Operations

6/13/2018
10:15 AM
100%
0%

Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks

Security is weak, and most companies are clueless, according to Immunity researcher Lurene Grenier, who kicked off the Cisco Talos Threat Research Summit on Sunday.

Your network is under attack, but you don't care. That was the message from Immunity researcher Lurene Grenier, who on Sunday kicked off the Cisco Talos Threat Research Summit, in Orlando, Fla.

"You are either not aware of what's going on or aren't taking all this seriously," she said.  

At the heart of Grenier's view of attackers is a set of three tiers:

  • Tier 1: Nation-state actors
  • Tier 2: Organized crime
  • Tier 3: lolsec and reverse hacktivism

She told the audience that dealing with tier 3 involves the kind of activity they're used to — pen testing, updating, and then continuing to pen test and update.

Tier 2 becomes more complex because many of the organized crime groups are either working on behalf of nation-states or reusing nation-state code. To have a chance of defending against tier 2 threats, Grenier said, your organization must do two things, one expensive and one difficult.

The expensive task is finding and hiring good security people. From there, give them time to understand your network, she said. "They need to know your network better than the attackers, and that's a tall order," Grenier explained.

Then comes the hard task: "Give them the clout to change what needs to be changed, and give them the resources to make the changes," Grenier said, noting that both involves a cultural shift for many organizations.

But that's easy compared with the shift required for coping with tier 1 attackers. Grenier hammered home the point that every organization must be prepared to deal with these most advanced threat actors.

"How can I convince you to care about this? This isn't a responsibility thing anymore — they won't tell you when they've owned you," Grenier said. "It's just that your IP will end up in another country."

Defending against this kind of attacker requires investment; Grenier offered a metric for how much a company should be prepared to invest. "How much do you pay your lawyers? You should be paying your security team at least as much," she said.

Then she recommended draconian segmentation. Most corporate computers, she said, have no business being on the Internet and should only be connected to an internal network without an internet gateway. What about the employees who need to update social media and check March Madness scores? "Give your employees an iPad," Grenier recommended.

One of the reasons Grenier's warnings seem so dire is that she has seen the layers of attacks that threat actors have at their disposal. "There are unpatchable bugs in everything you own and use. Every nation-state has multiple zero days on everything you own — probably three deep," she said.

Those vulnerabilities and exploits extend to mobile devices. The iPhone, Grenier said, is probably the most secure mobile device widely sold, and yet "there are probably 10 full iPhone [exploit] chains at any given time. And that's the most secure calling platform."

The real risk isn't in an attacker devastating your infrastructure, Grenier said, but in a nation-state-sponsored competitor beating you economically.

"What could you do, as someone negotiating a contract, if you had perfect knowledge of your competitor's plans, information, and projections?" she asked. "That's the situation everyone finds themselves in when they deal with a state capitalist."

Related Content:

 

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
6/13/2018 | 2:49:09 PM
Working in a real shop
I am honored to be working with a talented group of warfare professoinals at Fiserv - where we have a dedicated malware forensics and threat hunting group for the entire firm.  We are ACTIVE in finding incoming threats and monitoring over 11,000 systems for invasive anything, remediating and eliminating.  Almost unique in corporate America.  
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Why Password Management and Security Strategies Fall Short
Steve Zurier, Freelance Writer,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19270
PUBLISHED: 2018-11-14
In yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7, an out-of-bounds user space access in the read handler of the yurex USB device driver could be used by local attackers to crash the kernel or potentially escalate privileges.
CVE-2018-19271
PUBLISHED: 2018-11-14
Centreon 3.4.x allows SQL Injection via the main.php searchH parameter.
CVE-2018-19277
PUBLISHED: 2018-11-14
securityScan() in PHPOffice PhpSpreadsheet through 1.5.0 allows a bypass of protection mechanisms for XXE via UTF-7 encoding in a .xlsx file
CVE-2018-19186
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the route.php paymentMethod parameter.
CVE-2018-19187
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via an arbitrary parameter name or value that is mishandled in a success.php echo statement.