Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

Four rising threats from cybercriminals

Nov 21 , 2011 | ITNews.com

Criminal hackers never sleep, it seems. Just when you think you've battened down the hatches and fully safeguarded yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or an errant signal designed to jam GPS receivers.

Whether you're protecting corporate data or simply trying to keep your personal files safe, these threats -- some rapidly growing, others still emerging -- put your systems at risk. Fortunately, security procedures and tools are available to help you win the fight.

1. Text-message malware

While smartphone viruses are still fairly rare, text-message attacks are becoming more common, according to Rodney Joffe, senior vice president and senior technologist at mobile messaging company Neustar and director of the Conficker Working Group, a coalition of security researchers that came together to fight the malware known as Conficker. PCs are fairly well protected today, he says, so some black-hat hackers are now targeting mobile devices. Their incentive is mostly financial: Text messaging provides a way to break into devices and make money.

Khoi Nguyen, group product manager for mobile security at Symantec, confirmed that text-message attacks aimed at smartphone operating systems are commonplace now that people are increasingly reliant on mobile devices. It's not just consumers who are at risk, he adds. Any employee who falls for a text-message ruse using a company smartphone can jeopardize the business's network and data and possibly cause a compliance violation.

"This is a similar type of attack as [is used on] a computer -- an SMS or MMS message that includes an attachment, disguised as a funny or sexy picture, which asks the user to open it," Nguyen explains. "Once they download the picture, it will install malware on the device. Once loaded, it would acquire access privileges, and it spreads through contacts on the phone, [who] would then get a message from that user."

In this way, says Joffe, hackers create botnets for sending text-message spam with links to a product the hacker is selling, usually charging you per message. In some cases, he adds, the malware even starts buying ring tones that are charged on your wireless bill, lining the pockets of the hacker selling the ring tones.

Wireless carriers say they do try to stave off the attacks. For instance, Verizon spokeswoman Brenda Raney says the company scans for known malware attacks, isolates them on the cellular network, and even works with federal crime units to block them.

To keep such malware off users' phones, Joffe recommends that businesses institute strict corporate policies limiting whom employees can text using company networks and phones, and what kind of work can be done via text messaging. Another option is a policy that prohibits text messaging entirely, at least until the industry figures out how to deal with the threats.

2. Hacking into smart grids

A common misconception is that only open networks -- say, corporate wireless LANs that visitors may use -- are hackable. Not true, says Justin Morehouse, a principal consultant at Stratum Security who spoke about network security at last year's DefCon hacker convention. Morehouse says it's actually not that difficult to find an access point for a so-called closed system.

Some nuclear plants and power grids have wireless networks that are vulnerable to attack. And supervisory control and data acquisition (SCADA) systems aren't safe either.

For example, the Stuxnet worm last year infected tens of thousands of Windows PCs running Siemens SCADA systems in manufacturing and utility companies, most notably in Iran. It was largely spread via infected USB flash drives. "Stuxnet proved that it is relatively simple to cause potentially catastrophic damage" to an industrial control network, says Neustar's Joffe.

According to Morehouse, another new attack point will be smart grids that use electronic metering to streamline power management. Utility companies around the world have begun testing and rolling out smart grids to homes and businesses. The technology, which can send data to and receive it from a central system, can also be very helpful for IT: You can open a console to see the power usage for one section of a building, for example.

But smart grids might be vulnerable to attacks that would allow nefarious hackers to cut off electricity at homes and businesses and wreak other kinds of havoc. One possible attack vector is a smart grid's communications infrastructure. For example, Morehouse says, a German utility company called Yello Strom uses a consumer smart grid system that works like a home automation kit -- the sensors report energy usage back to the central server via the user's home Wi-Fi network.

The most effective preventive measure, says Morehouse, is rigid isolation -- a smart grid should not touch any other network. Given the dangers that can arise if a hacker gains access to a smart grid, he says, companies should conduct penetration tests and make sure that firewalls in closed networks are secure. He advises using tools such as Core Impact and Metasploit.

