Site icon IT World Canada

All Web applications studied had at least one vulnerability, says Trustwave report

Computer Screen Code View

Web developers are still not closing all the security holes in their applications, a new vendor study suggests.

In its 10th annual Global Security Report, (registration required) which looks back at 10 years of analyzing customer data and breaches, Trustwave said all of the of Web applications its researchers tested showed at least one vulnerability. The average had 11.

The overwhelming majority — 85.9 per cent  — of Web application vulnerabilities involved session management allowing an attacker to eavesdrop on a user session to commandeer sensitive information.

The report was released today.

Among other findings:

Trustwave graphic

“As long as cybercrime remains profitable, we will continue to see threat actors quickly evolving and adapting methods to penetrate networks and steal data,” said Steve Kelley, the company’s chief marketing officer. “Security is as much a ‘people’ issue as it is a technology issue. To stay on par with determined adversaries, organizations must have access to security experts who can think and operate like an attacker while making best use of the technologies deployed.”

The report has a wide range of data on compromises and vulnerabilities across many industries.

It also reminds CISOs that the personal touch is still used in some attacks, particularly against hotels and restaurants, in what it calls telephone-initiated spear phishing. “The caller, who often was associated with the Carbanak-targeted attack group, would complain about being unable to make a reservation on the victim’s website and ask to email his details to the staff member. The attacker then emailed a message with a malicious file attached, waited until the victim confirmed they opened the attachment and then hung up the phone.”

Passwords and password management continue to be a weak spot in many enterprises. In one case last year, the report says, an attacker gained remote access to an organization
by exploiting a default administrator account for specialist software. Although the compromised account had minimal privileges, a weak password allowed the attacker
to gain control of a local administrator account. Worse, the same account and password was on every workstation within the environment, and event logs showed the attacker accessing multiple systems using the account. “Surprisingly, although the attacker had access to all data in the environment, including sensitive financial and customer
information, all they did was install ransomware.”

Exit mobile version