Emerging online threats and security | Features | ChannelWorld.in
This ad will automatically close in seconds Close

Emerging online threats and security

Added on Jan 17, 2012 by Varsha Chidambaram

No matter what indicator you choose, cyber crime is getting increasingly serious, forcing enterprises to respond with equal gusto. But given how hard it is to catch cyber criminals, the smart money is on prevention. Enterprises need to ensure that they are aware of the three new trends in the threat landscape and ensure that they are protected against them.

Trend 1: Internationalization of Organized Crime

Highlights: More organized in global terms, resulting in an increased access to funds and resources. Allows a single criminal to attack from multiple locations, confusing investigators. Benefits from a lack of international collaboration.

When Stuxnet hit India last year, it sent alarm bells ringing in the highest offices of the country, after all, India was the third-most infected country in the world. Some even speculated since ISRO is a Siemens customer that it was the cause behind a glitch on the INSAT (Indian National Satellite System) 4B satellite. Whether that's true or not, Stuxnet was undoubtedly one of the most sophisticated and targeted attacks till date.

Stuxnet flummoxed everyone: Analysts, security experts, intelligence officers, and government agencies. But thereís one thing that they all agree on: Stuxnet was not the work of an individual. It was a masterpiece created by a collection of highly-brilliant, highly-motivated individuals with deep financial backingóa trademark of internationalized crime.

ìToday, cyber crime has gone international. It can no longer be traced to a college whiz writing code in his basement. It is organized crime, much like the mafia. There are powerful, geographically-dispersed actors in this scheme, says Krishna Sastry Pendyala, asst. government examiner, Cyber Forensic Division, Directorate of Forensic Science.

Carl Leonard, senior research manager, Websense Security Labs, agrees. The sophistication of attacks we are seeing today requires various skill sets. It indicates that cyber criminals with different levels of expertise are organizing themselves to create these attacks. And these attacks are originating from various geographies and targeting various geographies.

The internationalization of cyber crime is only likely to grow because being part of the cyber mafia is a lucrative business. According to Deloitte, the underground market primarily selling corporate data is estimated at $100 billion (about Rs 450,000 crore), and growing. With ambivalent cyber laws, and a lack of international co-operation, cyber criminals are enjoying a free run, says Pratap Reddy, director, Cyber Security, Nasscom.

It's important to differentiate between two types of international criminals: Those motivated by politics and those motivated by money. Anonymous and LulzSec, for example, fall into the category of international criminals, with political intent. The criminals behind the attacks on Lockheed Martin, or Sony Playstation, for instance, were motivated by critical information that could be sold.

But, motivation aside, they have one thing in common: Their ability to mobilize geographically-dispersed foot soldiers.

While conducting forensic exercises, we see that attacks originate from multiple locations but, often, that is a diversion tactic. The attackers are really the same person or set of persons. The real problem that plagues not just India but the entire world is the difficulty in tracking down and nailing these cyber criminals, says Kanwal Mookhey, founder, Institute of Information Security and author of several books on information security.

The unprecedented wave of successful assaults that we see around us today is because hackers are grouping themselves together, says Pendyala.

One of the biggest barriers in the fight against international cyber crime rings is inter- and intra-national collaboration. However, that's changing. According to the Global Information Security Survey (GISS) 2011 that's run by PwC and CSO magazine (a sister publication to CIO)Indian IT and security leaders are ready to give up some of their old resistance to letting the government take more control the first step towards more collaboration. About 75 percent of Indian security leaders, for instance, are willing to support the government-mandated intrusion-penetration and identity-threat monitoring standards. And about 65 percent would support a government implementation of mandatory adoption of real-time threat analysis.

The need of the hour is to enhance collaboration with various international bodies (government bodies, industry and, for profit / not for profit bodies) working in the areas of enhancing cyber security and cyber crimes prevention, so as to bring in increased cooperation into cyber crime investigations, says Reddy.

The Interpol has a wing called the IT Crime Working Group. It's a group of top cyber crime investigators from across the globe who meet to discuss the latest strategies to fight cyber crime. While there has been effort to boost international co-operation to fight cyber crime, it is very time-consuming and often frustrating to the investigators, says S. Murugan, deputy inspector general of police, Cyber Cell.

