Lieberman Software says chemical company hacker attacks could have been prevented
According to Philip Lieberman, President and Chief Executive Officer of the identity management specialist, while Digital Rights Management (DRM) is often proposed as a panacea for IP security, the reality is that the types of attacks identified in Symantec's research use a 'spear phishing' methodology that carefully targets the email recipient and fools them into compromising their IDs and passwords.
"Spear phishing pierces DRM systems like a hot knife cutting through butter. Privileged identity management, on the other hand, limits the damage that compromised account credentials can cause, and can actually stop hackers from gaining access to private data following a security breach," he said.
"The fact that these firms include Fortune 100 companies that undoubtedly have experienced IT security professionals working for them - and yet they were still victimized by hackers - tells us that sophisticated cyber attacks stand a good chance of getting through the defences that large corporations have in place," he added.
Against this backdrop, the Lieberman Software president went on to say, privileged identity management controls can act as a last line of defence against hackers gaining access to administrator level accounts, preventing the intruders from effectively gaining full control over an organisation's IT resources.
Put simply, he explained, with a privileged identity management system in place, should hackers ever gain access to one of more user accounts, the intruders will only have limited, localized rights and will encounter cryptographically complex administrative passwords that are impractical to crack with today's technology.
"The fact that these victim organizations are developing new materials for military vehicles, advanced manufacturing infrastructure, and other strategic technologies is very worrying, as it means that there may be more than a simple economic crime perpetrated here," said Lieberman. He added that these attacks are also interesting as they reportedly used a backdoor Trojan called Poison Ivy.
"Poison Ivy uses distant command-and-control servers to gain remote control over compromised systems, which suggests to me a degree of professionalism amongst the hackers. It seems like this should be clear wake-up call to organisations that fail to secure their privileged identities."
For more on Lieberman Software: www.liebsoft.com
For more on the Poison Ivy chemical business hacker attacks: http://bit.ly/upFD5a
Lieberman Software Corporation
Lieberman Software provides privileged identity management and security management solutions that protect the multi-platform enterprise. By automating time-intensive IT administration tasks, Lieberman Software increases control over the computing infrastructure, reduces security vulnerabilities, improves productivity and helps ensure regulatory compliance. As Pioneers of Privileged Identity ManagementSM Lieberman Software not only developed the first software solution to address this need, its products continue to lead the market in features and functionality. The company is headquartered in Los Angeles, CA with an office in Austin, TX and channel partners throughout the world. For more information, see www.liebsoft.com.
Product and company names herein may be trademarks of their registered owners.
Press releases you might also be interested in
Weitere Informationen zum Thema "Sicherheit":
Geteilte Verantwortung bringt doppelte Sicherheit
Unternehmen benötigen zunehmend die Flexibilität der Cloud. Aber dort drohen neue Gefahren. Die Plattformen der Service Provider sind zumeist sicher – aber vielen Unternehmen fehlt die Expertise, Anwendungen und Daten in der Cloud angemessen zu schützen. Cloud Access Security Broker (CASB) können helfen, diese Lücke zu schließen.Weiterlesen