“We have this incredible record of innovation in New Zealand. But our innovative businesses haven’t always been meticulous in shoring up their IP."
Why A/NZ organisations need to improve compliance protocols
Only a mere 4% of IT decision makers and data managers surveyed said their organisation faced no data management challenges. 
AWS tops all four global markets, APAC a unique case
The order of proceedings remains relatively the same in three of the four major regions for public cloud services providers, but the APAC market is bolstered by the prominence of China.
How artificial intelligence is transforming finance teams
"Organisations using cognitive ergonomics and system design in new AI projects will achieve long-term success four times more often than others.” 
Pure Storage launches new cloud data services
“Customers should be able to make infrastructure choices based on what’s best for their environment, not constrained by what the technology can do."
Is self-service BI living up to the hype?
the explosion of data available to a business and self-service BI tools is transforming how everyone works - but is self-service living up to expectations?
What the people say - Gartner’s November Customers’ Choices
A roundup of the latest Gartner Peer Insight Customers’ Choices from Backup and Recovery to Business Intelligence and Analytics, and more.