In the meanwhile, CISOs are ensuring that security, in general, is tightened. Being a financial services company, security is one of our top concerns. We have various levels of confidential data, with security becoming progressively stronger at each level. Not even top management has access to all sensitive data; it is based on a need-to-know basis, says Parag Deodhar, chief risk officer and VP process excellence and program management at Bharti AXA General Insurance.

He's also making sure that the company attacks security holistically. We put a lot of emphasis on the people and process part of security. Instead of having lengthy security handbooks, we conduct interactive training sessions which have a mix of video and text to keep awareness levels high and employees interested, he says.

The growing focus on security is even being witnessed in manufacturing companies. Take the Essar Group for instance. Essar has instituted a multi-layer security policy encompassing all business units. We have extensive security armor involving the latest security tools such as DLP, GRC, end-point protection, and encryption. The current global threat landscape suggests that BYOD (bring your own device) may well be the next challenge. As a proactive measure to mitigate risks attached to end-points, Essar Group has taken a lead to adapt desktop virtualization, says Manish Dave, CISO, Essar Group.

Trend 2: The Growth of Social Media

Highlights: Has a direct correlation with the rise of spear phishing and socially engineered attacks.

Social media adoption within the enterprise is unstoppable. From using it for sales leads to brand building or just giving a new generation of staffers access, social media is inexorably going from nice-to-have to must-have. According to data from GISS, 49 percent of Indian enterprises intend to increase access to social media.

The use of social media is no longer a choice; it is a necessity to do business. If the enterprise does not engage and respond to comments, it will start losing customers, investors, and members, says Jamuna Swamy, head-Information Security Practice, Hexaware Technologies.

But few enterprises are ready either strategically or tactically for social media: Only 30 percent say the use of social networking is part of their organization's security policy and less than half (42 percent) monitor employee postings on blogs or social networks.
Two threat vectors emerge from this trend: An increase in spear phishing and socially-engineered attacks.

Social media plays a significant role in spear phishing attacks. Since these attacks are targeted at specific victims, cyber criminals craft an attack that would lure them more effectively, says Anand Naik, director of Systems Engineering for India and SAARC Region, Symantec.

Already, an increase in spear phishing attacks is apparent. Since March this year, there has been a spate of spear phishing attacks targeting RSA, Epsilon, JP Morgan Chase, Sony, Oak Ridge National Laboratory, Lockheed Martin, Citi Group, Gmail, and The IMF.

According to a recent report by Cisco (E-mail Attacks: This Time It's Personal), spear phishing levels have jumped three-fold in the last 12 months. And for good reason: They are more profitable for the bad guys. The report points out that for a single e-mail campaign, mass phishing has an open rate of 3 percent and a click through rate of 5 percent compared to 70 percent and 50 percent for a spear phishing campaign. The result? The value per victim of a mass phishing attack is about $2,000 (about Rs 94,000), compared to $ 80,000 (about Rs 37.6 lakh) for a spear phishing campaign.

The other threat vector socially-engineered attacks is also growing, although at a slower pace. About 27 percent of Indian enterprises have been victims to social engineering attack in 2011, up from 22 percent last year, points GISS data.

Clickjacking is another method of executing a social engineering attack that works by fueling human curiosity on a social network. Clickjacking is defined as an activity that encourages somebody to click on a video, open a PDF file, or browse through a website. The ultimate goal is to encourage someone to perform a certain action.

Clickjacking is most commonly noticed on Facebook. Let's say a friend posts a shocking video on Facebook. If the post tickles your curiosity enough you'd be tempted to watch the video. But when you click on the play button, you notice that instead of the shocking video you've gone and liked the video and it goes as a news feed to all your friends.

In click jacking a malicious code or a hidden component of a website sits on top of a video button, for example. So while you think you're pressing the play button you're actually executing a social engineering attack, says Websense's Leonard.

In response, CISOs are pushing more money and focus at the problem. In the next year, 43 percent of Indian enterprises plan to increase security spending related to social media, 40 percent promise to make social media security strategy a top priority, and 50 percent say monitoring employee postings on social networks is also a top priority.

In a number of security awareness training exercises we carry out for our customers, we include slides on how social networking sites can be used for social engineering, says Bharti AXA's Deodhar.
At Hitachi Consulting India (formerly Sierra Atlantic), IT director and CISO, Sesanka Pemmaraju is taking both operational and non-operational routes to de-risk social media. He publishes desktop wallpapers with pictorial representation of multiple scenarios along with do's and don'ts. We are also in the process of integrating DLP and a rights management system (RMS) to enable tight monitoring of various actions performed by employees internally to prevent any leaks and avoid information landing in the wrong hands, he says.

