Exploiters on the Internet have caused billions of dollars in damage. These exploiters are intelligent cyber terrorists, criminals and hackers who have a plethora of tools available in their war chests ranging from spyware, rootkits, Trojans, viruses, worms, bots, and zombies to various other blended threats.
Exploits can be grown and harvested the same day a security hole is announcedin so-called "zero-day attacks"so they are getting much harder to stop. Open-source malware code, freely available on the Internet, is enabling this phenomenon and cannot be reversed. Although the number and types of exploits "in the wild" continue to rise exponentially, there are fewer than a dozen core methodologies used for their execution and proliferation. Most exploits can be removed, but some exist indefinitely and can be destroyed or removed only by loss of datayouve probably heard of these "rootkits." Most exploits will reinfect a host if a security hole, also known as the Common Vulnerability and Exposure (CVE), is not removed.
Many exploiters are doing it for profit. Just take a look here and youll see where the US$10 billion in identity theft last year occurred the most.
Not all exploits are created equal. Most are evolutionary improvements on existing exploits. Whats very interesting is that the average exploit currently has a dozen names. With the advent of the Common Malware Enumeration (CME) standard, there will be one shared, neutral indexing capability for malware but that will take yearsprobably more than five years, like the CVE standard that is just starting to catch on, since its inception in 1999 by Mitre, now funded by the U.S. Department of Homeland Security. It is crucial today to prevent vulnerabilities across the enterprise and remove these CVEsthese security holes in your desktops, laptops and servers. Knowing what they are, where they are on your network, and how to remove them is more important than sniffing packets and listening for burglars.
According to USCERT, 95 percent of downtime and IT-related compliance issues are a direct result of an exploit against a CVE. Your firewall, IDS, IPS, antivirus software and other countermeasures dont look for or show you how to remove your CVEs. So you are really only 5 percent secure.
You probably never heard of a CVE, but you do know about Blaster, Msblast, LovSAN, and the Nachi and Welchia worms that caused massive downtime and financial losses. They all exploited one CVEone minor hole. It was a software flaw known as a buffer overflow in a certain service called the "DCOM interface for RPC" running in most Microsoft Windows operating systems that allowed hackers to send these exploits out and take advantage of most of the Windows systems that had this flaw.
Just take a look at the U.S. National Vulnerability Database powered by CVE and you can search for CVEs that you might have in your own systems. If you just purchased a Cisco router or a Linksys wireless router or Solaris version 9 running Netscape Enterprise, or anything else that plugs into a network, type the name of the system in the NVD and see how many CVEs (vulnerabilities) you find.
Want to see the top 20 exploited vulnerabilities? Visit SANS, and youll see 10 vulnerabilities in Windows and 10 in Unix/Linux systems. If you have one of these holes, close it as quick as you can, or you can expect to be taken advantage of when you least expect it.
Hackers, viruses and worms cause billions in damage by using CVEs against us, and the damage is growing annually. How many CVEs do you have in your network? Is your computer network taking you out of compliance? Knowing if you have any CVEs is the only way to find out and is considered due diligence. Removing critical CVEs is considered due care. Frequent and consistently scheduled security audits for CVEs and their removal is the only prudent thing to do as a proactive information security manager.
Now is the time to find and fix your CVEs so you can be more productive and suffer less downtime and successful hacker attacks. If you remove all of your CVEs youll be as close to 100 percent secure as possible. This will make the exploiters less successful in breaking into or taking control of your computers, and theyll have to start looking elsewhere. Remember, if you harden your network assets before an attack, youll most likely reduce your risk of downtime and data theft dramatically. Go