NSA Warns Of Russian Hacker Attacks – Industry Comment

By   ISBuzz Team
Writer , Information Security Buzz | Jun 01, 2020 02:29 am PST

Following the NSA’s warning that a Russian hacker group has been exploiting a known vulnerability in Exim, please find commentary from Industry leader.

Subscribe
Notify of
guest
1 Expert Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Wai Man Yau
Wai Man Yau , Vice President
June 1, 2020 10:35 am

The NSA’s revelation that a Russian military group is targeting an open source vulnerability – reported nearly a year ago – is an extreme example of what can happen when businesses don’t practice proper software hygiene.

With as many as 57% of publicly reachable mail-servers on the Internet using Exim, if businesses are using unpatched versions, the scale of attacks could be huge. The flaw has been listed on National Vulnerability Database since 2019, and safe versions are available, so in theory, companies should be protected. But theory and practice are sadly very different, and all too often companies fail to fix faults in their software.

The incident once again brings software hygiene to the fore, and underscores the urgent need for businesses to maintain a software ‘bill of materials’ to manage, track and monitor components in their applications, and to identify, isolate, and remove vulnerabilities like this one. Without one, they’re in a race against time to try and find the flaw before their adversaries do. Yet worryingly, only 53% of organisations track what’s going into their software.

Companies using Exim must patch their software urgently to prevent a breach. However, it’s important that as an industry, we recognise that these kinds of attacks aren’t isolated events. Vulnerabilities that are known, but older, are prime targets for attack campaigns – companies without open source practices may forget such flaws exist. But hackers won\’t. This latest incident shows that it has become open season on open source, and until software supply chain security best practices becomes commonplace, hacker groups will continue to target such applications.

Last edited 3 years ago by Wai Man Yau

Recent Posts

1
0
Would love your thoughts, please comment.x
()
x