Trends 3: The Emergence of Advanced Persistent Attack

Highlight: These are targeted, sophisticated attacks. Aim is to steal data, not destroy. Remains undetected for long periods of time. Requires advanced protection like deep packet inspection and network forensics.

The attack on RSA in March is among the most audacious security breaches this year. It started when attackers sent an e-mail with an Excel file titled 2011 Recruitment Plan. The mail was only sent to 12 people within the organization and went straight to their junk folders. Eleven of them deleted the e-mail, one didn't. But one click on the attachment was enough for the attackers to sniff around the network, determine key servers, and then slowly get access to them. It was only a matter of time before hackers extracted private keys that were at the heart of RSA's security algorithm.

That's the power of APT (advanced persistent threats). APT is characterized by sophisticated, directed, and persistent attacks. The sophistication is the result of multiple experts building up an attack to target specific organizations in a systematic and persistent manner.
Unlike some malware that result into random infections, APTs are directed attacks on specific entities, explains Sandeep Godbole, member ISACA India Task Force. And their objectives are much more sinister and serious.

ATP attacks require meticulous preparation before the actual attack. In this case, the criminal gathers detailed information about the target; the network infrastructure, the security deployed, etcetera, say Leonard.

A significant characteristic of an APT attack which is also a determining factor for its success is its ability to remain undetected for long periods, creating a longer window as it hunts down the crown jewels. APT attacks depend on their ability to get inside an organization and stay hidden in plain sight. This differs greatly from the smash-and-grab style of more unsophisticated cyber thugs.

What makes these attacks more lethal is that they are guided by external entities with a high degree of human involvement. Think of an APT attack as a remote-controlled car creeping about your system with the controls in the hand of
a criminal.

What makes them tricky to deal with it is that they function diligently, step-by step, avoiding detection for long periods of time, says Deodhar.

So do CISOs in India need to start worrying? Depends on how they profile risk in their organizations. Organizations that have strategic, national, or military significance have a higher threat profile, says Godbole. Also, known names or brands in the commercial world or those that hold information that can be exploited may be equally at threat. It's very important to determine whether your organization falls in these buckets.

Currently only 35 percent of organizations in India have a strategy to combat APT, according to GISS. Over 85 percent of these rely on traditional intrusion detection or intrusion prevention systems to counter APT.

But while basic security practices such as patch management, vulnerability assessment and configuration management will ensure APT entry points are secured; this new threat will need more sophisticated protection like deep packet inspection, network forensics, and robust net flow analysis tools. In the next year, 64 percent of Indian organizations say that APT will drive security spending, which is lower than the Asian average of 70 percent.

Organizations that are high on a criminal's radar would need to hire or train expert malware analysts capable of analyzing data to identify the activities of malware and bots to identify APT, says Godbole.

The more visibility and context you have around the status of your security environment, the more prepared you will be to respond to threats when they strike. Because it's not a matter of if you are going to be attacked, the question is when, and how quickly will you be able to respond when it happens.

Latest Features

  • How to build an ecommerce business that sells food online

    How to build an ecommerce business that sells food online

    Selling food online is one of the most difficult ecommerce businesses to succeed at. While creating an appetizing website is in itself a challenge, ensuring that your (typically perishable) products arrive looking and tasting as delicious as they appeared on the website can be a nightmare.
  • 5 steps to respond to a security breach

    5 steps to respond to a security breach

    It's not a matter of if you are going to fall victim to a cyber attack, it's when. So what should you do to minimise the adverse consequences that can arise from a breach?
  • How to change Windows 10's default web browser to Chrome, Firefox, or Opera

    How to change Windows 10's default web browser to Chrome, Firefox, or Opera

    When you claim your free upgrade to Windows 10, the operating system pulls a nasty trick that could confuse non-techies that don't know how to go digging around in system settings. The express installation option--a.k.a. the one non-technical users will choose--automatically sets your default web browser to Microsoft's new Edge, even if you defaulted to Chrome, Firefox, Opera, or another web browser in Windows 7 or 8.
  • A multi-monitor USB adapter lets you add a display even if you lack a spare video port

    A multi-monitor USB adapter lets you add a display even if you lack a spare video port

    Melita Fogarty told me, "I would like to set up two monitors, but my PC only has one port. Is there an adapter I can buy to make this work?"
ChannelWorld Research

Why Channels Have Changed Their Go-to-Market Strategy in Six Months

According to our SOTM Mid-Year Survey, a majority of Indian channels said their top go-to-market strategy was to offer services in a recurring revenue model—not introducing new technologies, like SMAC, which was their top GTM strategy six months ago.

SOTM Mid-Year Survey 2015: Your Roadmap for the Next 6 Months

According to the survey, the next six months of the year are going to be eventful. Here are the challenges, emerging technologies and trends that will shape the rest of the year for you.

Big Data, Mobility Top Partners’ Wish List: SOTM Mid-Year Survey 2015

According to the ChannelWorld's State of the Mart Mid-Year Survey (SOTM) 2015, big data is the way to go for the enterprise channels for the second half of this year, with 34 percent partners planning to invest in it.

Private Cloud Still Remains a ‘Safe Bet’ for Partners: SOTM Survey 2015

According to the STOM 2015 survey, channel partners who are into cloud computing feel that 42 percent of their business will be generated by private cloud.

Partners Pin Hope on Government, Expects IT Spend to Grow: SOTM Mid-Year Survey 2015

According to the ChannelWorld's State of the Mart Mid-Year survey (SOTM) 2015, 30 percent of the channel partners believe that IT spend in the government sector is likely to increase in next six months.

No More Baby Steps, Partners Ready to ‘Risk’ Gambling with Disruptive Tech: SOTM Survey 2015

According to ChannelWorld’s State of the Mart Survey (SOTM) 2015, 43 percent of channel partners say their business will have a ‘high risk appetite’ in the second half of this year.

Channels’ 3 Great Expectations from Tech OEMs

Introduced as an individual category under ‘Expectations from tech OEMs’ list in SOTM Mid –Year Survey, ‘transparent deal registration’ emerged as the biggest concern for channel companies in India.

Latest Videos

Dynacons Scripts Successful Datacenter Strategy for India Inc: Parag Dalal, Dynacons

Strategic multi-OEM alliances, internal employee skillsets and long-lasting customer satisfaction are fundamental ingredients for a successful datacenter practice in today’s IT world, says Parag Dalal, Executive Director, Dynacons Systems & Solutions.

2015: A Game Changer Year for Security Channel Partners

Technology companies are adopting new-age security offerings to suffice the sophisticated threats and business demands of modern organisations. APT, Encryption, Next-Gen Firewall, Predictive Analysis, SIEM form the backbone of the company's security posture.

Why We Created a COE: Rajesh Mathkar, Wysetek Systems Technologists

Rajesh Mathkar, Director, Wysetek Systems Technologists, shares the rationale behind opening a center of excellence for virtualization and cloud computing and how it has benefited his business.

Editor's Pick

3 tips for a hassle-free Windows 10 upgrade

The waiting is almost over.

Understand Customers’ Business for Robust Security Posture: Harish Tyagi, Taarak India

Ownership and Manageability of the customers’ networks is the new order of the day. And they are asking advisory services than just security solutions, says Harish Tyagi, CEO, Taarak India

We are Planning to Add more Partners in Metropolitan Cities for Expansion: Puneet Datta, Canon India

The growing popularity and the potential of professional printing is opening new avenues for channel partners and Indian enterprises, says Puneet Datta, Director, professional printing products division (PPP), Canon India. 


7 Apps By The Indian Government You Need to Use

There are over hundreds of government initiated apps for Android, Apple and Windows devices. With Narendra Modi’s Digital India initiative, the government has released several new feature-rich smartphone applications.

SOTM Mid-Year Survey 2015: Your Roadmap for the Next 6 Months

According to the survey, the next six months of the year are going to be eventful. Here are the challenges, emerging technologies and trends that will shape the rest of the year for you.

The State of the Internet

Akamai's Q1 2015 state of the internet report provides insights into key global statistics including connection speeds, broadband adoption (fixed and mobile networks), and IPv4 exhaustion and IPv6 implementation.

India Software Market on an Upswing

According to IDC, the Indian software market has witnessed consistent growth of 10 percent since the second half of 2014, showing signs of growth and revival. 

7 Jobs Technology Has Replaced

Albert Einstein said once that it has become appallingly obvious that our technology has exceeded our humanity. With every invention of technology some poor soul becomes vulnerable to losing his or her job in some corner of the world. Here are few jobs that will cease to exist soon.

India's Leading VADs

Why Channels Want to Partner With Inflow Technologies

Inflow Technologies’ tie up with 39 vendor companies, an extensive tech portfolio, and a services play, are great value propositions for enterprise channels, says its President and CEO, Byju Pillai.

iValue Creates Real Value for Channels in India

Focused on niche vendor alliances around data, network and app management backed by a robust channel ecosystem marked iValue's success in 2014. What clicked for the seven-year-old VAD?

RAH Infotech Shows Channels the Way Ahead

Mutual trust and long lasting bond with vendor companies and channel partners helps VADs to evolve and succeed in today’s aggressively competitive market. Leveraging competent channel partners and forge niche vendor alliances marks RAH Infotech’s success in 2014.

How Satcom Infotech is Adapting to New Security Landscape

As a leading value added distributor, Satcom Infotech is emerging as an end-to-end security player, helping both customers and partners grow.

How ComGuard Shields Channel Partners

As emerging technologies introduce new threats to the enterprise landscape, they are making channel partners anxious. But VADs like ComGuard are putting their worries to rest. Here's how.

Tech Chat

Collaborating To Outcome Based World: Priyadarshi Mohapatra, Avaya

Priyadarshi Mohapatra, Managing Director, India and SAARC, Avaya, on how IT is transitioning from a keep-the-lights-on role to one that enables customers to deliver results.

The Dawn of the Digital Age: Akhilesh Tuteja, KPMG

The development of digital infrastructure will be a key growth driver for technology and solution providers. 

Paradigm Shift from End-Users to User-First : Parag Arora,Citrix

Parag Arora, Area Vice President and India Head, India Sub-continent, Citrix, says new technologies will force organizations to take a user-first approach in 2015.

Mobile and Cloud Are Gamechangers of the Future: Karan Bajwa, Microsoft

Karan Bajwa, Managing Director, Microsoft India, says, in  2015, organizations will adopt a mobile-first and cloud-first strategy to get ahead of competition.

A Network for the Internet of Everything : Dinesh Malkani,Cisco

Dinesh Malkani, President, India and SAARC, Cisco, talks about IoT and the significant technology transitions in the networking world.

Moving to the Third Platform: Jaideep Mehta, IDC

Cloud and mobility are the two technologies that will fuel the rapid adoption of the third platform in India.

Envisaging a Holistic Security Strategy For 2015: Sanjay Rohatgi,Symantec

Sanjay Rohatgi, President–Sales, Symantec India, says the company has a set of holistic solutions in place to secure organizations from security threats. 

Beating the Bad Guys: Sivarama Krishnan, PwC

Organizations will need to turn inwards to establish robust information security strategies.

Building Capabilities for a Digital Tomorrow: Alok Ohrie,Dell

Alok Ohrie, President and Managing Director, Dell India, on the company’s investments to build end-to-end solutions and delivery capabilities for a digital world.


Kamtron Systems

Transitioning towards a service-oriented company will boost our growth, believes Kavita Singhal, director, Kamtron Systems.

TIM Infratech

Delivering ‘best of breed’ technologies to enterprises is key to success, says Monish Chhabria, MD, TIM Infratech

Mudra Electronics

A vendor-agnostic strategy helped us sustain business, says Bharat Shetty, CMD, Mudra Electronics.

Systematix Technologies

Our USP is a customer-friendly approach backed by services, says Akhilesh Khandelwal, Director, Systematix Technologies.

CorporateServe Solutions

Our ability to turnaround complex ERP projects in record time is what gets us customer referral, says Vinay Vohra, Founder & CEO, CorporateServe Solutions.

KernelSphere Technologies

We are emerging as an end-to-end systems integrator, says Vinod Kumar, MD, KernelSphere Technologies.

Uniware Systems

We constantly validate emerging technologies for first-mover advantage, says Vergis K.R., CEO, Uniware Systems.

Astek Networking & Solutions

An innovative approach helps us stay successful, says Ashish Agarwal, CEO, Astek Networking & Solutions.

CSM Technologies

Our approach is backed by innovation and simplicity, says Priyadarshi Nanu Pany, CEO, CSM Technologies.


Signup for our newsletter and get regular updates.