Are Businesses Knowingly Infecting Their Web Visitors?

  /     /     /  
Publicated : 22/11/2024   Category : security


Are Businesses Knowingly Infecting Their Web Visitors?


Even after being informed of infrastructure serving up malware, some organizations still dont act to clean up their online messes



As cybercriminals have shifted their techniques to get the most efficiency out of their attack campaigns, some of their favorite methods involve two-pronged attacks to first compromise legitimate Web servers and then use them to, in turn, infect unsuspecting visitors to seemingly innocuous sites. While much of this illicit malicious activity occurs behind the backs of these organizations, there are increasing number of businesses that upon being informed that their IPs are engaging in bad behavior stall indefinitely or wait months to remediate the situation.
Whether it is willful denial, a lack of preparation to respond quickly to news of this kind of infection, or simply a lack of resources to be able to properly clean up their online messes, the net effect is that businesses are complicit in spreading malware online, says Srinivas Kumar, CTO of TaaSERA. As he puts it, it is the height of hypocrisy considering how much proselytizing that so many organizations have done in the past to users about how users endanger end-to-end trust in online transactions by using infected devices. Now it is the businesses themselves that are infecting the unknowing users.
[Is malware getting around BIOS security measures? See
BIOS Bummer: New Malware Can Bypass BIOS Security
.]
If you want the user to use a noncompromised device to access your Web portal, by this same logic the user has the right to expect that the server hes connecting to is not compromised, Kumar says.
His firm reports that in its scan of malicious activity online, it runs into many situations where it finds businesses serving up malicious content through compromised Web facing infrastructure. In most instances, businesses respond quickly to notifications from TaaSERA of their transgressions. But then there are the heel-draggers who say theyll handle it internally, only for TaaSERA to find in its checkups weeks or even months later that nothing has been done.
In one case it has been over two-and-a-half months now, and nothing has changed. In one instance they started with a couple malicious site keys, and its grown now, says David Nevin, Kumars colleague at TaaSERA. Theyre in the unresponsive category even though its getting worse.
Many security consultants, penetration testers, and service providers echo the frustrations experienced by TaaSera. For example, Mark Simmons, master technician for JnM PC Experts, tells the story of two different city governments he encountered that were unknowingly serving up malicious content for six months.
The only way they realized to what extent [they were infected] was when their email was hacked and they sent out spam, he says. They both knew of it and hosted these servers for two to three months more.
Knowingly allowing users to become infected through an organizations inaction is irresponsible, says Ken Pickering, development manager, security intelligence at CORE Security.
Theyre infecting the people they should be most concerned about having a positive perception of their brand: people going to the website, he says. That being said, many security teams are already overworked, and a malware attack can be pretty entrenched, so theyre likely faced with the choice of disabling the website or leaving the malware up while they figure out how to deal with it.
On top of that, he says, if the organization doesnt ever identify the vulnerability that caused the infection, theres a good chance theyll be reinfected in another place they wont find. At the root of the issue is that organizations arent keeping up with the vulnerabilities, let alone the infections that leverage them, in a timely fashion. According to WhiteHat security, organizations resolved just 61 percent of their serious Web vulnerabilities, and it took an average of 193 days to fix them. This tracks with Vinny Troias experience as a consultant for Night Lion Security.
He relates an experience recently of doing a vulnerability assessment as a favor for a family friend on a firm that sold healthcare products online and that would be under the eye of both PCI and HIPAA regulators. He found well more than 400 serious vulnerabilities.
I presented the information and they basically said that they didnt have the resources to fix it and they would hope for the best. Thats what it came down to, says Troia, who says often theres a similar resource crunch when these organizations do find out about servers they own behaving badly. It can sometimes take months to resolve.
However, some security professionals warn that critics shouldnt be so hasty to judge organizations for their seemingly slow response times to these kind of infections. Outsiders may not recognize the nuances of the internal issues.
Information security is never as simple as it seems to outsiders -- trade-offs between resources and priorities are a daily and sometime hourly problem. For example, the work required to remove malicious content could be so significant that a business chooses to delay removing it while they attend to higher priority issues, says Andrew Storms, director of security operations for Tripwire. There could be another layer of complications connected with fixing the root of the problem so this problem doesnt recur.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Are Businesses Knowingly Infecting Their Web Visitors?