Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Stonesoft Comments On Anonymous Kremlin Attack

Stonesoft Networks : 10 May, 2012  (Technical Article)
Kremlin website attack linked to similar attacks using advanced techniques to infiltrate systems
Stonesoft Comments On Anonymous Kremlin Attack
In light of the news that the Kremlin’s websites had been hacked by the Russian branch of Anonymous, Ash Patel, country manager for UK & Ireland of Stonesoft comments on how the attack happened and what other organisations can do to prevent it happening to them:
 
“With a group such as Anonymous, one can never be certain as to who exactly is behind the cyberattack. For some time now, Anonymous has been attacking the sites of many government bodies and for that reason, there’s no denying that one motivation behind the attack on the Kremlin’s websites, is political.

“In recent months, we’ve seen a number of attacks similar to this – all with similar characteristics. One question that needs to be addressed is, how were the attackers able to infiltrate systems? And if they got that far, what else are they able to do? One answer to this is the use of techniques such as Advanced Evasion Techniques (AETs), which allow hackers the opportunity to deliver malware to targeted devices, easily manoeuvring past security systems, without being detected.

“Another questions such attacks raise is, “what else is going on in the background?”. The use of AETs gives hackers have the ability to manipulate systems, and even allows them to be able to steal data without being traced. What is known about AETs is that inadequate protection against AETs means that it can often take some time before companies notice if a hacker was there to either wreak havoc or to take valuable information.

“It’s currently unknown just how much havoc attackers have been able to cause just by using AETs. However, for larger corporations, there’s no doubt that these advanced techniques pose a real and great threat, highlighting to a wider audience weaknesses in infrastructure. One thing that is for certain though, is that organisations should be worried about AETs.

“Luckily, there are solutions available – one being for organisations to speak to security providers about increasing their levels of protection – implementing Next Generation Firewalls or Next Generations IPS’ is one step in the right direction.”
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo