Symantec was the victim of an attack where its source code for most major products protecting consumers and enterprises around the world was breached. This attack occurred in 2006 and the source code has been available to parties to leverage for attacking businesses, individuals, and governments since that time. Recently, by the accounts recorded so far, Anonymous gained access to this stolen source code and is now threatening to release it – either generally or for a fee to those who would find value in it.
The result of this has lead Symantec to state in their Security recommendations whitepaper to uninstall or disable the PC Anywhere application. This is a critical application for most, so such a recommendation is quite difficult.
There are a number of issues and risks that arise here that will likely be an ongoing list:
- The source code was lost in 2006, so one can infer that this attack vector and every install was at risk to this attack for the past 6 years
- The presence of source code being released does not in itself create an attack vector – example is how public cryptography is tested openly and the immense use of Open Source software. In this case though, the release progressively escalated the risk from “increased risk” to “uninstall” now risk
- Other major enterprise security applications were also stolen, do the same risks exist and are forth coming?
Symantec is an important security provider, as their systems are installed on a 100+ million end points globally and their PC Anywhere solution provides direct access to global companies.
Given the velocity of updates related to Symantec’s breach, I would offer for discussion the following takeaways:
- There is no silver bullet to be secure and solve this single breach issue in the customer’s of Symantec, so a process must be established
- Review the activity of your firewalls, behavioral analysis systems, and such systems to determine if you have been attacked through this attack vector … over the past 6 years (deep analysis of the Symantec application is in order – the “authorized and approved” connections activities, not just the failed attempts)
- Focus on your programs of complicating the intruder to your system – a great case here … if a malicious user had access to your network what could be done. This question should provide a substantial return in minimizing this type of breach of trust in the security model. Similar cases should include Microsoft remote tools, operating system, and other infrastructure high install base applications.
Below are references to the article, paper, and Symantec’s update page.
This impacts all secure environments – PCI and other systems that are depended upon. Perhaps the attack is not intended to modify or damage a system, but for corporate espionage and such. Strong practices and a aggressive risk assessment review cycle is in order – such as ISO 27001 ISMS (done correctly and maturely).
Posted in IT Controls, PCI DSS
Tagged 2012, best practices, Compliance, cyber espionage, cybersecurity, data breaches, forensics, indian cyber, it compliance and controls, IT Controls, james deluccia, pci, PCI DSS, rsa, Security, symantec
The 2010 survey is complete and I have dug through and have the following thoughts to offer. First off though – thank you to Symantec for making the information so readily available. They have provided the slides via slideshare, the PDF report, and the press release. My efforts below are not to reproduce the report, but instead to carry the ideas and findings one step further. In addition, my hopeful final goal is to challenge the report and certain aspects of the findings in the spirit of relative context.
“Enterprise security is IT’s top concern” – when compared to the other options listed in the survey I do not find this impressive, as digital threats are the most direct concerns. On page 5 of the report though the detail about 94% of businesses expect to change their cyber security efforts and 48% are planning major changes is impressive. That highlights the intelligent repositioning of enterprises and the continued focus on remaining engaged with the threats and not passive. This also likely has correlation to businesses increased focus on deploying greater information technology throughout the business, and throughout the expanding consumer / business markets. Major changes are a natural result in these cases.
“Enterprises experiencing frequent attacks” – 75% of business experienced a cyber attack within the past 12 months is a significant figure. If a cyber attack is considered an event that “activates” the incident response teams and / or forensic groups that is a significant cost and concern. Attacks, as every firewall administrator and Grandmother who gets a virus, occur non-stop online, so it is important to qualify and scale these attacks by crtiicality. This is an important fact in the survey, but more important in the enterprise. The help desk of most organizations is ably suited to respond to malware infections and queuing systems for remote desktop configuration refreshes. For situations that involve a lose of trust for a specific system resulting from extended malware infection, odd behavior, or log evidence of unauthorized access – these systems should activate the appropriate resources to address these risks directly.
Most problematic IT initiatives from a Security standpoint:
- Server Virtualization
- Endpoint virtualization
The common thread of these initiatives is the abstract nature of the actual computing system. Whether virtual or processed within a distributed computing environment the necessity to translate information security safeguards is not automatic. In fact, most conversions into these initiatives highlights the inherent weaknesses that are present in the existing infrastructure, but were addressed through compensated / ad-hoc controls. Therefore, while difficult the net risk posture will improve. Another perspective is the organizational shift that occurs when network/system operators become service delivery specialists. This cultural swing away from computing system management to application procurement and service management requires careful attention, training, and tight feedback cycles.
The report concludes with some strategic recommendations that are worth reviewing and confirming are currently in operation.
Overall the statistics and findings are in-line with concerns and challenges enterprises have been addressing last year. The survey provides a nice update and is certainly useful. As in any survey, consider the source and recognize that your environment is unique. Such individuality of computing systems by its very nature requires a custom and reflective approach to managing risk and security within the organization.
Posted in Compliance
Tagged 2010, cloud computing, cloud practices, Compliance, hipaa, hitech, it compliance and controls, IT Controls, pci, PCI DSS, Security, sox, survey, symantec, virtualization