{"id":6572,"date":"2017-02-09T10:50:29","date_gmt":"2017-02-09T18:50:29","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/09\/news-396\/"},"modified":"2017-02-09T10:50:29","modified_gmt":"2017-02-09T18:50:29","slug":"news-396","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/02\/09\/news-396\/","title":{"rendered":"RSA 2017:  how the hackers and rogue states use exploits to bypass security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"32937\" data-permalink=\"https:\/\/blogs.sophos.com\/2017\/02\/09\/rsa-2017-how-the-hackers-and-rogue-states-use-exploits-to-bypass-security\/screen-shot-2017-02-09-at-12-42-39\/#main\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2017\/02\/screen-shot-2017-02-09-at-12-42-39.png\" data-orig-size=\"402,404\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"screen-shot-2017-02-09-at-12-42-39\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2017\/02\/screen-shot-2017-02-09-at-12-42-39.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2017\/02\/screen-shot-2017-02-09-at-12-42-39.png?w=402\" class=\"alignleft size-thumbnail wp-image-32937\" src=\"https:\/\/sophos.files.wordpress.com\/2017\/02\/screen-shot-2017-02-09-at-12-42-39.png?w=150&#038;h=150\" alt=\"screen-shot-2017-02-09-at-12-42-39\" width=\"150\" height=\"150\" srcset=\"https:\/\/sophos.files.wordpress.com\/2017\/02\/screen-shot-2017-02-09-at-12-42-39.png?w=150&amp;h=150 150w, https:\/\/sophos.files.wordpress.com\/2017\/02\/screen-shot-2017-02-09-at-12-42-39.png?w=300&amp;h=300 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Ahead of his talk at <a href=\"https:\/\/secure2.sophos.com\/en-us\/company\/events\/northsouthamerica\/rsa-conference\/13-february-2017.aspx?cmp=70130000001xKqzAAE\">RSA Conference 2017<\/a> next week, we chatted to Mark Loman, Sophos&#8217;s Director of Engineering for next-generation tech.<\/p>\n<p>Mark gave us a preview of <a href=\"https:\/\/www.rsaconference.com\/events\/us17\/agenda\/sessions\/7312-How-Nation-States-and-Criminal-Syndicates-Use-Exploits-to-Bypass-Security\" rel=\"no follow\">his talk<\/a>, which you can catch on Tuesday,\u00a0February 14 from 3:45-4:30 pm in room 132, Moscone North.<\/p>\n<p><span id=\"more-32930\"><\/span><\/p>\n<p>He will be delving into how nation-state attackers craft their attack code to evade the most advanced security products.<\/p>\n<p class=\"p1\"><strong><span class=\"s1\">Q: Why did you choose to talk about exploits?\u00a0<\/span><\/strong><\/p>\n<p class=\"p1\"><span class=\"s1\">Loman: Many security vendors use phrases like &#8220;protection against zero-days&#8221; and &#8220;<a href=\"https:\/\/blogs.sophos.com\/2016\/09\/26\/what-is-an-exploit\/\">exploit attacks<\/a>&#8220;, but actually, they&#8217;re making promises they can&#8217;t keep. They only make them so analysts don\u2019t leave them out. But the security industry is already seen to be failing and false claims only make that worse. They don&#8217;t see the wood for the trees. So I chose my topic to show real-world existing attack schemes, why protection methods fail and show new defensive technology that is more capable.<\/span><\/p>\n<p class=\"p1\"><strong><span class=\"s1\">We\u2019ve seen a lot of cases where exploits target zero-day vulnerabilities.\u00a0Some vendors fix them quickly. Others sit on the flaws for longer than they should. How do we get a better patch response time from them?<\/span><\/strong><\/p>\n<p class=\"p2\"><span class=\"s1\">In my talk I&#8217;ll be showing that attackers have been silently leveraging vulnerabilities for years without being detected. Even when they are detected, I don\u2019t see software companies improving their response time for patching vulnerabilities. Patching software and sending out an update takes time. Even when the update is available, organizations don\u2019t patch immediately or automatically out of fear they&#8217;ll break business operations. As is the case with Adobe Flash Player, this software is dropped industry-wide because it is vulnerable beyond repair \u2013 even though several mitigation techniques have been added in the last two years.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Microsoft is adding exploit mitigations to Windows 10 and its development tools, so software developers can opt in and automatically leverage these capabilities. But it will take many, many years before organizations have deployed a new operating system and before all applications they use have better built-in protection against exploitation. But by then, skilled attackers will have\u00a0found new techniques.\u00a0<\/span><\/p>\n<p class=\"p1\"><strong><span class=\"s1\">What&#8217;s the single most important topic people should be discussing next\u00a0week?<\/span><\/strong><\/p>\n<p class=\"p2\"><span class=\"s1\">I think hardening of systems &#8211; PCs and <a href=\"https:\/\/blogs.sophos.com\/2016\/03\/21\/whats-next-for-the-internet-of-things\/\">IoT<\/a> devices &#8211; is the topic to discuss. The RSA conference is about security, but the companies that should work most on security are not the ones who are there. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">All software developers and device manufacturers should put security first. They should think about potential abuse of products in every step of the product design and development process. Since this requires a change in mindset, change is not coming in the foreseeable future. That is why, with <a href=\"https:\/\/www.sophos.com\/en-us\/products\/intercept-x.aspx?cmp=701j0000001ZsWBAA0\">Intercept X<\/a>, Sophos introduces new technology to shield both outdated and up-to-date internet-facing software against vulnerability exploits on endpoints \u2013 no need to wait for new operating systems or software updates.