• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Web Site Vulnerabilities Continue Unabated, IBM X-Force Says

    February 9, 2009 Alex Woodie

    Hackers last year continued to compromise commercial Web sites using well-known techniques like SQL injection, putting corporate data in danger, but also raising the likelihood that businesses will infect their own customers with Trojan horses and malware. This was the warning issued by security researchers at IBM‘s Internet Security Systems subsidiary, which published its security report for 2008 last week. One of the bright spots: spam decreased slightly following the shut down of a major distributor.

    In years past, the vast majority of security-related news and attention was related to Web browsers. Microsoft‘s Internet Explorer (IE), with a new security vulnerability popping up seemingly every other day, was vilified and ridiculed as a huge security liability. People moved in droves to alternatives like Mozilla‘s Firefox and Apple‘s Safari Web browsers, in the hopes of avoiding the viruses, worms, and other creepy-crawlies that could infect you via IE.

    While IE did have its share of security problems, its attractiveness among hackers was largely a result of IE’s dominating popularity. And when Microsoft finally took action to lock down IE, hackers had already moved on to greener fields. First, they moved up the stack to browser add-ons, like Flash and Acrobat. Then hackers ramped up their attacks on applications, including MS Office. But the focus remained on client-side vulnerabilities, as opposed to server-side problems.

    Now, the tide has shifted, according to ISS X-Force, and hackers are ramping up their attacks on popular Web sites, which are run on massive clusters of servers housed in data centers.

    The new trend has hackers utilizing vulnerabilities in Web application servers and Web middleware to snare large groups of visitors in a short amount of time. Once a popular Web site has been compromised, the hackers can easily re-direct victims to malicious Web sites of their choosing, where victims’ PCs are loaded with browser exploit toolkits that do the hackers’ bidding. The end result is horrible and predictable: identities are stolen, bank accounts are drained, and lives are devastated.

    Web application vulnerabilities–such as SQL injection, cross-site scripting, and file include vulnerabilities (most common in PHP apps)–grew to account for 54 percent of all vulnerabilities in 2008, according to ISS X-Force, which would make them easily the fastest growing class of security vulnerabilities. The biggest offender in the class was SQL injection, which grew 134 percent last year, the group says.

    Unfortunately, Web application vendors, as a whole, have not kept up with the spike in SQL injection techniques. Of all the security holes found in Web applications last year (nearly 4,000 them), 74 percent of them had no patch for the problem. That is, quite frankly, unacceptable.

    “It is staggering that we still see SQL injection attacks in widespread use without adequate patching almost 10 years after they were first disclosed,” says Kris Lamb, senior operations manager, X-Force Research and Development for IBM Internet Security Systems. “This is one of the oldest forms of mass attack still in existence today.”

    ISS X-Force could not determine why SQL injection attacks are spiking, but concluded that it’s likely a combination of several circumstances, including the widespread prevalence of vulnerabilities, stepped up research by hackers, and a lack of patches from the vendors. All in all, the Web application problem is the “Achilles’ heel of corporate IT security,” ISS X-Force says.

    The rate of discovery of all critical vulnerabilities continued its march upward in 2008, increasing 13.5 percent over the previous year, after slowing down in 2007. However, despite the increase in vulnerabilities, hackers were not exploiting them as often as they had in the past, ISS X-Force found.

    This led the company to question how the security industry responds to vulnerabilities, and suggest that a more nuanced approach–one that takes into account how much hackers could profit from a given vulnerability–into account. Currently, the Common Vulnerability Scoring System (CVSS) looks primarily at the technical aspects of vulnerabilities, and not the potential financial gain, ISS X-Force says.

    Security researchers logged a major victory against spam when the Silicon Valley Web hosting firm McColo was shut down last fall. The operations of McColo, which was actually a front for a huge spam operation, was brought to light as a result of the work of Washington Post reporter Brian Krebs to track down the source of spam.

    While bringing down the McColo operation resulted in an immediate drop in the amount of spam clogging the Internet’s byways, other operations picked up the slack to fill the void in spammy substances. ISS X-Force reports that China emerged as the number one spam provider immediately following McColo’s demise, but that Brazil claimed the top prize by the end of the year. Another BRIC country, Russia, was also a top spam generator for 2008 (India, where are you?), as was Turkey.

    The complete 106-page ISS X-Force report can be downloaded at www-935.ibm.com/services/us/iss/xforce/trendreports.

    RELATED STORIES

    Surf’s Up for Web-Based Organized Crime, IBM X-Force Says

    In Search Of a More Secure Internet

    IBM X-Force Says For-Profit Cyber Attacks to Increase in 2007



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 6 -- February 9, 2009

    Sponsored by
    DRV Tech

    Get More Out of Your IBM i

    With soaring costs, operational data is more critical than ever. IBM shops need faster, easier ways to distribute IBM applications-based data to users more efficiently, no matter where they are.

    The Problem:

    For Users, IBM Data Can Be Difficult to Get To

    IBM Applications generate reports as spooled files, originally designed to be printed. Often those reports are packed together with so much data it makes them difficult to read. Add to that hardcopy is a pain to distribute. User-friendly formats like Excel and PDF are better, offering sorting, searching, and easy portability but getting IBM reports into these formats can be tricky without the right tools.

    The Solution:

    IBM i Reports can easily be converted to easy to read and share formats like Excel and PDF and Delivered by Email

    Converting IBM i, iSeries, and AS400 reports into Excel and PDF is now a lot easier with SpoolFlex software by DRV Tech.  If you or your users are still doing this manually, think how much time is wasted dragging and reformatting to make a report readable. How much time would be saved if they were automatically formatted correctly and delivered to one or multiple recipients.

    SpoolFlex converts spooled files to Excel and PDF, automatically emailing them, and saving copies to network shared folders. SpoolFlex converts complex reports to Excel, removing unwanted headers, splitting large reports out for individual recipients, and delivering to users whether they are at the office or working from home.

    Watch our 2-minute video and see DRV’s powerful SpoolFlex software can solve your file conversion challenges.

    Watch Video

    DRV Tech

    www.drvtech.com

    866.378.3366

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Time Gobbling Tasks for a System Upgrade Linoma Refines Data Distribution Tasks with GoAnywhere 2.0

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 6

This Issue Sponsored By

    Table of Contents

    • Database Server/400, Anyone?
    • Who’s the Fool When it Comes to Training?
    • Google’s Love Affair with IBM’s Offspring
    • As I See It: If I Were Wise Enough, I Might Say. . .
    • Web Site Vulnerabilities Continue Unabated, IBM X-Force Says
    • Deconstructing and Rebuilding IBM’s Q4 Server Sales
    • Avnet Hit By Economic Downturn in Fiscal Q2
    • SAP Launches Business Suite 7, Reports 2008 Financials, and Cuts Jobs
    • Demand for BI is High Says, HiT Software
    • IBM Cuts Price of BladeCenter S SAS Module in Half

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Meet The Next Gen Of IBMers Helping To Build IBM i
    • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
    • Will Independent IBM i Clouds Survive PowerVS?
    • Now, IBM Is Jacking Up Hardware Maintenance Prices
    • IBM i PTF Guide, Volume 27, Number 24
    • Big Blue Raises IBM i License Transfer Fees, Other Prices
    • Keep The IBM i Youth Movement Going With More Training, Better Tools
    • Remain Begins Migrating DevOps Tools To VS Code
    • IBM Readies LTO-10 Tape Drives And Libraries
    • IBM i PTF Guide, Volume 27, Number 23

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle