Hackers' attacks on computer networks are evolving, zeroing in on flaws in some of the very software programs designed to keep data secure...
WASHINGTON — Hackers’ attacks on computer networks are evolving, zeroing in on flaws in some of the very software programs designed to keep data secure and prevent break-ins, according to a report issued Tuesday by security experts who view the trend with alarm.
Among the programs targeted by hackers are those that back up — or copy — data, as well as anti-virus and firewall applications.
“During the past year, there has been a shift in focus to exploit security products used by a large number of end users,” according to this year’s annual Top 20 Vulnerabilities report by the SANS Institute of Bethesda, Md., which monitors and researches cyber-security around the world.
The report, a consensus of private and corporate experts on the most critical programming weaknesses, said vulnerabilities have been discovered in software from some of the biggest names in security, including Symantec, McAfee, Computer Associates and Trend Micro.
Most Read Stories
- This season, Seahawks have crossed the line from brash to just plain unlikable | Matt Calkins
- How Seattle Mayor Murray’s plan to help homeless living in RVs unraveled VIEW
- UW star quarterback Jake Browning has surgery on throwing shoulder
- Can’t make it to D.C.? Seattle will have own women’s march
- 'It's time for Seattle to shut up': What the national media are saying about the Seahawks' future
Rarely is any piece of software free of weaknesses in the face of determined hackers. But the shift worries SANS officials because businesses and government agencies are not conditioned to look for problems in some of the targeted software, as they are with operating systems, Internet browsers and e-mail, which for years have drawn the most attacks.
Moreover, not all suppliers of the newly targeted programs have automated systems for issuing “patches” that fix the security holes, said Alan Paller, research director at SANS.
“The bottom line is that security has been set back nearly six years in the past 18 months,” Paller said. “Six years ago, attackers targeted operating systems and the operating-system vendors didn’t do automated patching. In the intervening years, automated patching protected everyone from government to grandma. Now the attackers are targeting popular applications, and the vendors of those applications do not do automated patching. Here we go again.”
According to a SANS statement, the U.S. Computer Emergency Readiness Team, or US-CERT, which monitors cyber-security for the Department of Homeland Security, found that products for backing up data are drawing intense attention from online criminals.
The report shows that a flaw in one product, Symantec’s Veritas Backup Exec, opened a gateway for sustained, “unwanted” Internet traffic for months after a warning about the vulnerability was issued by US-CERT in August.
Unless flaws are fixed quickly, SANS said, hackers potentially can gain access to data being backed up by organizations using such programs.
In a statement, Symantec said, “When a vulnerability is found in a Symantec product, Symantec is quick to deliver security patches to customers and provide notification of vulnerabilities and patches available” through its Web sites.
The report also documents an increase in vulnerabilities in software that powers devices for moving traffic around the Internet, such as routers and switches.
Various Microsoft Windows programs, long the primary object of hacker attacks, continue to make the top 20 list, including Office, Outlook Express, Internet Explorer and the basic Windows system.