How do social networking sites get attacked by hackers? What methods are used? Why are attacks successful? What can be done to improve security on social networks?
These are just some of the questions that are addressed in a recently-published Hacker Intelligence Report by Imperva. The report’s executive summary offers an intriguing glimpse into the hacktivist world that threatens almost every online service. Here’s an excerpt:
“At the end of March 2012, the Lulzsec hackers had attacked http://www.militarysingles.com/ and disclosed sensitive information on more than 170,000 members.
This report analyzes the anatomy of the attack methods deployed by the “new” Lulzsec. Overall, the attack, using Remote File Inclusion, is nothing new. But it underscores how today’s hackers adhere to Sun-Tzu’s maxim: “Strike where your enemy is most vulnerable.” RFI vulnerabilities are prevalent in PHP applications which comprise 77% of total applications on the web.
This attack also underscores the need for proper password encryption. In this case, archaic methods of password encryption meant hackers could decrypt the full list of passwords in just 9 hours.”
The report points out that the main strength of Web 2.0, user-generated content, has become the “Achilles Heel” of the Internet. The reason is the trusted sites can quickly be offering unknown (and untrustworthy) content to other users. Possible examples mentioned include: file execution, local file inclusion, malware hosting, cross-site scripting or phishing. (See the report for a complete description of each example.)
A Government Computer News (GCN) article highlighted the risk that military personnel faced in this particular situation, and also focused on the question: Should government personnel be held to a higher standard when they use social networking websites?
Here’s an excerpt of that article:
“When combining the risks of these types of applications hackers’ increasing use of social engineering tricks to get inside networks and frequent targeting of government users, the report suggests that public employees might need to do more than other people to protect themselves.
… A start on those higher standards would be password encryption on top of strong password policies. The report recommends using SHA-2 hashes, such as SHA-256, as recommended by the National Institute of Standards and Technology, and adding “salt,” or random bits that make cracking the algorithm even more difficult.”
Finally, the Imperva report closes with some additional steps that can help improve security on social networking sites. A few of their recommendations include assigning minimal permissions to uploaded content, hosting user-generated content on different domains or on different machines and implementing more (or all) security controls on the server side and not trusting the client side computer.
I think Imperva did a nice job on this report, and it is worth reading. I came across this piece as a result of the GCN article, but I'd like to hear from other vendors who want to offer their viewpoints on social network hacking as well. (I’d prefer case studies or white paper links from companies be posted to this blog's comment section.)
What steps does your organization take to improve security on social networks? Or, are there other good (free) reports available on this topic that you can share?
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.
During his distinguished career, he has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader.
Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprisewide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.
He currently serves as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor Inc. He is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. He has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and nonprofit institutions.
He has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD for You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington, D.C., to Moscow.
He holds a master's degree in computer science (CS) from Johns Hopkins University in Baltimore, and a bachelor's degree in CS from Valparaiso University in Indiana.
Follow Lohrmann on Twitter at: @govcso
Building effective virtual government requires new ideas, innovative thinking and hard work. From cybersecurity to cloud computing to mobile devices, Dan discusses what’s hot and what works in the world of gov tech.