<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spire Security Viewpoint &#187; Incidents</title>
	<atom:link href="http://spiresecurity.com/?cat=8&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Fri, 14 Nov 2014 00:11:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Do Enterprises Need AMP? An &#8220;Advanced Malware Protection&#8221; Market Assessment</title>
		<link>http://spiresecurity.com/?p=1376</link>
		<comments>http://spiresecurity.com/?p=1376#comments</comments>
		<pubDate>Tue, 03 Sep 2013 14:58:28 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[AMP Firehose]]></category>
		<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Incidents]]></category>
		<category><![CDATA[Threat Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1376</guid>
		<description><![CDATA[Over the past few months I have been on an &#8220;advanced malware protection&#8221; (AMP) kick. I am fascinated by this topic because it ties together a set of market conditions that can be extremely challenging to navigate through, both for&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1376">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Over the past few months I have been on an &#8220;advanced malware protection&#8221; (AMP) kick. I am fascinated by this topic because it ties together a set of market conditions that can be extremely challenging to navigate through, both for security architects and solution providers:</p>
<ol>
<li><span style="line-height: 16px;"><strong>Need</strong>. I choose the word &#8220;need&#8221; with caution, since, as you will find out below, it does not necessarily mean there is &#8220;demand&#8221; for a better solution. However, I don&#8217;t think techrisk professionals can deny that the malware dropping attack vector is alive and well. It is highlighted as the key to the Aurora attacks that catalyzed the &#8220;advanced persistent threat&#8221; concern.</span></li>
<li><strong>Varied Solutions</strong>. There are a number of vendors that have cropped up through the years with solutions to address the malware problem, and the techniques vary significantly. Whitelisters only allow identified executables to run; sandboxes isolate malware and/or identify actions; and real-time forensics track system calls and/or configured state.</li>
<li><strong>Mature Market</strong>. Even with an identifiable need and newer interesting solutions, the most powerful security market in the world &#8211; antivirus (nee antimalware) &#8211; operates in pseudo-commodity mode and dominates in endpoint security.</li>
</ol>
<p>As an industry analyst, I have had the opportunity to interview over a dozen solution providers and even more enterprise security architects and executives on the state of antimalware in the enterprise. Here are a few of my conclusions:</p>
<ul>
<li>Companies are moderately satisfied (and perhaps complacent) with their existing antimalware solutions. They acknowledge that these solutions are not blocking all malware but believe that every solution in the category has similar problems and so are reluctant to switch.</li>
<li>The only factor that could affect existing signature-base antimalware is price &#8211; a lower-cost solution (which many agree is unlikely) could have a strong-enough value proposition. Notably, a few organizations are evaluating Microsoft&#8217;s free antimalware solution as one of these alternative options.</li>
<li>Organizations are looking to gain more benefit from their existing antimalware solutions. Many are still focused on signature-based functionality and are now looking at more advanced capabilities. In addition, organizations are considering and employing new capabilities like Microsoft&#8217;s EMET functionality.</li>
<li>For those times when malware gets through and infects a system, re-imaging is the standard approach, though some organizations are mildly reluctant to do it. Most of these malware infections are not classified as &#8220;incidents&#8221; per se &#8211; there is an ad hoc evaluation process to decide whether any infection should be escalated into being classified as an incident.</li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Organizations are looking at architectural changes and not product changes when it comes to endpoint client-side security. This means they are focusing on BYOD and/or VDI (or even dumb terminals) as options in their client security strategies.</span></li>
<li>Control over (physical) clients continues to relax, with certain &#8220;pockets&#8221; of exceptions (kiosks or manufacturing systems). For some, this was after a long period of control strengthening (e.g. finally taking away local administrative rights).</li>
</ul>
<p>As I mentioned at the start, the market dynamics fascinate me here. I don&#8217;t think there is a techrisk professional left that believes signature-based antimalware is &#8220;good enough&#8221; and yet we see its dampening impact everywhere. At this stage, it has simply become the &#8220;checkbox compliant&#8221; easiest approach.</p>
<p>As someone extremely interested in cybersecurity economics I am encouraged by the attention being given to the bottom line &#8211; organizations should be very careful about cost-benefit in their security programs. While some of the organizations I interviewed had done a comprehensive analysis, it appeared to me that a number of organizations had not undergone a thorough review of their strategies.</p>
<p>I will be addressing these issues at my <a href="http://www.regonline.com/AMPFirehoseNYC">&#8220;Drinking from the AMP Firehose&#8221; workshop</a> in New York City in a couple of weeks. The workshop concept was driven by these ideas and aims to break through the logjam brought on by complacency and confusion. Regardless of the conclusions that individual organizations come to, I think the entire field will be better off for it.</p>
<p><em>Pete Lindstrom is Principal and VP of Research for Spire Security, LLC, a research and advisory firm. Learn more about Advanced Malware Protection by &#8220;Drinking from the Firehose&#8221; in New York City on 9/17/13. Details at <a href="http://www.regonline.com/AMPFirehoseNYC">www.regonline.com/AMPFirehoseNYC</a>.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1376</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How Much did Amazon Lose in Yesterday&#8217;s Outage?</title>
		<link>http://spiresecurity.com/?p=1294</link>
		<comments>http://spiresecurity.com/?p=1294#comments</comments>
		<pubDate>Fri, 01 Feb 2013 14:55:18 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Incidents]]></category>
		<category><![CDATA[Random]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1294</guid>
		<description><![CDATA[One of the crucial aspects of risk management for infosec pros to learn is how to estimate consequences. It can be helpful to review incidents and create a model for thinking about losses. Amazon&#8217;s outage for an hour yesterday, is&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1294">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>One of the crucial aspects of risk management for infosec pros to learn is how to estimate consequences. It can be helpful to review incidents and create a model for thinking about losses. Amazon&#8217;s outage for an hour yesterday, is a good, simple example for us to play with &#8211; this exact example used to be the one I used when teaching my security metrics class because it is so clean. Or is it?</p>
<p>When estimating losses, it isn&#8217;t entirely unreasonable to do the high-level straight-line math like <a href="http://www.itworld.com/cloud-computing/339609/amazoncom-suffers-outage-nearly-5m-down-drain">IT World did here</a>:</p>
<blockquote><p><em>&#8220;Amazon.com&#8217;s latest earnings report showed that the company makes about $10.8 billion per quarter, or about $118 million per day and $4.9 million per hour.&#8221;</em></p></blockquote>
<p>It&#8217;s really quick and dirty &#8211; and in a general sense legitimate &#8211; but can we do better? There are other ways to look at this that might shed some light on impact assessment. First, the assessment above makes no mention of costs. That might be the biggest weakness since costs are more under the control of Amazon and (probably) don&#8217;t fluctuate as much as revenue.</p>
<p>Luckily for us, Amazon just released its quarterly earnings report and <a href="http://articles.marketwatch.com/2013-01-29/commentary/36613307_1_margins-tom-szkutak-fourth-quarter">this report</a> asserts that its operating margin is about 3%. So right off the bat, we could suggest that Amazon lost 97% of $5 million or $4.85 million in costs. A more conservative estimate might try to determine whether the costs were unrecoverable or not, etc. Hopefully, you get the idea. A cost-oriented approach also works well as an example in infosec since that is often a big piece of the losses we face.</p>
<p>It is important to note here that these costs are additive to the lost revenue estimate &#8211; not only did we lose the $4.85 million in operating costs, but also (presumably) we lost that initial $4.9 million in revenue, for a total of (let&#8217;s say) $10 million.</p>
<p>Now, let&#8217;s look again at that lost revenue estimate. As mentioned earlier, coarse numbers like those used in the calculation above are certainly justifiable but we can probably do better. A quick thought exercise can help here &#8211; by creating the experience of an &#8220;average customer&#8221; of Amazon&#8217;s we can better assess the impact of the outage. This is harder than it sounds because we&#8217;ll have to second guess our own biases, but let&#8217;s try anyway. Let&#8217;s call him Joe.</p>
<p>Given that the outage was simply a &#8220;denial-of-service&#8221; of sorts, the big variable we must evaluate is time. More specifically for our scenario, we need to answer the question &#8220;How timely does Joe&#8217;s interaction with Amazon need to be, or, how likely is Joe to wait an hour to complete his purchase?&#8221; At the very least, we know Joe is willing to wait two days (maybe more &#8211; not sure what the average delivery time is for Amazon) to receive whatever goods he purchases. Throw in what we might assume (my bias) about Amazon&#8217;s low prices and the corresponding brand loyalty that comes with it and it seems reasonable to conclude that Joe will wait an hour to make the purchase, and therefore the lost revenue is actually only deferred revenue to be recognized in the future.</p>
