- Details
- Category: Security News

New rules set by the widely used malware database service VirusTotal will exclude security vendors for not sharing data. This move highlights ongoing tension in the multibillion dollar anti-malware industry.
See Also: Creating a User-Centric Authentication and Identity Platform for the Healthcare Industry
Owned by Alphabet's Google, VirusTotal is one of the largest repositories of malware and a key source of data for security companies. It charges companies for unlimited access to its database, which helps vendors compare notes on what malware their peers are detecting.
But veteran anti-virus companies have long complained that younger anti-virus upstarts are leaning too heavily on the database, allowing them to save on research and development costs.
VirusTotal's data can be used to quickly update security products to ensure they're just as effective as competing ones, particularly for older malware samples.
Until VirusTotal changed its rules last week, vendors could access the paid version of the database without integrating their own technology into VirusTotal's scanning service. That's no longer the case, a move that may expel certain companies from accessing it.
The service is also requiring security vendors that have paid for access to the database to share their evaluations of research samples they collect.
Upstarts Abusing Service?
In a statement, Google said the policy change "is designed to make the community stronger for everyone who participates, and we are open to working with any contributor and any technology that adds value to the community."
The criticism has come from decades-old anti-virus vendors, who are facing increasing competition from hot security startups.
Raimund Genes, CTO of Trend Micro, alleges in a blog post that companies specializing in "patternless" file detection - often seen as the new edge in rooting out malware - were abusing VirusTotal's service.
Genes is taking aim at a new crop of companies that have moved away from detecting malware based on spotting patterns and writing signatures and instead on behavioral and algorithmic methods.
"Rather than build up their own research capabilities, these companies were using the research capabilities of VirusTotal contributors to power their security products," Genes writes.
"On top of this, these companies would then tout their 'patternless' solution as a competitive differentiator in contrast to those very companies that were contributing data to VirusTotal (and thus powering their products)," he says.
Response: It's a 'Non-Event'
It's an ugly fight, to be sure, and one that has caused several security companies to issue statements that largely downplay the role VirusTotal's data plays in their products.
SentinelOne, based in Palo Alto, Calif., describes the policy change as a "non-event."
The change was largely advocated by "traditional AV vendors who feel threatened by the rise of companies like SentinelOne, Crowdstrike and Palo Alto Networks," writes Tomer Weingarten, SentinelOne's CEO and co-founder.
SentinelOne doesn't use VirusTotal in its main Dynamic Behavioral Tracking engine, he says.
But SentinelOne does have a feature in its product called "cloud intelligence," which bundles malware data feeds from seven vendors, including VirusTotal, Weingarten writes. The feature is separate from its main engine and stops malware before it executes, based on known harmful code.
Malware is becoming more and more sophisticated, and even next-generation vendors can't just rely on one way of detecting malware, says Andreas Clementi, chairman of AV-Comparatives.
'Patternless' Patterns
"Most 'patternless' products are in fact just using 'patterns' of other products, but storing the data in the cloud," Clementi says. "This makes them look sophisticated, as they are light on the system and apparently not using patterns, but they rely on the IP [intellectual property] of other vendors and data stored in the cloud."
Traditional malware , such as macro-based viruses, is still the most common. "If you can't do the basics, you can't protect the customer," Clementi writes.
Crowdstrike, based in Irvine, Calif., which specializes in endpoint protection and threat intelligence, says in a statement that its relationship with VirusTotal hasn't changed just yet.
"We understand that VirusTotal is re-examining its membership requirements," according to the statement. "We support the mission of VirusTotal and have reached out to them to explore additional ways we can collaborate for the benefit of the entire security community."
The public-facing website for VirusTotal also allows the general public to submit files, which are then scanned by more than 55 different security products for malicious code. Crowdstrike is not one of them, and other companies that are considered next-generation security products are also absent.
Palo Alto Networks says in a blog post that it would still have access to VirusTotal's file samples, although its anti-malware engine is not one of the scanners in the public-facing service.
"There is no change to the way we work with VirusTotal," the company says on its blog. "Palo Alto Networks collects files samples from as many sources as possible. VirusTotal is one of many sources we use, but we do not rely on VirusTotal or any other third-party service to provide file verdict."
A Palo Alto spokeswoman confirms that the company is still a paid subscriber of VirusTotal's data feeds. VirusTotal has maintained that it's open to working with companies to become compliant with it's new policies.
Alex Eckelberry, a security industry veteran, welcomed the changes to VirusTotal. In a blog post, he alleges that some companies have been receiving much attention for their products, but contributed little back to the anti-malware community.
"For some mysterious reason, they refuse to put their own engines on VirusTotal," he writes. "Could it be because they don't want to contribute back? Maybe. Or it could be that they just don't want everyone else to see how poorly their products actually perform."
