By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Defending your network against APTs
Share
Aa
TechgoonduTechgoondu
Aa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Defending your network against APTs
Enterprise

Defending your network against APTs

Techgoondu
Last updated: August 6, 2015 at 2:59 PM
Techgoondu Published August 3, 2015
7 Min Read
SHARE

Brought to you by WatchGuard

With cybersecurity on the agendas of corporate boardrooms today, the importance of securing critical data assets is now a strategic issue that is no longer just a matter for IT departments.

That is because sophisticated and persistent attackers today are more capable than ever in breaking down the defences of even the most well-guarded organisations, using methods that are often difficult to predict.

Take advanced persistent threats (APTs), for example. These threats take advantage of advanced techniques such as encrypted communications, kernel-level rootkits, and sophisticated evasion capabilities to get past a network’s defences.

More importantly, they often leverage zero day vulnerabilities – flaws for which no patch is available yet and no signature has been written.

In 2012, WatchGuard Technologies Inc. discovered four zero day vulnerabilities that were being exploited in the wild. In 2013, the number of alerts for such threats rose to over a dozen.

As the APT moniker suggests, such threats remain persistent and threaten not only nation states, but also the livelihoods of organisations large and small by stealing valuable information such as credit card numbers of customers and proprietary corporate information.

The most high-profile APT reported in recent memory was the 2013 breach at US retail giant Target. The perpetrators first stole the credentials of a contractor to access Target’s computer systems, before installing a malware in the retailer’s point-of-sale registers to harvest some 40 million credit card numbers of Target customers across the United States.

The consequences of such a breach can be enormous. Sales at Target were down almost 50 per cent during the fourth quarter of 2013, largely due to the bad press around the security breach. Its stock price also fell by 9 per cent in the aftermath of the incident.

In the months following the Target breach, other large retailers revealed episodes of data loss. By the end of July 2014, the US Department of Homeland Security issued a warning that the malware used in Target’s data breach and its variants had compromised over 1,000 networks.

Detecting such malware, which usually employs advanced techniques such as encryption and other sophisticated capabilities to avoid detection by signature-based antivirus software, is not easy.

According to a study by security specialist Lastline, just over 50 per cent of anti-virus software were able detect new malware samples. This increased to 60 per cent after two weeks, indicating a time lag before new malware gets noticed. Worse still, some malware fell through the cracks for months, while others could not be detected at all.

Part of this is due to a key problem of using virtual machines, or sandboxes, to monitor malware activity, which could appear to be normal. In addition, sandboxes are often unable to detect communications – or system calls – between various components of an operating system. This “blind spot” can be exploited by malware writers.

Instead of using virtualisation techniques, an approach known as “full system emulation” is more effective in combating APT attacks. By emulating physical hardware such as a processor and memory, full system emulation is able to replicate every system call, thus providing the deepest level of visibility into malware behaviour while staying undetected.

Defending Against Advanced Persistent Threats With WatchGuard’s APT Blocker

WatchGuard’s APT Blocker, which has been recently named a recipient of Frost & Sullivan’s 2015 New Product Innovation Award, is a good example of how full system emulation can protect organisations against APTs. It’s a security service that can be added to any of WatchGuard’s Unified Threat Management (UTM) and Next Generation Firewall (NGFW) appliances.

Leveraging technology from global breach detection provider Lastline, the company behind the Anubis tool used by researchers to analyse files for potential malware, APT Blocker works by fingerprinting computer files and checking them against an existing database on a WatchGuard appliance.

If it encounters an unknown file, it will analyse the file using a system emulator on the cloud that looks out for malicious activities and evasion techniques that other sandboxes may miss.

While malware programmes are immediately blocked at the firewall, a file that poses a zero day threat may pass through while analysis is taking place in the cloud. In such cases, the WatchGuard system can immediately alert IT managers that a suspected piece of malware is lurking somewhere on the network.

WatchGuard APT Blocker was developed together with Lastline, the company behind the Anubis tool used by researchers to analyse files for potential malware.

WatchGuard’s APT Blocker not only excels in detection capabilities, it also sends out useful alerts, complete with detailed activity reports for each file that has been identified as malware.

This addresses a key pain point faced by IT managers each day: being inundated with heaps of log data that they find suspicious and hard to make sense of – and thus brushed off.

Target, for example, ignored the log files gathered a couple of days after the first breach, while US retailer Neiman Marcus, which fell victim to a similar data breach, missed over 60,000 log incidents that indicated the presence of malware on their network.

With WatchGuard’s range of appliances, IT managers will receive e-mail alerts, real-time log analysis and the ability to drill deeper to find more information, going beyond a simple alert indicating that a file is suspicious. A detailed malicious activity report is also provided for each piece of potential malware.

You can get a free 30-day APT Blocker trial on all WatchGuard UTM and NGFW appliances. The service is fully integrated with WatchGuard Dimension, the award-winning security intelligence and visibility solution that comes free with all WatchGuard security appliances.

To learn more about WatchGuard appliances and other best-of-breed security services WatchGuard delivers on its UTM and NGFW platforms, visit www.watchguard.com/wgrd-products.

You Might Also Like

Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage

RedCap: A new cellular IoT technology for the 5G era

Q&A: Delivering movies digitally and securely from around the world

In remote Taiwan, firefighters use a 5G base station “in a box” when responding to emergencies

Sensing strong demand, Tata Comms pitches “hyperconnected” ecosystems

TAGGED: antivirus, APTs, malware, security

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Techgoondu August 3, 2015
Share this Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Copy Link Print
Share
Previous Article OnePlus 2 turns up in Singapore, but is it a flagship killer?
Next Article As smartphones get cheaper, Singapore telcos rethink old strategies
Leave a comment

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

Facebook Like
Twitter Follow

Latest News

As TikTok faces a possible ban in the US, should users elsewhere be worried?
Cybersecurity Internet March 24, 2023
Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage
Enterprise Internet March 23, 2023
RedCap: A new cellular IoT technology for the 5G era
Enterprise Software Telecom March 23, 2023
Sony Playstation VR2 review: An immersive experience awaits
Gaming March 21, 2023
//

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
Follow US

© 2023 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact

Join Us!

Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Lost your password?