{"id":13002,"date":"2018-08-03T06:00:01","date_gmt":"2018-08-03T14:00:01","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/08\/03\/news-6769\/"},"modified":"2018-08-03T06:00:01","modified_gmt":"2018-08-03T14:00:01","slug":"news-6769","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/03\/news-6769\/","title":{"rendered":"Why Enterprises Still Have to Worry about Eavesdropping"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Fri, 03 Aug 2018 13:00:16 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-380x380.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"font-weight: 400\">When one thinks about eavesdropping, a mental image of a shadowy stranger, hiding behind a corner and listening in on others&#8217; conversations may come to mind. With the rise of VoIP calling, however, enterprises became aware of digital eavesdropping that impacted their corporate business calls.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Now, though, much of the concern surrounding eavesdropping has been replaced by worries about more recent cybercriminal strategies. At the same time, hackers haven&#8217;t forgotten about legacy attack styles &#8211; in fact, evidence shows that these are still very much in place and utilized today.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This can create a dangerous scenario in which businesses are so preoccupied by emerging threats that protections against older hacking strategies fall to the wayside. In the current threat landscape, cybercriminals utilize an array of attack strategies, both old and new, and enterprises must have varied defenses to safeguard their assets.<\/span><\/p>\n<p><b><i>VoIP under attack?<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400\">In the past, eavesdropping centered around SIP connections and VoIP calls and garnered considerable concerns on the part of enterprises. This is understandable, especially when one thinks about all the sensitive information discussed over one-on-one and conference calls.<\/span><\/p>\n<p><span style=\"font-weight: 400\">According to a report from EdgeWater Networks, while this style of attack is nothing new &#8211; eavesdropping through SIP protocols has been around since the early 2000s &#8211; <\/span><a href=\"https:\/\/www.edgewaternetworks.com\/blog\/sip-protocol-attacks-rise\"><span style=\"font-weight: 400\">hackers have been reviving the approach recently<\/span><\/a><span style=\"font-weight: 400\"> to snoop and steal data. Because many corporate SIP protocols don&#8217;t include adequate security, it&#8217;s a simple process for cybercriminals to leverage these weaknesses as entry points.<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8220;SIP is now the top target when it comes to VoIP protocols, comprising 51 percent of attacks.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8220;The reality is that the SIP protocol and the average company&#8217;s approach to securing it doesn&#8217;t take a hacking mastermind to exploit,&#8221; wrote EdgeWater Networks contributor Rosa Lear.<\/span><\/p>\n<p><span style=\"font-weight: 400\">What&#8217;s more, IBM Managed Services data showed that <\/span><a href=\"https:\/\/securityintelligence.com\/hello-youve-been-compromised-upward-attack-trend-targeting-voip-protocol-sip\/\"><span style=\"font-weight: 400\">SIP is now the top target<\/span><\/a><span style=\"font-weight: 400\"> when it comes to VoIP protocols, comprising 51 percent of attacks in 2016.<\/span><\/p>\n<p><b><i>Beyond VoIP: WiFi eavesdropping<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400\">While SIP attacks are still taking place &#8211; often due to a lack of proper security and weak passwords &#8211; this isn&#8217;t the only concern surrounding eavesdropping.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As Trend Micro Cyber Threat Researcher Jindrich Karasek pointed out, <\/span><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/security-101-protecting-wi-fi-networks-against-hacking-and-eavesdropping\"><span style=\"font-weight: 400\">WiFi networks aren&#8217;t immune to eavesdropping<\/span><\/a><span style=\"font-weight: 400\">. With more devices being connected than ever before, this can create a significant number of exploitable endpoints open to hackers.<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8220;Every device exposed to the internet could be a possible entry point for attackers. For example, if a surveillance camera doesn&#8217;t have encrypted traffic while it&#8217;s connected to a WiFi network, an attacker can snoop on the footage in a given environment,&#8221; Karasek wrote. &#8220;Wireless networks can be seen as inherently [insecure], potentially inviting unauthorized access by strangers who could pry into transmitted data. While various security protocols have been developed to protect wireless networks, weaknesses in the protocols themselves have cropped up over the years.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400\">Similar to weaknesses surrounding SIP that can enable hackers to eavesdrop within VoIP systems, WiFi protocols including the Wired Equivalent Privacy (WEP) encryption protocol have identified flaws as well. In 2001, researchers Scott Fluhrer, Itsik Mantin and Adi Shamir <\/span><a href=\"https:\/\/www.researchgate.net\/publication\/220332983_Practical_attacks_against_WEP_and_WPA\"><span style=\"font-weight: 400\">demonstrated how WEP could be leveraged<\/span><\/a><span style=\"font-weight: 400\"> to allow hackers to passively monitor and access network traffic. This approach later became known as the FMS attack.<\/span><\/p>\n<p><b><i>WiFi eavesdropping: Not a difficult feat for hackers<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400\">Adding to the issue here is the fact that these attacks are certainly not a challenge for today&#8217;s hackers to pull off. Simple equipment, including a wireless device armed with specific open-source and publicly available tools, alongside an adequate amount of network traffic, is all cybercriminals need.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As Fluhrer, Martin and Shamir explained, through passive monitoring of WEP traffic, hackers can view, in plaintext, the first few bytes of most packets. From here, they&#8217;re able to sniff enough packets to retrieve a password, and leverage these credentials to launch further attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8220;The shorter the password, the faster the decryption process,&#8221; Karasek noted. &#8220;For example, a short password like &#8216;hackm&#8217; can only take four minutes to decode.