<p>But not everyone is average (usually nobody is), and so once we cover a generic case, it is useful to consider the impact of the outliers. Now, we can imagine scenarios where even though a customer can wait for delivery, she can&#8217;t wait to place the order &#8211; too many other things going on in life. Or even a case where the customer would actually lose a full day due to delivery cutoff times. These are the types of cases that warrant more attention. Certainly it is reasonable to factor these cases into a loss scenario. Let&#8217;s say this is true 10% of the time.</p>
<p>The goal here is to be conservative in our estimates (even though it is sometimes beneficial for companies to be liberal after the fact &#8211; can hide other problems) so we should remember that these scenarios are typically useful in identifying some sort of discount factor to apply to the initial $5 million estimate. Though it is possible to come up with scenarios where there is a multiplier &#8211; maybe holiday seasons &#8211; it is less common.</p>
<p>Our lost revenue evaluation has led us to conclude that 90% of purchases will still be made in the future, so the remaining 10% of cases will discount our $5 million loss down to $500,000. Add that to our lost costs and we are back to the initial $5 million estimate, though from a different perspective. While it might be attractive to decide all was for nought, it is worth considering the situations where the costs are much lower, or the revenue is more likely to be lost to see the value in the exercise.</p>
<p>Now, <a href="http://erratasec.blogspot.com/2013/02/risk-analysis-v-downtime.html">some might suggest</a> (essentially) that the above analysis is really not worth it because a loss is a loss. Not only that, but Amazon&#8217;sown numbers have shown (?) that there is no discernible uptick in sales in the period following the outage. As mentioned earlier, it is easier to see how costs are fairly static and therefore turn into losses. On the revenue side, however, it is not clear at all.</p>
<p>In assessing lost revenue in this case, one must do two things: first distinguish between necessity and convenience and second evaluate the impact of buyer&#8217;s capacity. The purported lack of a noticeable uptick in sales in the short term could easily be explained if purchases are more oriented around convenience than necessity. Measures associated with shopping carts might be of assistance here (I sometimes leave items in my shopping cart for days if not weeks). Again, this information can be factored into the estimates if need be.</p>
<p>It is uncommon to consider a &#8220;buyer&#8217;s capacity&#8221; but especially with convenience purchases, one might decide that the rate of purchase is a determining factor and even though the shopper returns, she will be buying other items, etc. This justification is easier to believe in cases where capacity is high &#8211; that is, the shopper is buying at a rate where fitting in the &#8220;lost&#8221; purchases is unlikely (and when it happens is noticeable in the numbers). My assessment is that this scenario is unlikely; people are more casual in their shopping experience and will therefore wait to make their purchases. (A similar capacity limit could have an effect on the Amazon side, but that is even more farfetched).</p>
<p>My conclusion is that $5 million is a reasonable loss estimate for Amazon&#8217;s outage, but not for the reasons initially believed.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1294</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Thinking about APTs and the RSA Hack</title>
		<link>http://spiresecurity.com/?p=1235</link>
		<comments>http://spiresecurity.com/?p=1235#comments</comments>
		<pubDate>Mon, 04 Apr 2011 17:58:24 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Incidents]]></category>
		<category><![CDATA[Metrics]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1235</guid>
		<description><![CDATA[The recent RSA hack has once again (after Google and Aurora made a big splash a little over a year ago) brought to the surface this notion of an &#8220;advanced persistent threat.&#8221; There is great emotion on all sides of&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1235">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>The recent RSA hack has once again (after Google and Aurora made a big splash a little over a year ago) brought to the surface this notion of an &#8220;advanced persistent threat.&#8221; There is great emotion on all sides of the debate about what it is and whether it matters. As I listened to Uri Rivner of RSA describe the nature of the attack on Friday, for some reason I couldn&#8217;t stop thinking about The Cuckoo&#8217;s Egg, which was a fascinating account by Clifford Stoll of how he tracked down an industrial espionage ring. Back in the early-mid 80&#8242;s. Over 25 years ago.</p>
<p>Of course, the attackers didn&#8217;t use spear-phishing then, but the idea of the &#8220;APT&#8221;  as an adversary was alive and well (and I am sure there are others that could reasonably trace the adversarial aspect back before computers). Through the years, we&#8217;ve heard about (and seen evidence of) things like &#8220;blended threats&#8221; and the &#8220;low and slow attacks&#8221; that occur over time. TJ Maxx, Heartland, and many of the other most public attacks can be considered APT in a general sense (though presumably the threat actor doesn&#8217;t quite match up). And certainly Google/Aurora was the most prominently identified APT incident that matches up pretty consistently with the RSA attack.</p>
<p>Even the advocates of the APT idea agree that the individual elements of the APT are not particularly new. That begs the question of why do we need a new label to discuss things that are not so new? And the answer is obvious &#8211; because those folks that are advocating APT do not believe enough is being done to prevent these types attacks. That is, they think the risk is greater than the effort to mitigate them.</p>
<p>It is not uncommon in the security space for people to latch onto a term and make it mean everything, and therefore nothing. It isn&#8217;t necessarily malicious; sometimes it is a result of a weakly defined term or poor choice of words. Sometimes it is a way to shake out some economic doldrums in a time of flat spending even while the market remains competitive.</p>
<p>But the question remains: are we spending less than we should? There is ample evidence in the broader risk management community for two pieces of this puzzle that go hand-in-hand. First, humans are likely to pay less attention to the low frequency, high consequences events. And second, that fear of the unwanted outcome causes people to overestimate the likelihood of an event. So when people use the term &#8220;APT&#8221; in a manner that some would call FUD, it may actually offset the lower attention and work out in the end.</p>
<p>Ultimately, I think advocates of APT are going to have a hard time convincing others that the risk is higher than we think. Truthfully, it is not clear to me that they are even performing some sort of risk analysis because they themselves are caught up in the &#8220;dread&#8221; cycle that causes them to overestimate the risk. It would be great for proponents to put together some numbers that assist in measuring frequency and consequences for all those involved so we can better determine our infosec strategy.</p>
<p>Two other observations from the RSA hack that I thought were noteworthy: 1) RSA highlighted that their recommendations were &#8220;Security 101&#8243; which I agree with, but that doesn&#8217;t fare well when also trying to promote the notion of the APT. We should at least be in Security 102 (second semester <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> ) for APTs, right? Also, 2) I am concerned that we are going to lose sight of what it means to stop an attack &#8220;in progress.&#8221; AFAIK, RSA has not publicly stated what the duration of the attack was, from the time of initial attack (the spear-phish) to the time of identification and response. The whole notion of catching something &#8220;in progress&#8221; AFTER data is lost seems somewhat specious to me without a better explanation.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1235</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Just a Reminder for RSA: The &#8220;P&#8221; in APT stands for &#8220;Persistent&#8221;</title>
		<link>http://spiresecurity.com/?p=1232</link>
		<comments>http://spiresecurity.com/?p=1232#comments</comments>
		<pubDate>Fri, 18 Mar 2011 16:06:48 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Incidents]]></category>
		<category><![CDATA[Threat Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1232</guid>
		<description><![CDATA[RSA&#8217;s Chairman Art Coviello has issued an open letter to its customers about a security breach that resulted in lost information related to SecurID. Two lines don&#8217;t seem to go together: &#8220;Recently, our security systems identified an extremely sophisticated cyber&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1232">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>RSA&#8217;s Chairman Art Coviello has issued an <a href="http://www.rsa.com/node.aspx?id=3872">open letter</a> to its customers about a security breach that resulted in lost information related to SecurID. Two lines don&#8217;t seem to go together:</p>
<blockquote><p><em> &#8220;Recently, our security systems identified an extremely sophisticated cyber attack in progress being mounted against RSA. We took a variety of aggressive measures against the threat to protect our business and our customers, including further hardening of our IT infrastructure&#8221;</em></p></blockquote>
<p>and</p>
<blockquote><p><em>&#8220;Our investigation has led us to believe that the attack is in the category of an Advanced Persistent Threat (APT).&#8221;</em></p></blockquote>
<p>So, surprise, surprise we are getting folks discussing whether this actually fits in the most ambiguous category in the history of infosec &#8211; APT, and heck I am going to throw in my literal interpretation for the single word that actually has some specificity associated with it: Persistent. I suppose you could look at it two different ways &#8211; persistent in the manner of identifying recurring attacks from the same source, or persistent in its ability to compromise resources and stick around for a while. Neither seem to be the case here.</p>
