Businesses overlooking biggest security risks

Companies are looking in the wrong places to defend against online attacks, according to security training organization Sans.
Written by Manek Dubash, Contributor

Organizations are finding it difficult to prioritize defense strategies against cyberattacks because most of them do not have an Internet-wide view of the attacks, according to a report from Sans, the security training organization.

As a result, two security risks--Web applications and phishing--carry the greatest potential for damage, yet users instead tend to concentrate on less-critical risks.

The report, published by security training organization Sans, amalgamates global data from security attacks on computers from March 2009 to August 2009.

It identifies two main defense priorities for enterprise users. The first is targeted e-mail attacks, or spear phishing, that exploit client-side vulnerabilities in programs such as Adobe's PDF Reader and Flash, Apple QuickTime and Microsoft Office. These applications are described as "the primary initial infection vector used to compromise computers that have Internet access", and are the result of attackers taking advantage of "programming errors that are not being picked up by common vulnerability scanners".

The second priority is vulnerable Web sites. More than 60 percent of attacks are against Web applications and "convert trusted Web sites into malicious Web sites serving content that contains client-side exploits" by exploiting the most common vulnerabilities such as SQL injection and cross-site scripting flaws, in both open source and custom-built applications. Such vulnerabilities make up more than 80 percent of attack opportunities.

A further finding is that applications are now more vulnerable and see more exploitation attacks than operating systems. There were no new major operating system worms seen in the wild during the reporting period.

Additionally, the report found there has been "a significant increase" over the past three years in the number of people discovering zero-day vulnerabilities flaws that become known to attackers before they are discovered by security researchers, opening the chance of an attack against which no preparation has been made.

A Sans spokesman said: "This report is different from anything we have done before because it reflects massive amounts of data on the actual attacks [millions of them] and on the speed with which the underlying vulnerabilities are being patched [actual data from thousands of companies]."

The report sources includes attack data from 6,000 organizations, compiled by security hardware vendor TippingPoint, vulnerability data from nine million computers compiled by security software vendor Qualys, and additional analysis and tutorial by the Internet Storm Center and Sans faculty members.

Editorial standards