{"id":97,"date":"2011-02-27T16:05:22","date_gmt":"2011-02-27T21:05:22","guid":{"rendered":"http:\/\/techtonictimes.com\/?p=97"},"modified":"2015-07-26T11:58:18","modified_gmt":"2015-07-26T11:58:18","slug":"sniper","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/","title":{"rendered":"Sniper"},"content":{"rendered":"<blockquote>\n<p style=\"text-align: center;\"><span style=\"color: #333399;\"><strong>&#8220;The Wall Street Journal reported that outsiders had repeatedly penetrated the computer network of Nasdaq OMX Group during the past year.&#8221;<\/strong><\/span><\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\">Convicted\u00a0 D.C\u00a0 sniper, John Allen Muhammad, along with his 17-year old accomplice, Lee Boyd Malvo, terrorized the Washington region in September and October 2002 as they engaged in a series of apparently random sniper attacks. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\">Sixteen\u00a0people were shot. Ten died.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\">Theirs,\u00a0though random in nature,\u00a0resembles the ongoing Cyber warfare that stalks perhaps some of the best security processes that are in place in organizations like the Nasdaq. The great differentiators? Cyber Warfare is systematic and targeted.\u00a0And sometimes they are quite sophisticated.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\">This month\u00a0the company that\u00a0owns the Nasdaq Stock Market confirmed that its computer network has been infiltrated specifically by way of a service that allows the leaders of companies, including board members, to securely share confidential documents. <\/span><span style=\"color: #333333;\">These\u00a0persistent reminders\u00a0to secure\u00a0the enterprise by employing a multi-layered approach is hopefully becoming less debatable among IT professionals\u00a0considering the\u00a0 onslaught of security breaches\u00a0even though we are less than two months into the new year. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\">Among the casualties of 2011 to date are, eHarmony and five multination oil and gas companies.\u00a0And in each case the snipers were laser focused on stealing\u00a0critical proprietary information..\u00a0\u00a0\u00a0In the case of the oil and gas companies, McAfee\u00a0 reported that the &#8220;hackers got into its\u00a0computers, one of two ways, either through their public websites or through infected emails sent to company executives.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\">Yet while the\u00a0debate may be subsiding, it is questionable whether preventative measures to secure new security gaps in the enterprise, once\u00a0identified, are treated with the urgency that they demand. I have encountered many organizations who readily agree with the\u00a0findings of a gap analysis as it relates to the security of their network but\u00a0have settled into complacency; &#8216;we don&#8217;t have the budget,&#8217; or &#8216;the tools we have in place <em><strong>should <\/strong><\/em>do the job.&#8217; And they do, until there is an attack.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\">In the case of Nasdaq, Bit9&#8217;s Endpoint Security solution would have been a formidable defense against the Advanced Persistent Threat (APT) that was leveled against it. <\/span><span style=\"color: #333333;\">The attack included malware delivered by clicking on either a web page, email or an attachment which enabled suspicious files to use a backdoor to deliver additional malware and execute commands.\u00a0 In this instance, as it is with most APTs, the &#8216;Sniper&#8217; was state-sponsored. Russia.<br \/>\n<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\">Bit9&#8217;s Parity suite would have detected and blocked the attack. Inherent in its function, is the capacity to maintain a live inventory of all software on all systems. Therefore,\u00a0 all stalkers\u00a0 attempts to infiltrate its computers would have failed. Additionally,\u00a0Parity Suite leverages its baselining feature to identify suspicious files outside of the approved set of software or its White List.\u00a0 It further utilizes the software reputation service to identify suspicious files or anomalies. Once the first computer is attacked, subsequent computers would have been immediately identified and a command to stop the propagation across all systems would have been executed or banned. <\/span><\/p>\n<p style=\"text-align: justify;\">Consider the statistics in light of the complacency that I often encounter:<\/p>\n<ul>\n<li><strong><span style=\"color: #000000;\">Symantec sees nearly 2 million threats every day<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #000000;\">McAfee generates 55,000 unique signatures every day, and estimates there are 2 million malicious web sites appearing every month<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #000000;\">Sophos recieves 95,000 malware samples everyday, and detected\u00a0 100,000 new fake antivirus products just in December.<\/span><\/strong><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">And bear in mind that there is nothing random about these attacks. Is the risk worth <\/span>it?<\/p>\n<p style=\"text-align: center;\"><a title=\"End Point Security\" href=\"http:\/\/www.abrahamsconsulting.com\" target=\"_blank\"><em>http:\/\/www.abrahamsconsulting.com<\/em><\/a><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\"><br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Random Bullets vs. Smart Bullets<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,1137,11],"tags":[24,62,67,69,85,96,98],"class_list":["post-97","post","type-post","status-publish","format-standard","hentry","category-endpoint-security","category-software","category-vetting-technology","tag-bit9-parity-suite","tag-malware","tag-mcafee","tag-nasdaq-attack","tag-random-attacks","tag-symantec","tag-targeted-attacks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sniper - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sniper - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Random Bullets vs. Smart Bullets\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2011-02-27T21:05:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-26T11:58:18+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Sniper\",\"datePublished\":\"2011-02-27T21:05:22+00:00\",\"dateModified\":\"2015-07-26T11:58:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/\"},\"wordCount\":578,\"commentCount\":1,\"keywords\":[\"Bit9 Parity Suite\",\"Malware\",\"McAfee\",\"Nasdaq attack\",\"random attacks\",\"Symantec\",\"targeted attacks\"],\"articleSection\":[\"Endpoint Security\",\"Software\",\"Vetting Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/\",\"name\":\"Sniper - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"datePublished\":\"2011-02-27T21:05:22+00:00\",\"dateModified\":\"2015-07-26T11:58:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sniper\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sniper - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/","og_locale":"en_US","og_type":"article","og_title":"Sniper - TechTonic Times","og_description":"Random Bullets vs. Smart Bullets","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/","og_site_name":"TechTonic Times","article_published_time":"2011-02-27T21:05:22+00:00","article_modified_time":"2015-07-26T11:58:18+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Sniper","datePublished":"2011-02-27T21:05:22+00:00","dateModified":"2015-07-26T11:58:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/"},"wordCount":578,"commentCount":1,"keywords":["Bit9 Parity Suite","Malware","McAfee","Nasdaq attack","random attacks","Symantec","targeted attacks"],"articleSection":["Endpoint Security","Software","Vetting Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/","name":"Sniper - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"datePublished":"2011-02-27T21:05:22+00:00","dateModified":"2015-07-26T11:58:18+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/sniper\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Sniper"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/97","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=97"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/97\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=97"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=97"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=97"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}