<p>I feel RSA&#8217;s pain, because there is no honor in being hit with your general garden-variety plain old &#8220;T&#8221; especially if you are a security company. But they should also feel better because as we know both &#8220;Ts&#8221; and &#8220;APTs&#8221; use the same techniques&#8230; which of course also means that you can&#8217;t tell if it was an APT or not unless you have recurring information of correlated attacks or actually find out their motives later.</p>
<p>Seriously, are we really going to be stuck for the rest of our careers deciding what is or isn&#8217;t an APT? Let&#8217;s hope the term flames out quickly.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1232</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Vulnerability Creation vs. Discovery vs. Fix</title>
		<link>http://spiresecurity.com/?p=1194</link>
		<comments>http://spiresecurity.com/?p=1194#comments</comments>
		<pubDate>Mon, 25 Oct 2010 15:34:53 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Incidents]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Random]]></category>
		<category><![CDATA[Vulnerability Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1194</guid>
		<description><![CDATA[Michael Janke at Last In, First Out is rightly concerned about the respective run rates of the vulnerability creation process and our ability to fix them individually. He asks the question &#8220;Are we creating new vulnerabilities faster than we are&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1194">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://blog.lastinfirstout.net/2010/09/are-we-creating-more-vulnerabilities.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed:+LastInFirstOut+(Last+In,+First+Out)">Michael Janke at Last In, First Out</a> is rightly concerned about the respective run rates of the vulnerability creation process and our ability to fix them individually. He asks the question &#8220;<strong><em>Are we creating new vulnerabilities faster than we are fixing old ones?&#8221; </em><span style="font-weight: normal;">after providing a list of publicly disclosed vulnerabilities from various time periods.</span></strong></p>
<p><strong><span style="font-weight: normal;">I am not clear whether this list of disclosed vulnerabilities is intended to represent vulnerabilities created or fixed (it is neither), but it certainly does its job in highlighting the problem. It is worth first understanding that vulnerabilities can exist in various states after creation &#8211; undiscovered/discovered; undisclosed/disclosed (publicly); and unfixed/fixed, giving us 8 different possible state combinations (though 2 are impossible) for vulnerabilities:</span></strong></p>
<p>undiscovered, undisclosed, unfixed (latent)</p>
<p>undiscovered, undisclosed, fixed (due to code upgrade, for example)</p>
<p>undiscovered, disclosed, unfixed (impossible)</p>
<p><span>undiscovered, disclosed, fixed (impossible)</span></p>
<p><span><span>discovered, undisclosed, unfixed (true zero day; undercover vulnerability)</span></span></p>
<div><span><span>discovered, undisclosed, fixed (QA and internal code review teams)</span></p>
<div><span><span>discovered, disclosed, unfixed (common zero day)</span></p>
<div><span><span>discovered, disclosed, fixed (standard)</span></p>
<p><span>It may also be worth differentiating between a patch available state and a patch applied state depending on whether you are a vendor or an end-user, but this will suffice for now.</span></p>
<div>Back to Michael&#8217;s question, &#8221;<strong><em>Are we creating new vulnerabilities faster than we are fixing old ones?&#8221;</em><span style="font-weight: normal;"> The answer is simple: Yes. The evidence is not so readily available, but logically intuitive, I believe. The thought exercise involves considering the amount of new code being created every day and determining how many vulnerabilities you think are being created. So, for example, you might determine that there are 50 million lines of code and 5 thousand vulnerabilities created every day <a href="http://spiresecurity.com/?p=189">like I did here</a>. You can then compare that number to the number we are &#8220;fixing&#8221; &#8211; using either the number being disclosed, like Michael does, or perhaps an estimate that incorporates the percentage of unpatched vulns in the world.</span></strong></div>
<div>Michael asks a great question and I think he and I come to similar conclusions, but we differ significantly in our reactions to this information. He believes activism and (presumably) regulations will solve the problem. In confess that I <a href="http://spiresecurity.com/?p=306">really</a> <a href="http://spiresecurity.com/?p=313">despise</a> the use of automobiles as some sort of analogous situation, primarily because we are talking more about atoms and molecules than we are about physical components to a car. And even more importantly, automobile safety (at least the kind in this context) does not revolve around the INTELLIGENT ADVERSARY.</div>
<div>Michael is correct that we can&#8217;t eliminate all vulnerabilities but <a href="http://spiresecurity.com/?p=350">liability is not the answer</a>. Software Safety Data Sheets coupled with continued action against attackers will do a much better job.</div>
