Lieberman Software says chemical company hacker attacks could have been prevented

London, (PresseBox) - Commenting on reports from Symantec that hackers targeted nearly 30 companies in the chemical industry this summer with the intent of stealing sensitive IP (intellectual property), Lieberman Software says that this latest cyber crime wave cries out for privileged identity management technology.

According to Philip Lieberman, President and Chief Executive Officer of the identity management specialist, while Digital Rights Management (DRM) is often proposed as a panacea for IP security, the reality is that the types of attacks identified in Symantec's research use a 'spear phishing' methodology that carefully targets the email recipient and fools them into compromising their IDs and passwords.

"Spear phishing pierces DRM systems like a hot knife cutting through butter. Privileged identity management, on the other hand, limits the damage that compromised account credentials can cause, and can actually stop hackers from gaining access to private data following a security breach," he said.

"The fact that these firms include Fortune 100 companies that undoubtedly have experienced IT security professionals working for them - and yet they were still victimized by hackers - tells us that sophisticated cyber attacks stand a good chance of getting through the defences that large corporations have in place," he added.

Against this backdrop, the Lieberman Software president went on to say, privileged identity management controls can act as a last line of defence against hackers gaining access to administrator level accounts, preventing the intruders from effectively gaining full control over an organisation's IT resources.

Put simply, he explained, with a privileged identity management system in place, should hackers ever gain access to one of more user accounts, the intruders will only have limited, localized rights and will encounter cryptographically complex administrative passwords that are impractical to crack with today's technology.

"The fact that these victim organizations are developing new materials for military vehicles, advanced manufacturing infrastructure, and other strategic technologies is very worrying, as it means that there may be more than a simple economic crime perpetrated here," said Lieberman. He added that these attacks are also interesting as they reportedly used a backdoor Trojan called Poison Ivy.

"Poison Ivy uses distant command-and-control servers to gain remote control over compromised systems, which suggests to me a degree of professionalism amongst the hackers. It seems like this should be clear wake-up call to organisations that fail to secure their privileged identities."

For more on Lieberman Software: www.liebsoft.com

For more on the Poison Ivy chemical business hacker attacks: http://bit.ly/upFD5a

Lieberman Software Corporation

Lieberman Software provides privileged identity management and security management solutions that protect the multi-platform enterprise. By automating time-intensive IT administration tasks, Lieberman Software increases control over the computing infrastructure, reduces security vulnerabilities, improves productivity and helps ensure regulatory compliance. As Pioneers of Privileged Identity ManagementSM Lieberman Software not only developed the first software solution to address this need, its products continue to lead the market in features and functionality. The company is headquartered in Los Angeles, CA with an office in Austin, TX and channel partners throughout the world. For more information, see www.liebsoft.com.

Product and company names herein may be trademarks of their registered owners.

Press releases you might also be interested in

Weitere Informationen zum Thema "Sicherheit":

Geteilte Verantwortung bringt doppelte Sicherheit

Un­ter­neh­men be­nö­t­i­gen zu­neh­mend die Fle­xi­bi­li­tät der Cloud. Aber dort dro­hen neue Ge­fah­ren. Die Platt­for­men der Ser­vice Pro­vi­der sind zu­meist si­cher – aber vie­len Un­ter­neh­men fehlt die Ex­per­ti­se, An­wen­dun­gen und Da­ten in der Cloud an­ge­mes­sen zu schüt­zen. Cloud Ac­cess Se­cu­ri­ty Bro­ker (CASB) kön­nen hel­fen, die­se Lü­cke zu sch­lie­ßen.

Weiterlesen

Subscribe for news

The subscribtion service of the PresseBox informs you about press information of a certain topic by your choice at a choosen time. Please enter your email address to receive the email with the press releases.

An error occurred!

Thank you! You will receive a confirmation email within a few minutes.


I want to subscribe to the gratis press mail and have read and accepted the conditions.