- Details
- Category: Security News
Data Breach , Fraud , Payments Fraud
Malware Infected POS System Used at Fewer Than 300 Locations
Restaurant chain Wendy's has confirmed that fewer than 300 of its approximately 5,500 franchised locations in North America were affected by a fall 2015 malware attack that infected an unnamed point-of-sale system not used at its other locations.
See Also: Secure, Agile Mobile Banking: Keeping Pace with Last Best User Experience
The breach highlights why all franchisees under a corporate brand should use the same well-tested POS system, says Avivah Litan, financial fraud expert and Gartner analyst. "It's a good idea to standardize on secure EMV-certified POS equipment across stores as soon as possible," she says. "This can help avoid security breaches."
In its first quarter earnings statement released May 11, Wendy's says it now believes malware was installed "through the use of compromised third-party vendor credentials."
The third-party vendor was not named. But the statement adds that the NCR Aloha POS system, which is used at most of its locations, does not appear to have been affected.
"The Aloha system is already installed at all company-operated restaurants and in a majority of franchise-operated restaurants, with implementation throughout the North America system targeted by year-end 2016," Wendy's states. "The company expects that it will receive a final report from its investigator in the near future."
The restaurant chain also notes that the firm it hired to investigate the breach has identified approximately 50 additional franchised locations that "are suspected of experiencing, or have been found to have, unrelated cybersecurity issues. The company and affected franchisees are working to verify and resolve these issues."
Wendy's did not respond to ISMG's request for further comment.
The company detected the breach in January, after numerous card issuers traced suspicious payment card activity back to its restaurants (see 'Where's the Breach?').
In April, Pennsylvania-based First Choice Federal Credit Union filed a breach-related class action lawsuit against Wendy's, claiming the restaurant chain failed to meet industry best practices for securing card data by not being EMV compliant by the Oct. 1, 2015, fraud liability shift date (see Suit Against Wendy's Cites Lack of EMV).
Breadth of Breach
While Wendy's has not revealed the number of cards exposed in the breach, some card issuers tell Information Security Media Group that they believe the total is relatively small.
"I am sure Wendy's management is relieved that the damage was somewhat contained," Litan says. "But I think it's as significant as originally expected. Seems that the days of mega Target-size breaches are behind us."
But John Buzzard, the former head of FICO's Card Alert Service who now works as director of product management for security firm Rippleshot Fraud Analytics, says the Wendy's breach, despite the relatively small number of locations affected, had a significant impact.
"This breach has been extremely virulent and card issuers have struggled to contain the losses," he says. "The criminals have played a clever game of using the stolen cards within roughly the same ZIP code as the account holder. This is a tough play for issuers to deal with. And some industry insiders feel that this breach isn't yet contained, due to new instances of fraud outside the breach timeline."
Ed Cabrera, vice president of cybersecurity strategy at security firm Trend Micro, and a former CISO for the U.S. Secret Service, says the Wendy's incident points to the need for updated POS systems.
"This demonstrates that the transition to EMV and updating systems is paramount for the modern enterprise. It reflects the need to invest in both EMV and breach-detection technology to establish a holistic approach, shifting from incident response to proactive engagement to mitigate pervasive threats."
Merchants should go beyond EMV to incorporate additional security layers, including tokenization, says Bob Carr, founder and CEO of Heartland Payment Systems, a payment processing and POS provider that was breached in 2008 (see Heartland's Carr on U.S. Card Security Shortcomings).
In October, shortly after the EMV fraud liability shift took effect, Carr said: "Without tokenization and end-to-end encryption, payment data will still be vulnerable to attack and compromise."
- Details
- Category: Security News
Application Security , Data Breach , Technology
Experts: Top 10 Vulnerabilities List Could Mislead Administrators
Verizon's annual report into data breaches has triggered an avalanche of criticism that the company made critical errors when studying the most frequently exploited software vulnerabilities.
See Also: Achieving Advanced Threat Resilience: Best Practices for Protection, Detection and Correction
The 2016 Data Breach Investigations report, released on April 27, is considered one of the most comprehensive annual guides on data breach trends, compiling data contributed by a wide range of computer security companies, law enforcement and government agencies. It also draws on more than 3,100 confirmed data breaches, an impressive sampling of attacks (see Verizon's Latest Breach Report: Same Attacks, More Damage).
But since the release of the report this year, computer security experts have taken issue with a top 10 list of vulnerabilities that Verizon claims were responsible for 85 percent of successful exploit traffic throughout 2015.
They assert that the list of vulnerabilities could mislead administrators into devoting remediation efforts toward long-known flaws that don't reflect the real attack landscape.
Flawed Methodology?
Eight of the vulnerabilities on the list were reported in 2003 or earlier. Oddly, the list did not contain any vulnerabilities for Adobe Systems applications such as Flash Player, which is one of the world's most frequently targeted pieces of software.
