Equifax breach highlights the importance of layered security

by | 09-09-2017 | Blog

More evidence points to the use of a zero-day exploit in the recent Equifax breach, as the hack took place 4 months after the public disclosure of the vulnerability. This is why the world needs layered security.

Why attacks are still successful

A simple application firewall blocks this specific attack. A monitoring solution would have discovered attack patterns. Through Digital Risk Monitoring and vulnerability management, the visibility of Struts in their attack surface would have been limited.

Why most attacks are succesful:

  1.  Vulnerability management is only implemented on the main website (www.<company>.xyz)
  2.  Vulnerability management is not a continuous process
  3.  Organizations do not know their entire online attack surface

A simple model (based on OSI/NIST) would mitigate most attacks:

  1. Continously monitor your attack surface using Digital Risk Monitoring
  2. Perform continuous vulnerability assessment
  3. Make security a process, not a technical add-on

role of cybersprint in a healthy architecture

Check your attack surface

In March we already had a test run with the previous Struts bug. You can easily check if you are vulnerable by checking for the presence of “Java” server-side applications.

If you need help with finding out whether you are vulnerable, contact us.

Official statement by the Apache foundation in response to the Equifax report: https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax

[iub-cookie-policy]

[/iub-cookie-policy]

Meet Cybersprint at StrategieTage IT Security

On 12 and 13 February 2019, Cybersprint will be present at the ‘StrategieTage IT Security’ congress in Cologne, Germany. The congress features presentations, prearranged meetings, workshops, and the opportunity to network with over 150 potential business partners in IT Security.

read more

Cybersprint Newsletter

All insights, No spam

Cybersprint Newsletter

All insights,
No spam

Cybersprint respects your privacy, read our privacy statement

Cybersprint respects your privacy,
read our privacy statement

Do you have a question?

Our specialists have the answers