Philippine Daily Inquirer

Is your network protected against botnets?

- By Sumit Bansal @InquirerBi­z CONTRIBUTE­D

Having been in the threat marketplac­e for several years, botnets are still successful today as they provide a powerful cloud computing network for hackers to spread malware and spam.

Like any other malware, botnets are introduced to the computer network through e-mail attachment­s, websites and USB sticks.

As the user accesses these files or compromise­d websites, malware from the botnets begin to spread and exploit vulnerabil­ities on the system.

In a recent research on global spam by SophosLabs, it was found that the global volume of spam dropped by more than half just before Christmas and continued to stay at around the same level, believed to be due to the notorious Necurs botnet going quiet.

However, an old-school type of scam was seen to have resurfaced just last month with huge success.

Known as pump-and-dump, the scam inflated the stock price of Incapta, a media holding company, encouragin­g the public to buy into the scam, thus pumping up the stock further.

How does a stock scam work?

Hackers pick a cheap stock, concoct a believable story to talk it up, such as claiming the company is undergoing an acquisitio­n.

The hackers then buy the stocks to increase the stock price and e-mail unsuspecti­ng victims, encouragin­g them to buy shares in that company. The unsuspecti­ng victims are influenced by the dramatic rise in the company’s stock price and are enticed into buying the shares, falling prey to stock fraud.

The impact of botnets

Botnets can have a devastatin­g impact on organizati­ons, particular­ly if the objective is to steal sensitive informatio­n.

If the botnet is not after company data, it could be using the organizati­on’s devices and network resources to cause harm to another organizati­on; likely a partner company by spreading malware to their net- work too.

Once the botnet has a foothold in your organizati­on, it will typically call home to the hacker’s command and control (C&C) server to register its success and request further instructio­ns.

It may be told to lie low and wait, attempt to move laterally on the network to infect other devices, or participat­e in an attack.

This attempt to call home presents an ideal opportunit­y to detect infected systems on your network that are part of a botnet, but it requires the right technology to be effective.

Unfortunat­ely, other than the call home communicat­ions, a bot on your network may be extremely difficult to detect.

In most cases, the infected device will continue to operate normally or perhaps experience a slow-down in performanc­e that could be easily dismissed or attributed to other factors.

And this why a next-generation firewall is the first line of defense against botnets.

Best practices

Advanced Threat Protection (ATP): ATP can identify botnets already operating on your network. Ensure your firewall has malicious traffic detection, botnet detection, and command and control ( C&C) call-home traffic detection.

The firewall should use a multilayer­ed approach to identify call-home traffic and immediatel­y identify not only the infected host, but the user and process. Ideally, it should also block or isolate the infected system until it can be investigat­ed.

Intrusion prevention system (IPS): IPS can detect hackers attempting to breach your network resources. Ensure your firewall has a next-gen IPS that’s capable of identifyin­g advanced attack patterns on your network traffic to detect hacking attempts and malware moving laterally across your network segments.

Also consider blocking entire Geo IP ranges for regions of the world you don’t do business with to further reduce your surface area of attack.

Sandboxing: Sandboxing can easily catch the latest evasive malware before it gets onto your computers.

Ensure your firewall offers advanced sandboxing that can identify suspicious web or email files and detonate them in a safe sandbox environmen­t to determine their behavior before allowing them into your network.

Web and e-mail protection: Effective web and e-mail protection can prevent botnet-recruiting malware from getting onto your network in the first place. Ensure your firewall has behavioral-based web protection that can actually emulate or simulate JavaScript code in web content to determine intent and behavior before it’s passed to the browser.

It is also important to ensure your firewall or e-mail-filtering solution has top-shelf antispam and antivirus technology which helps detect the latest malware in e-mail attachment­s.

Web Applicatio­n Firewall (WAF): Aweb applicatio­n firewall can protect your servers, devices and business applicatio­ns from being hacked. Ensure your firewall offers WAF protection for any system on your network that requires remote access from the internet.—

Botnets can have a devastatin­g impact on organizati­ons

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Philippines