<div>Related:</div>
<div><a href="http://spiresecurity.com/?p=194">Back of the Envelope Math &#8211; Undercover Vulnerabilities</a></div>
<div><a href="http://spiresecurity.com/?p=189">Another Envelope: Vulnerability Growth Rates</a></div>
<div><a href="http://spiresecurity.com/?p=189"></a><strong><span style="font-weight: normal;">Computerworld: <a href="http://www.computerworld.com/s/article/105869/Opinion_To_sue_is_human_to_err_denied?taxonomyId=017">To Sue is Human, To Err Denied</a> </span></strong></div>
<p></span></div>
<p></span></div>
<p></span></div>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1194</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Sony (not a) Rootkit Impact</title>
		<link>http://spiresecurity.com/?p=514</link>
		<comments>http://spiresecurity.com/?p=514#comments</comments>
		<pubDate>Mon, 07 Nov 2005 01:51:32 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Incidents]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=514</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=514">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>I just caught wind of an <a href="http://www.informationweek.com/story/showArticle.jhtml?articleID=173403250">InformationWeek article</a> reporting that the Van Zant album that Mark Russinovich <a href="http://www.sysinternals.com/blog/2005/10/sony-rootkits-and-digital-rights.html">bought</a> has had its rating on <a href="http://www.amazon.com/exec/obidos/tg/detail/-/B00092ZM02/qid=1131330349/sr=8-1/ref=pd_bbs_1/103-6134071-0242263?v=glance&amp;s=music&amp;n=507846">Amazon</a> reduced from 3 1/2 stars to 1 1/2 stars. Ratings are an interesting and potentially useful approach for folks opposed to DRM. It is likely to be more useful than the typical protest &#8211; the success of the DRM-laden iPod is a good indicator that the mass market doesn&#8217;t really care about DRM. It works two fairly obvious ways &#8211; first, to convince others directly not to buy it, and second, to strike at the ego of the artist.</p>
<p>Even more interesting in this case is the conflicting interest of <a href="http://www.techweb.com/wire/security/173402718;jsessionid=CT5UG1Z5ZXETSQSNDBOCKH0CJUMEKJVN">World of Warcraft</a> players who can use the stealth capability of Sony&#8217;s DRM to hide from WoW&#8217;s &quot;DRM&quot; function. So competing priorities will either drive up or down Van Zant&#8217;s record sales.</p>
<p>It would be really interesting to know how many albums were bought on either side of the equation &#8211; if more albums are bought for the purposes of breaking WoW DRM, then I think that is an indicator that DRM<em> should</em> be used because there are more pirates than benign anti-DRMers. If less are sold, then there are more benign anti-DRMers. </p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=514</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Unalarmed Users Over Sony (not a) Rootkit</title>
		<link>http://spiresecurity.com/?p=515</link>
		<comments>http://spiresecurity.com/?p=515#comments</comments>
		<pubDate>Fri, 04 Nov 2005 18:16:32 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Incidents]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=515</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=515">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Just caught this excerpt from an <a href="http://www.theregister.co.uk/2005/11/03/sony_rootkit_drm/">article</a> in the Register about Sony&#8217;s &quot;rootkit&quot;:</p>
<blockquote dir="ltr" style="MARGIN-RIGHT: 0px"><p><em>It is alarming how little outrage there is from ordinary PC users. While Register readers are well versed in the restrictions of DRM and the dangers of malware, there&#8217;s little sign the public shares this knowledge.</em></p>
</blockquote>
<p dir="ltr">Note to all security professionals: if this is alarming to you, you need to spend a lot more time in the real world. This is very much the rule, not the exception.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=515</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Just Being &#8220;Helpful&#8221;</title>
		<link>http://spiresecurity.com/?p=521</link>
		<comments>http://spiresecurity.com/?p=521#comments</comments>
		<pubDate>Mon, 31 Oct 2005 12:47:25 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Incidents]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=521</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=521">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Check <a href="http://www.starbeacon.com/?MC=NEWS&amp;NID=1&amp;AID=9477">this out</a> (via Infosecurity News):</p>
<blockquote dir="ltr" style="MARGIN-RIGHT: 0px"><p><em>The employee went on to say she erased five years of zoning files because Leitch &quot;has never taken care of her computer system. She has had numerous virus(es). No matter what, apparently, she doesn&#8217;t feel the need to update and back up her system.&quot;</em></p>
</blockquote>
<p>I wonder if she thinks she was doing &quot;the community a service&quot;&#8230;.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=521</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>The &#8220;Name Dropping&#8221; Worm</title>
