Web exploits threaten businesses

Lutz Blaeser, MD of Intact Security (image: LivDigital)
Lutz Blaeser, MD of Intact Security (image: LivDigital)
Lutz Blaeser, MD of Intact Security (image: LivDigital)

The Web is still the greatest attack surface and largest entry point for malicious code. These attacks usually happen via drive-by downloads, which see malware being downloaded and executed without the user even realising.

“These threats make use of exploits, or tools that find and use vulnerabilities in the target user’s system,” explains Lutz Blaeser, MD of Intact Software Distribution. “Unfortunately it is not only dubious Web sites that can infect users; today the vast majority of drive-by download attacks happen via legitimate and trusted sites.”

He says popular sites for news, lifestyle and specialist magazines, career sites, and daily newspapers most often fall victim. “Because these sites are legitimate, safe surfing behaviour is an ineffective measure against these attacks.  In addition, keeping your anti-malware protection up-to-date, although helpful, is no silver bullet. Of course making sure that all patches are installed and applied increases security, however, it is almost impossible to have a 100% up-to-date machine. Think of over a hundred patches, for a multitude of applications from several vendors, and even then you are assuming patches are issued almost instantly, which is not always the case.”

Over and above these myriad patches, you should bear in mind that many software packages are pre-installed by the vendor who manufactured the machine, he adds. “Because of this, the user is often completely in the dark, and has no idea that the software on his machine might be vulnerable. Moreover, because there are sometimes compatibility issues or an expired service it might also not be possible for any updates to be installed.”

He says experts say that approximately 40% of computers out there are vulnerable to exploits on the Internet. “In reality, however, there is no such thing as a totally secure computer that does not have any security holes. Each and every piece of software has vulnerabilities that have not yet been discovered, and therefore no patch will exist. These zero-day vulnerabilities are frequently exploited by cyber criminals who discover the vulnerability before the vendor does.”

Zero-day attacks are usually only identified by the software vendors after they have occurred. “The lack of a patch for this type of vulnerability presents an enormous threat to companies and individuals alike, as they can easily slip through the net of purely signature-based solutions until a patch is released. Their stealthy and unexpected nature is a serious concern, particularly as they can be employed in more serious, targeted attacks as well as the propagation of malicious code.”

He says to prevent falling foul of these attacks, good preventive security practices are essential. “This includes installing a firewall and rigidly maintaining its policies. In addition, keep anti-virus up-to-date, to block any harmful attachments and keep systems patched against all known threats. Add intrusion prevention to the security mix, and have well-thought out incident response measures in place just in case.”

Lutz Blaeser, MD of Inact Software Distribution