Is Security Software Broken?

omidomi

Level 71
Thread author
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
Forum Veteran
Apr 5, 2014
6,017
43,487
6,988
32
Fallout New Vegas :D
The threat landscape in 2016 is almost completely unrecognisable from that of ten years ago. Today’s landscape is populated by actors who are well resourced, highly determined and increasingly sophisticated, not to mention motivated by anything from ideology (hacktivists and cyber terrorists), geopolitical gain (state-sponsored hackers) or, most popularly, money. While there are still the worms and viruses of old popping up, most cyber criminals have all but abandoned these vectors in favour of more targeted, covert and successful attacks.

Targeted attacks and Advanced Persistent Threats (APTs) first surfaced publically in around 2010, when the so-called Operation Aurora attacks on Google and others foreshadowed the firm’s exit from China. Stuxnet quickly followed and suddenly the floodgates were open. Typically beginning with a “spear phishing” email or social media message using social engineering techniques, malware is the triggered to download onto the system. The malware will quietly load in the background without the user’s knowledge, escalating privileges inside the network until it finds the data it’s looking for. Attackers spend time researching their targets on the internet to hone their phishing lures, and are increasingly zeroing in on IT administrators, whose privileged accounts will give them unlimited access. They also spend time researching possible vulnerabilities on the system so that the malware can bypassing existing defences.

The cybercriminal underground that sits beneath all of this on the “Dark Web” of anonymisation networks like Tor and I2P and private forums is a immense, enigmatic beast. Estimates have put its size between 4-500 times the size of the “surface” web. There cybercriminals buy and sell stolen credit cards, identities, exploit kits and other attack tools which have democratized the ability to launch sophisticated targeted campaigns.

The fact that enterprises are now hugely more exposed to such threats through a flood of new vulnerabilities appearing every month, and through an explosion of new cloud services and applications, makes the bad guys’ jobs even easier. That organisations have to secure these increasingly complex environments with minimal budget is just the icing on the cake. Yet the stakes are higher than ever. The average cost of a data breach stood at $3.79m in 2015, up 23% in just two years. The repercussions are immense: loss of brand and shareholder value, damage to customer loyalty, legal costs, financial penalties, and remediation and clean-up costs to name but a few. Target claimed in Q2 2014 alone that losses related to its massive breach totalled $148m, a staggering amount but one that just begins to scratch the surface.
 
The cybercriminal underground that sits beneath all of this on the “Dark Web” of anonymisation networks like Tor and I2P and private forums is a immense, enigmatic beast. Estimates have put its size between 4-500 times the size of the “surface” web. There cybercriminals buy and sell stolen credit cards, identities, exploit kits and other attack tools which have democratized the ability to launch sophisticated targeted campaigns.

I can confirm that, most "top security products" are useless against APT or more advanced malware.
 
No, I don't wanna start a war. There is "group thinking" on this forum and I wanna let it the way it is :P. Do some research about the new Power Shell exploits and you will see some funny results ;)
 
  • Like
Reactions: Der.Reisende
Antivirus that rely too much on signatures, heuristics and generic detection is already a broken path.

Hello HIPS, BB, Virtualization, and policy based Executable program where we can see that no matter how threats came along on the web; its been proven to prevent everything as much as possible.

Of course the article holds the overall appearance of the security program which yes already broken, however very long time to produce another new techniques for faster response.
 
Nothing will protect you against APT.

If you are targeted, then your goose is already cooked.

People expect way too much out of their security softs.

If US national agencies with multi-million dollar IT budgets, the latest IT security and thousands of IT staff can't keep hackers and malwares of their systems, then how do you expect a puny home security soft to do so ?

This is another one of those things I see on the security forums that is just plain ridiculous.

Article after article of this or that malware or security breach breeds needless paranoia. It spreads like wildfire and the less informed users make all kinds of wrong decisions based upon false assumptions, lack of complete infos, and poor judgements.

Oh geez... I need to run Kaspersky, Bitdefender, DNS protection, IDS, Firewall, Web Filter, HIPS, Sandboxie, Anti-exectuable, File Reputation, AV scanner, Second Opinion Scanner, tweak the OS to the make, Software Restriction Policy soft, system cloaking device, Anti-exploit, Anti-Ransomware, Whitelist every command line,... blah, blah, blah... all on my puny, little home system.

User needs a cockpit with navigator to run their security config... after 4 years of college and 5 years of military operator training.
 
Last edited by a moderator:
  • Like
Reactions: LabZero and omidomi
About APT, since the target system is compromised, standard operating system tools are often used: Powershell and Cmd.exe for example.
The attackers have everything they need to continue their operations without the use of the most advanced malware.
This is the main problem.
 
  • Like
Reactions: frogboy