		<link>http://spiresecurity.com/?p=529</link>
		<comments>http://spiresecurity.com/?p=529#comments</comments>
		<pubDate>Fri, 14 Oct 2005 17:45:31 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Incidents]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=529</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=529">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Anyone that has used Linked In knows that there is a subset of people who simply want to collect the largest number of &quot;contacts&quot; they possibly can (I actually get nervous by the amount of people who are apparently willing to &quot;recommend&quot; me even though they barely know me). I am pretty sure the issue of quantity vs. quality with these types of community networks has been brought up, probably a number of times.</p>
<p>Now, you don&#8217;t even need anyone&#8217;s permission to become a &quot;contact&quot; &#8211; just write a little <a href="http://fast.info/myspace/">javascript worm</a>. &quot;samy&quot; did just that on myspace.com and apparently had over a million best friends within a day or so. Read his <a href="http://fast.info/myspace/">whole story</a> &#8211; on the surface, it is pretty funny. </p>
<p>Of course, my security professional hat knows how painful it must have been for the security folks at myspace.com to recover. I can only imagine the costs involved. Actually, I can estimate them &#8211; since Intermix Media did $79 million in its most recent fiscal year (year ended March, 2005), that translates out to about $65k an hour of revenue (assuming all revenue is generated online). Samy says the servers were down for about 2.5 hours for about $160k in lost revenue. I don&#8217;t know what their burn rate is, but it is not uncommon for it to be higher than revenue, so I will take the $160k and reduce it by half to account for unrelated costs (I would include IT salaries and IT cost of capital, so I think for an ebusiness, 50% of expenses is reasonable). For a grand &quot;back of the napkin&quot; total of $240k.</p>
<p>The impact on global networks is even more interesting: the more reputation economics, or <a href="http://www.craphound.com/down/">Whuffies</a> if you like Cory Doctorow, are leveraged for some sort of status, the more important they become to everyone and the more significant the damage. </p>
<p>The technique used is interesting as well. It looks like samy used a lot of obfuscation techniques just to get his script to run. In addition, he leveraged XML-RPC. It isn&#8217;t too hard to begin to imagine what could possibly happen in an online marketplace like eBay, for example, if some of these techniques were used. Or B2B marketplaces where thousands or millions of dollars are changing hands. The heck with reputation, now its a money thing&#8230; </p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=529</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tsunami Hacker</title>
		<link>http://spiresecurity.com/?p=536</link>
		<comments>http://spiresecurity.com/?p=536#comments</comments>
		<pubDate>Fri, 07 Oct 2005 05:09:29 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Incidents]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=536</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=536">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>So a guy worries that he might have been phished and <a href="http://www.theregister.co.uk/2005/10/06/tsunami_hacker_convicted/">runs some attacks</a> against a tsunami donation website. Not only was he unsuccessful, but BT (the site hoster) was using &quot;dead&quot; technology (that would be IDS <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> ) and caught him.</p>
<p>I am a bit torn in this case. On the one hand, I don&#8217;t want security vigilantes running around looking for vulnerabilities, but on the other hand, it doesn&#8217;t seem like he had malicious intent. This is what is annoying about our profession &#8211; we feed our young to the authorities when they act on the bluster that&#8217;s out there about doing good by doing bad. (I really don&#8217;t get the whole &quot;police are gonna pay for this&quot; baloney. Sure, the vigilante &quot;security consultants&quot; out there will stay away, but those BT security professionals probably don&#8217;t mind at all.) </p>
<p>For discussion:</p>
<ul>
<li>What if the defendant (Daniel Cuthbert) were to claim that he actually <em>was</em> phished? Would he have ended up like <a href="http://news.bbc.co.uk/1/hi/england/hampshire/dorset/3197446.stm">this lucky guy</a>?</li>
<li>What good could come from running scripts against a web server involved in a phishing attack? (caveat: it is not completely clear what the technical details are to this story). Either it is run by bad guys in which case it probably would have been gone by the time Cuthbert went back, or it was a compromised legitimate server&#8230;but why wouldn&#8217;t he have simply looked at his URL history and parsed it out? (I am guessing a cross-site scripting test here) or gone back to the banner ad he clicked on?</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=536</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
