Andreas Baumhof

COMMENTARY

6 cyber tips to fight crime

Personal devices on the network are inevitable; here's how to protect your company and customers

The bring your own device, or BYOD, trend couldn't come at a tougher time for government contractors.  State-sponsored espionage malware is in the headlines daily.  Defense Secretary Leon Panetta is warning about the potential for full-scale cyberwarfare.  Federal agencies are starting to look with suspicion at contractors' security policies – and employees want to check their email and access company files on their personal iPads?

But this is today’s reality – smart phones, tablets and home computers are part of the IT environment. You need to understand the nature of the threat and find ways to protect government data and your own business.

Look beyond cyberwarfare

Hostile governments are not the only problem. There's a global network of cybercriminals trying to steal information for financial gain. If you know where to look, you can find millions of stolen government email addresses and account data for sale, collected from Trojans and botnets. 

Cybercriminals use a wide variety of means to get at your accounts and systems. Malicious code that range from basic remote access tools (RAT trojans) that give a hacker remote control of your system to Man-in-the-Browser (MitB) Trojans that steal account credentials and transaction details.  Targeted phishing attacks (spear-phishing) may trick individuals into giving up login information.

For cybercriminals, government contractors look like a convenient back door into federal agencies.  In early 2012, researchers discovered a Trojan disguised as a Windows updater that targets government contractors. By stealing a trusted contractor account, attackers hope to gain access to sensitive applications and data.

As federal contractors deal with the BYOD trend, they must look beyond the devices themselves to the applications and data in the system. Agencies need defenses in place to:

  • Protect applications and data from malware on personal devices
  • Protect accounts and applications from logins using stolen credentials

Help employees protect personal devices from malware

Help employees keep their smart phones, tablets and laptops safe from malware.  Encourage or require the use of anti-malware software before employees can connect to internal applications.  There are many options, including simple lightweight clients that can be installed from the cloud.

Remember that authentication is only one part of your security strategy

Contractors need to put measures in place to keep people from accessing accounts using stolen logins.  Strong authentication like Common Access Card (CAC) is a good first step. But it's not enough, especially for applications hosting sensitive government data. 

MitB attacks can hijack authenticated sessions using CAC cards, for example. And sophisticated attackers are going after the certificate authorities (like RSA).  Financial institutions have used strong authentication for years – and they are frequent targets of MitB attacks.  Contractors and agencies should use complex device identification and real-time risk engines to protect sensitive applications and logins from cybercrime.

Device identification helps to find devices that don't match the legitimate user, disguising their true location, are part of a known botnet, or have other red flags. If someone has stolen authentication credentials, device identification can spot the fact that the device itself is wrong.

Look for malware in inbound connections

Real-time malware detection technologies find sessions that are redirected or changing data in flight.  This can help spot devices that are compromised with malware – with or without the user being aware of the problem.

For example, if a trusted user with legitimate credentials and CAC card has a Man-in-the-Browser Trojan running on his or her device, then their connection is compromised.  Using malware detection, you can detect the presence of the Trojan in the interaction and shut it down or alert the user. 

Keep up-to-date

Cybercriminals are constantly changing their tactics. To stay on top of these changes, tap into a global network of threat intelligence. As new exploits appear on the scene, you'll be ready to respond and block them.

Put it all together and look for anomalies

Research suggests that many successful attacks leave traces that weren’t identified at the time of the attack. A good anomaly detection system can make a huge difference, helping to find complex attacks quickly, without creating false positives. This is where your layered security approach pays off. Layered defenses often force cybercriminals to leave traces that anomaly detection systems can find so you can take quick action to mitigate the risk.

About the Author

Andreas Baumhof is the chief technology officer of ThreatMetrix.

Reader Comments

Mon, Jan 28, 2013 tnguyengp

Cybercrime is a threat to our national security and I'm glad we are taking a more proactive approach. The private sector and the government must work together to secure the networks that are vital to American businesses and communities. It is a priority this year to act on comprehensive cybersecurity legislation. Than Nguyen http://www.insourcegroup.com

Fri, Jan 25, 2013 Jay

Informative article on mitigating fraud.Read this interesting whitepaper "How manufacturers can spot and mitigate fraudulent activitiy" It offers good information on workplace fraud and building a proactive fraud risk management system @ bit.ly/UavIbD

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
SEARCH
 Top 100 Slideshow
contracts DB

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts