Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Firewalls defenceless against new attack, security vendor claims

Is 'AET' packet probing behind major attacks?

Article comments

Why are apparently well-defended networks belonging to the government, military and monied corporates falling to large-scale targeted attacks so regularly?

According to Finnish security vendor Stonesoft, part of the answer could lie with what the company terms ‘Advanced Evasion Techniques’ (AETs), jargon for an obscure class of packet-based probing at the ground level of the TCP/IP stack that firewalls are designed to stop.

The trouble, claims Stonesoft, is that for a clutch of 31 obscure AETs nobody has paid much attention to until recently, the protection level turns out to be close to zero.

It’s a contentious claim and the evidence is hazy, but does it stand up? Just about, although the hard-to-assess bit is whether such attacks have actually been used to do any real damage. It's also fair to point out that PCs are often the biggest target in many attacks and these don't necessarily require fancy hacking to reach out to.

The role of AETs is to probe for vulnerable servers and other systems in an industrial and automated way without being detected by security systems. In Stonesoft’s analysis, the range of AETs being employed against networks is far greater than previously believed, and they are being combined in complex, multiprotocol probes that firewalls just can’t see.

If accurate, this sounds significant. It means that every firewall in the world is unable to detect probes used to hunt down servers vulnerable to the application-layer exploits that fuelled major cyber-infrastructure incidents of recent times such as Stuxnet and this year’s Aurora attacks on Google and others.

The company arrived at its conclusion, it said, after trying to fix problems in its own security appliances during certification programs, during which it built its own testing tools.

“The dynamic and undetectable nature of these advanced evasion techniques has the potential to directly affect the network security landscape,” said Stonesoft COO, Juha Kivikoski. “The industry is facing a non-stop race against this type of advanced threats and we believe only dynamic solutions can address this vulnerability.”

It has no direct evidence that high-profile attacks have been preceded by AET probing but suspects that given the vulnerability of firewalls they have uncovered, they might turn out to be a missing ‘missing link’ in an unknown number of incidents.

Stonesoft reported its findings to CERT-FI in Finland some time ago and has had the results verified by leading certification organisation, ICSA Labs, which lends some support to its claims.

A contentious issue is what can be done to patch the problem in security appliances, which covers intrusion prevention systems, firewalls, and even major classes of router.

Stonesoft pins some of the blame on the ASIC-based design of modern appliances, which is supposed to improve performance but at the cost of baking in static security rules and defences into hardware. Conveniently, its own design is based on virtual appliances driven by software, which would be easier to update or ‘patch’ dynamically to take account of emerging AETs.

This key question is whether AETs are important to modern cybercrime and it seems plausible that in some form they might be. It has long been assumed that advanced probing and bypassing techniques were used by hackers who, understandably, failed to document the success of such techniques.  What Stonesoft has possibly uncovered found the assumption that they couldn’t or wouldn’t be used in sophisticated combinations is probably out of date at the very least.   

Intrusion prevention systems (IPS) have a spotty record at best for blocking carefully-crafted attacks and some have even questioned whether they are worth bothering with at all.

The company has published more detail on AETs on a special website. Prepare for rival firewall and security companies to rubbish its claims as marketing spin.



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *