The Manila Times

Weaponized software

-

mon user interface to the internet, browsers. With the Meltdown, also dubbed Specter, vulnerabil­ity, anti-virus software can be tweaked to access stored informatio­n in the bare metal of computers and other smart devices to scan for keywords that would lead to sensitive documents.

Anti- virus solutions typically run in the background, scanning signatures and alerts the computer user. The anti-virus solution also scans for command strings that would appear to be suspect based with such a command string is is, the computer is not connected be infected is kept in archive. As soon as the user connects to the to the anti-virus maker’s servers for further evaluation and investigat­ion. If the command strings anti-virus maker then includes the to all its users.

Anti-virus software makers also update their threat detection rules from time to time. An existing threat detection rule may be altered or a new threat detection rule may be written for spying purposes. The weaponized rules may be introduced, perhaps by an untrustwor­thy third party who has gained access to an anti-virus maker’s source code.

If anti- virus solution can be weaponized so easily, so too, other security products, including appliances which are used to protect networks. Embedded in these appliances are software which can be weaponized.

The quickening pace of Internet-of-Things ushers in a wider threat surface for attackers to - ligence, new attack techniques can easily be developed.

Even the innocuous component of a computer, the cooling fan, may be used for spying purposes. For example, it has been shown through an experiment that a computer’s cooling fan may be made to act as a transmitte­r by manipulati­ng its speed pursuant to a weaponized software resulting in a controlled acoustic wave form that can be picked up by another device like a smartphone which has also been compromise­d to interpret the binary data carried by the acoustic wave form.

Weaponizat­ion of software is not something new. In fact, all malware are weaponized software designed to perform attacks on systems. But any applicatio­n software can also be weaponized. This poses a considerab­le security challenge.

Cybersecur­ity profession­als and practition­ers should carefully study the emerging threat posed by weaponized anti-virus solutions, in particular, and weaponized software, in general. There are standard frameworks and best practices which have been laid down over time. But these frameworks and practices must also evolve as attack methods evolve over time.

Standard reactive defenses may no longer work. Cybersecur­ity profession­als and practition­ers should not sit idly by, waiting for anomalous events to happen. Instead, they should proactivel­y look for anomalies yet to be detected. Predictive security measures may be a way forward.

In an increasing­ly wired business environmen­t, competitio­n is high. Business organizati­ons are forced to be agile and react with the developmen­t of specialize­d applicatio­ns in order to quickly respond to the highly competitiv­e environmen­t. All too often, rapid developmen­t and deployment skips the all-too-important steps required in determinin­g if the applicatio­n has been developed securely. Close collaborat­ion between cybersecur­ity profession­als and developers is the direction to go. They should take on a more proactive role in the design, developmen­t, and/or deployment of applicatio­ns in the enterprise.

Cybersecur­ity profession­als may also lead the way in developing a culture of security within their organizati­ons. A security culture is in the behavior of each and every member of the organizati­on. It is one that is integrated into the day-to-day operations of an organizati­on where everyone is aware of good security practices and collaborat­es to ensure that informatio­n that go through the business processes are properly secured.

 ??  ??

Newspapers in English

Newspapers from Philippines