How Attackers Target And Exploit Critical Business Applications

  /     /     /  
Publicated : 22/11/2024   Category : security


How Attackers Target And Exploit Critical Business Applications


Applications such as ERP and CRM make businesses go, yet are often left unpatched and vulnerable



[The following is excerpted from How Attackers Target and Exploit Critical Business Applications, a new report posted this week on Dark Readings
Applications Security Tech Center
.]
Most enterprises rely on a few critical business applications for their day-to-day operations. Many of these applications are well-known, off-the-shelf or cloud-based products. Because of their critical nature and the value of the data contained within them, they are a prime target for attackers.
So why dont we hear more about attacks against enterprise resource planning systems, sensitive e-commerce and business-to-business applications, and customer resource management systems? The primary reason is that enterprises dont see them as being insecure. Also, their complexity makes it difficult to effectively monitor them and detect a compromise.
Even if such systems could be easily monitored, the collective experience in the 2013 Verizon Data Breach Investigations Report tells us that it would probably take months for anyone to notice the breach. Further, notes the report, notification is more likely to come from a third party than from internal monitoring.
But attackers are targeting these systems, and security professionals will need to up their game as targeted attacks and corporate espionage become more prevalent.
In the white paper Forgotten World: Corpo-rate Business Application Systems, authors Alexander Polyakov and Val Smith say, These days the majority of companies have strong security policies and patch management as it applies to standard networks and operating systems, but these defenses rarely exist or are in place for ERP-type systems. An attacker can bypass all company investments in security by attacking the ERP system.
Its the very nature of ERP and other enterprise apps that makes them so appealing to attackers.
These systems are complex, customized applications that house the inner workings of the business itself. In order to work effectively, these mega business applications typically have connections into, and receive input from, many different applications and servers throughout the enterprise. These systems are not turnkey, almost always requiring some type of middleware glue from a consulting company. All of these factors make for a-difficult- to-secure and nearly impossible-to-patch system.
Even if these systems were easy to patch, the vulnerabilities would likely go unnoticed because companies are often afraid to perform vulnerability scans on them: There are too many unknowns in how the systems would handle such a scan, and they dont want to impact business operations.
Part of the pushback that occurs around scanning running applications is that those organizations with a strong focus on application security have tended to throw their resources at the front-end of the application life cycle, says John Weinschenk, CEO of Cenzic. While that may be the most cost-effective method of addressing application security, the truth is that it doesnt address the realities of applications running in a production environment
When you look at an enterprise, traditionally how they have handled application security has been focused at the pre-production level, he says. But with every company thats been hacked that youve seen in the paper recently, its always the production applications that got hacked.
While this fear of scanning operational applications may be understandable to a point, it leaves some of your most critical systems at risk.
To read more about the challenges of maintaining and securing critical business applications -- and how attackers exploit those applications --
download the free report
.
Have a comment on this story? Please click Add a Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
How Attackers Target And Exploit Critical Business Applications