3. Social network account spoofing

Users of Facebook, LinkedIn and other social networks are vulnerable to attacks that rely on account spoofing. A scammer poses as either someone you know or a friend of a friend, in order to fool you into revealing personal information. He then uses that information to gain access to your other accounts and eventually steal your identity.

In a typical exploit, says Joffe, someone contacts you on a site like Facebook or LinkedIn, pretending to be a friend of a friend or a co-worker of someone you trust. Then, this new "friend" contacts you directly through text message or email. The correspondence seems legitimate because you believe he has a connection with an individual you trust.

In another scenario, a scammer might impersonate someone you already know -- claiming to be an old friend from high school, for instance. Spoofers can find out your connections by following your public feeds or looking up the names of co-workers on sites like LinkedIn, where you've posted your work information.

Once the scammer has established a connection with you, he uses devious means to steal personal data, such as chatting online to find out the names of your family members, favorite bands, hobbies and other seemingly innocuous information. Then he uses that information to try to guess your passwords or answers to security questions for banking sites, webmail accounts or other online services.

Morehouse describes another type of attack that targets companies as well as individuals. The spoofer might set up a Facebook page that claims to be the official company page for, say, a major retailer. The spoofer might claim that the page is a formal method to contact the company or register complaints.

The page might offer fake coupons to entice people to join, and it soon goes viral as people share it with their friends. Once hundreds or thousands of users have joined the page, says Morehouse, the owner tricks them into giving out personal information, perhaps by signing up for additional coupons or special offers.

This ends up being a double attack: Consumers are harmed because their personal data is compromised, and the company is harmed because its customers now associate the fake Facebook page with the real company -- and decide not to buy from that company anymore.

Joffe says there is no way to prevent a criminal from setting up a fake Facebook page, but companies can use monitoring tools such as Social Mention to see how the company name is being used online. If an unauthorized page turns up, companies can ask the social network to remove the fake listing.

4. GPS jamming: Threat or nuisance?

An emerging criminal tactic -- interfering with GPS signals -- has security experts divided on just how harmful it could become.

Jamming a GPS signal at the source is next to impossible, says Phil Lieberman, founder of enterprise security vendor Lieberman Software. Blocking the radio signals that are broadcast from orbiting GPS satellites would require a massive countertransmission. And because the satellites are operated by the U.S. military, jamming them would be considered an act of war and a federal crime, says Lieberman.

However, it is easy to jam GPS receivers' using low-cost jamming devices like one sold by Brando. The devices jam a receiver by overloading it with a signal that's similar to the real GPS signal. The receiver then becomes confused because it can't find a steady satellite transmission.

Lieberman doesn't give much credence to fears about jammers disrupting airplanes or air traffic control systems, because those networks use a completely different GPS signal from the one we use in cars and handheld devices. Jamming could, however, be a potentially dangerous issue when it comes to financial records, he says, because GPS devices are used in the banking industry to add time stamps to financial transactions. Although completely blocking transactions would be difficult, Lieberman says, an industrious hacker could theoretically disrupt transactions and cause headaches for banks.

Security expert Roger Johnston, a systems engineer at the Argonne National Laboratory in Chicago, says spoofing GPS signals is the greater danger, explaining that GPS receivers are low-power devices that latch on to any strong signal. He says spoofing could be used for serious crimes -- tricking a delivery truck driver into turning down a dark alley, changing the time stamps on financial transactions, delaying emergency vehicles from finding their routes. There have been no reported cases of GPS spoofing to commit a criminal act, but Johnston warns that the government and businesses should work to deter such attacks.

Taking some extra precautions -- using strong encryption technology, engaging only with trusted friends on social networks, and using penetration testing software on corporate networks -- can alleviate some fears and help you sleep at night, even if the bad guys keep coming up with new exploits.

View more news

 
  Most Popular Articles
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/