&#8221;<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-541786\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprise-Eavesdropping-Inline-Image.jpg\" alt=\"\" width=\"1000\" height=\"667\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprise-Eavesdropping-Inline-Image.jpg 1000w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprise-Eavesdropping-Inline-Image-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprise-Eavesdropping-Inline-Image-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprise-Eavesdropping-Inline-Image-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprise-Eavesdropping-Inline-Image-900x600.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprise-Eavesdropping-Inline-Image-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprise-Eavesdropping-Inline-Image-380x253.jpg 380w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p><i><span style=\"font-weight: 400\">Public and insecure wireless networks provide easy entry for cybercriminals&#8217; malicious eavesdropping.<\/span><\/i><\/p>\n<p><b><i>Scenarios that can open the door to malicious eavesdropping<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400\">How do you know if your organization is at possible risk of this type of attack? There are certain situations in which conditions are right for hackers to carry out this kind of malicious activity:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Weak endpoint passwords: As noted, weak passwords can all but provide a wide open door to hackers. With currently available tools supported by strategies like social engineering and brute force, it doesn&#8217;t take cybercriminals long to crack a simple or obvious password.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Default device settings: Default passwords and factory settings can be even worse. This includes both endpoint user devices and, in particular, routers. As IT Toolbox contributor Will Kelly pointed out, <\/span><a href=\"https:\/\/it.toolbox.com\/blogs\/voipdesk\/5-ways-to-combat-voip-eavesdropping-032117\"><span style=\"font-weight: 400\">default configurations should always be changed<\/span><\/a><span style=\"font-weight: 400\"> ahead of completing a deployment. This encompasses VoIP phones and all other endpoints connected to the network.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Branch offices: Organizations with branch locations &#8211; including banks and insurance providers &#8211; are at a particularly heightened risk for eavesdropping attacks. These remote locations are often the most disconnected with the core IT team, and, as a result, may not be completely compliant with the business&#8217;s network and security policies, making overall protection and necessary monitoring a challenge.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Open and insecure networks: Use of public WiFi networks, such as those available in coffee shops, airports and other areas can also provide the ideal setting for hackers to carry out eavesdropping and subsequent attacks.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400\">&#8220;An attacker can just pretend to sit and wait in a lobby, enjoy his coffee, and while away his time, or just use his phone while standing nearby,&#8221; Karasek described. &#8220;Footage check of security feeds would not help as the activity would look like normal browsing or the device could be hidden in a bag or otherwise obscured during the whole attack.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400\">While this individual may appear to be a normal bystander, he is actually eavesdropping on network activity, working to decode a weak password or monitor other traffic.<\/span><\/p>\n<p><b><i>Safeguarding against eavesdropping<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400\">Because eavesdropping is still taking place within legacy SIP connections as well as more updated WiFi and other network protocols, it&#8217;s important that all endpoints and entryways into the network are secure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This includes using more robust credentials as opposed to weak, simple passwords and default settings. In addition, firewalls and the establishment of virtual private networks should be put in place when appropriate.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Advanced solutions like <\/span><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/deep-security-data-center.html\"><span style=\"font-weight: 400\">Trend Micro Deep Security<\/span><\/a><span style=\"font-weight: 400\">, which can offer deep packet inspection and intrusion prevention, as well as <\/span><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/endpoint\/officescan.html\"><span style=\"font-weight: 400\">OfficeScan<\/span><\/a><span style=\"font-weight: 400\"> endpoint protection, can help ensure robust safeguarding against unauthorized activity.<\/span><\/p>\n<p><span style=\"font-weight: 400\">To find out more, connect with the experts at Trend Micro today.<\/span><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/why-enterprises-still-have-to-worry-about-eavesdropping\/\">Why Enterprises Still Have to Worry about Eavesdropping<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/why-enterprises-still-have-to-worry-about-eavesdropping\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Fri, 03 Aug 2018 13:00:16 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping-380x380.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/TM-Enterprises-Eavesdropping.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>When one thinks about eavesdropping, a mental image of a shadowy stranger, hiding behind a corner and listening in on others&#8217; conversations may come to mind. With the rise of VoIP calling, however, enterprises became aware of digital eavesdropping that impacted their corporate business calls. Now, though, much of the concern surrounding eavesdropping has been&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/why-enterprises-still-have-to-worry-about-eavesdropping\/\">Why Enterprises Still Have to Worry about Eavesdropping<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,12874,19126],"class_list":["post-13002","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-eavesdropping","tag-voip"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13002"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13002\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13002"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}