<\/span><\/p>\n<p class=\"p1\"><strong><span class=\"s1\">One of your slides looks at the proliferation of exploit kits, including\u00a0Magnitude EK and\u00a0Bizarro\u00a0Sundown EK. Some kits\u00a0\u2014\u00a0like Angler and Nuclear\u00a0\u2014\u00a0have shut down. Is it that we\u2019re getting better at finding and stopping these, or is it just that they are treated as disposable tools by the bad guys, since it\u2019s so easy to build a new kit?<\/span><\/strong><\/p>\n<p class=\"p2\"><span class=\"s1\">The Russian gang behind the Angler exploit kit got careless with their Lurk banking Trojan, attacking fellow Russians, and got arrested by the Russians. For a time it was a mystery why the Angler exploit kit disappeared but it became clear that the demise of the kit was an unexpected side-effect with the arrest of the Lurk gang.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">But cybercriminals in one country can disrupt system on the other side of the planet, while law enforcement is limited to local jurisdiction and agreements with other countries. It takes a lot of effort to take out criminals in another country. The information security industry and law enforcement have joint successes but with the increasing amount of malware and attacks on the web every day, it is clear there is still a lot to be done.<\/span><\/p>\n<p class=\"p1\"><strong><span class=\"s1\">You use Fancy Bear as an example of an attack operation with Russian ties, and it comes as there\u2019s a lot of speculation and finger-pointing over Russian involvement in attacking America. Is Russia getting enough focus from the security community, too much or not enough?<\/span><\/strong><\/p>\n<p class=\"p2\"><span class=\"s1\">Attribution is a big problem in information security. It is very hard to come up with the evidence when attacks are staged from hacked computers from other people, often in different countries. Keeping an eye on attacks, their targets and logging the associated details and samples will eventually result in good confidence where attackers are coming from. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">There are not many in the security community who know when they deal with a nation-state attack, so sharing every bit of information publicly will result in more confident attribution to help hold even a foreign government accountable.<\/span><\/p>\n<p>Catch Mark and the rest of the team at Booth 3201 for demos, giveaways and plenty of security advice. And, don&#8217;t forget to register for <a href=\"https:\/\/secure2.sophos.com\/en-us\/company\/events\/northsouthamerica\/rsa-conference\/13-february-2017.aspx?cmp=70130000001xIObAAM\">FREE expo pass<\/a>.<\/p>\n<p><a href=\"https:\/\/secure2.sophos.com\/en-us\/company\/events\/northsouthamerica\/rsa-conference\/13-february-2017.aspx?cmp=70130000001xIObAAM\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"32875\" data-permalink=\"https:\/\/blogs.sophos.com\/2017\/01\/25\/introducing-sophos-phish-threat-the-worlds-easiest-to-use-attack-simulator\/screen-shot-2017-01-25-at-16-59-13\/#main\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-16-59-13.png\" data-orig-size=\"1726,600\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"RSA 2017\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-16-59-13.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-16-59-13.png?w=640&#038;h=222\" class=\"aligncenter size-large wp-image-32875\" src=\"https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-16-59-13.png?w=640&#038;h=222\" alt=\"RSA 2017\" width=\"640\" height=\"222\" srcset=\"https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-16-59-13.png?w=640&amp;h=222 640w, https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-16-59-13.png?w=1277&amp;h=444 1277w, https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-16-59-13.png?w=150&amp;h=52 150w, https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-16-59-13.png?w=300&amp;h=104 300w, https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-16-59-13.png?w=768&amp;h=267 768w, https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-16-59-13.png?w=1024&amp;h=356 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Filed under: <a href='https:\/\/blogs.sophos.com\/category\/corporate\/'>Corporate<\/a>, <a href='https:\/\/blogs.sophos.com\/category\/events\/'>Events<\/a> Tagged: <a href='https:\/\/blogs.sophos.com\/tag\/exploit-kits\/'>Exploit kits<\/a>, <a href='https:\/\/blogs.sophos.com\/tag\/fancy-bear\/'>Fancy Bear<\/a>, <a href='https:\/\/blogs.sophos.com\/tag\/mark-loman\/'>Mark Loman<\/a>, <a href='https:\/\/blogs.sophos.com\/tag\/rsa-conference-2017\/'>RSA Conference 2017<\/a> <br \/><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/ORTEloAaQhE\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ahead of his talk at RSA Conference 2017 next week, we chatted to Mark Loman, Sophos&#8217;s Director of Engineering for next-generation tech. Mark gave us a preview of his talk, which you can catch on Tuesday,\u00a0February 14 from 3:45-4:30 pm in room 132, Moscone North. He will be delving into how nation-state attackers craft their [&#8230;]<img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=blogs.sophos.com&#038;blog=834173&#038;post=32930&#038;subd=sophos&#038;ref=&#038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10379,11295,10528,11296,11297,11298],"class_list":["post-6572","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-corporate","tag-events","tag-exploit-kits","tag-fancy-bear","tag-mark-loman","tag-rsa-conference-2017"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6572"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6572\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}