Kasper Lindgaard, director of research and security for Flexera Software, says the list is likely the result of flawed methodology.
"When discussing traffic of successfully exploited vulnerabilities, I would definitely expect that the vulnerabilities on the top 10 list would be younger than 13 years, and in more commonly used products," Lindgaard says.
In contrast, the U.S. Computer Emergency Readiness Team published a list of the 30 most commonly exploited vulnerabilities just three days after Verizon's report. None of the top 10 vulnerabilities listed by Verizon are in US-CERT's list.
One of the more recently discovered vulnerabilities that did make Verizon's list is FREAK, a vulnerability in the SSL/TLS protocol that could force applications to use weaker encryption keys.
But experts contend that it is almost impossible for FREAK to be one of the most frequently exploited vulnerabilities.
"It's a man-in-the-middle attack," wrote Robert Graham, CEO of Errata Security in a blog post. "In other words, you can't attack a web server remotely by sending bad data at it. Instead, you have to break into a network somewhere and install a man-in-the-middle computer. This fact alone means it cannot be the most widely exploited attack."
Verizon: 'Open to Feedback'
In an email statement, Verizon didn't directly address the controversy, saying "we welcome and are open to feedback from the security community, which we continually evaluate in order to make each successive DBIR better than the next."
Michael Roytman, the author of the section on vulnerabilities, offered an explanation shortly after the criticism surfaced. Roytman is chief data scientist for Kenna Security, which was one of Verizon's partners for the report.
Two data sets were used for the study of vulnerabilities, Roytman wrote in his blog post. One set was composed of vulnerabilities in more than 2.4 million devices and another of 3.6 million "successful" exploitation events. Kenna Security along with Beyond Trust, Qualys and Tripwire contributed vulnerability scanning data.
A successful exploitation was counted if a machine was found to have an unpatched vulnerability, an attack was recorded for that vulnerability by an intrusion detection system and an indicator of compromise was also detected.
"It is not necessarily a loss of a data, or even root on a machine," Roytman wrote. "It is just the successful use of whatever condition is outlined in a CVE" number, referring to Common Vulnerabilities and Exposures, a system for indexing software flaws.
One of the first critiques of Verizon's report came from Brian Martin, director of vulnerability intelligence with Risk Based Security. Martin pointed out that CVEs only cover about half of all disclosed vulnerabilities. In addition, detection signatures for intrusion detection systems are often flawed, which leads to both false positives and false negatives, he added.
Roytman acknowledges Martin's points: "On the whole, Brian is correct: IDS alerts generate a ton of false positives, vulnerability scanners often don't revisit signatures, CVE is not a complete list of vulnerability definitions."
Roytman contends, however, that vulnerability scans and logs are what most administrators have at their disposal to analyze attacks and vulnerabilities.
Further muddying the waters, Roytman then published a new list of the top 10 vulnerabilities based solely on data from customers of Kenna Security. Five of those top 10 vulnerabilities were from 2001 and 2002, once again triggering doubt.
False Positive Warning
Experts question Roytman's methodology, contending that matching up the results of a vulnerability scan with events recorded by intrusion detection systems is an inaccurate way to conclude if an organization was actually exploited, or even how.
Dan Guido, CEO of the security company Trail of Bits, writes that vulnerability scanners are notorious for detecting flaws where there are none. Further, he says intrusion detection systems are "often triggered by benign security scans and network discovery tools."
Guido points out that two vulnerabilities in Roytman's new list, CVE-2001-0877 and CVE-2001-0876, are likely "false positives from vulnerability scanning data."
Both of the vulnerabilities involve the Universal Plug and Play protocol on Windows computers running XP and earlier operating systems.
"It is highly unlikely that a 14-year old denial-of-service attack would be one of the most exploited vulnerabilities across corporate networks," Guido writes.
The Devil is in the Details
An intrusion detection system is a good tool if administrators understand why it sends alerts and that every alert doesn't necessarily mean an intrusion has occurred, Graham writes.
"Verizon didn't pay attention to the details," Graham says. "They simply dumped the output of an IDS inappropriately into some sort of analysis. Since the input data was garbage, no amount of manipulation and analysis would ever produce a valid result."
Guido is even more scathing: "They skipped important steps while collecting data over the past year, jumped to assumptions based on scanners and IDS devices, and appeared to hope that their conclusions would align with what security professionals see on the ground.
"Above all, this incident demonstrates the folly of applying data science without sufficient input from practitioners. The resulting analysis and recommendations should not be taken seriously," he writes.
- Details
- Category: Security News
×Close
Request to Republish Content
- Details
- Category: Security News
×Close
Request to Republish Content
More Articles …
Page 3426 of 3546