Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Sony hack highlights importance of breach analysis

Jaikumar Vijayan, Computerworld | April 28, 2011
Sony's apparent difficulty in figuring out the extent of the damage from the recent intrusion into its PlayStation Network, while frustrating for those affected by it, is not too surprising, given the bag of tricks that hackers employ to hide their tracks.

Though it is relatively inexpensive for companies to store multiple years' worth of raw log data if they want to, many don't. As a result, log data that might have revealed critical data related to a break-in might get overwritten by fresh data over a period of time.

"If you are lucky, you can get to a point where you find some piece of information you need to put the puzzle together, and sometimes you don't find it," Cox said.

In addition to log data, companies also need to have the right host- and network-based forensic tools to be able quickly sift through and correlate event data to figure out what might have happened.

Commercial and open-source tools are available that allow companies to do full packet capture of all traffic on a network for future analysis.

Other technologies, from companies such as NetWitness and Solera Networks, allow companies to record and store every single network event, and then to replay them back in DVR-like fashion if needed.

Although such tools can give companies invaluable insight into security incidents such as the one that hit Sony this week, they are relatively expensive and only now beginning to get deployed in significant numbers.

A lot of times, companies also become stymied in their investigation of a breach because of the initial manner in which they react to its discovery, said David Amsler, president and CIO of Foreground Security.

It's not unusual for enterprises that discover a breach to get into a panic and start immediately shutting down systems and unplugging them from the Internet. One example is Oak Ridge National Laboratory, which quickly shut down its email systems and disconnected itself from the Internet after discovering intruders in its network earlier this month.

Such measures can be critical in preventing data theft, but they can also make it harder to determine what happened, Amsler said. Oak Ridge for instance, is still without Internet access nearly two weeks after it pulled the plug on it.

Often, those behind such intrusions have already established a presence deep inside the network by the time their intrusion is discovered. When a company takes actions that indicate that the intrusion has been detected, that typically causes the attackers to take measures to erase their tracks, including wiping logs clean, altering time stamps and going even deeper into hiding, Amsler said.

"Many times, victims don't even know what data was breached because the artifacts from the breach are encrypted and password-protected" by the time the intrusion is detected, said Marcus Carey, community manager at security vendor Rapid7.


Previous Page  1  2  3  Next Page 

Sign up for MIS Asia eNewsletters.