junaid

Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

The Malware Cloud Concern

This year we’ve had two cyber attacks in which malware was used to cripple government computer systems. Unless counter-measures are deployed, similar malware attacks can be used against cloud and IoT infrastructure.

2017 started with the Shamoon2 cyber attack on Saudi Arabian government systems.  The attack wiped out data on 50,000 compute devices and servers.  More recently a cyber attack against the Ukraine government called NotPetya wiped out data as well as disabled energy management systems.

The destructive power of both malware attacks derived from the difficulty to patch large numbers of compute devices. Thus while the attacks were not “zero-day”, cyber attackers created weapons-grade malware by adding the ability to laterally search for vulnerable systems.

For organizations migrating to the cloud or deploying IoT infrastructure the recent cyber attacks should be a wake up call to the destructive power of malware that can autonomously hunt for targets!

The increasing number of personal compute devices and supply chain partners connecting to enterprise clouds makes universal endpoint protection impossible. Subsequently, malware can find and propagate from infected compute devices to cloud-based applications. Once infected, hosted apps can become malware super spreaders. However as bad as the risk of malware is to enterprises, the risk to IoT systems is even greater.

The new generation of IoT devices has the ability to autonomously communicate locally and globally.  As IoT devices come in hundreds of different variations with specialized software modules, patching IoT systems is far more difficult than personal compute devices.

Infected IoT devices can spread malware from autonomous vehicles and energy management systems to consumer products and cloud computers – and then back again.  A malware attack on billons of networked IoT devices would take months or years to correct.

Biometric Authentication

Fortunately there is a proven counter-measure to weapons-grade malware that is a Software Defined Perimeter (SDP) based application layer access control solution.

Vidder developed an application layer access control solution under the PrecisionAccess brand two years ago.  At that time enterprises with high value intellectual property wanted a counter-measure agianst the Office of Personnel Management (OPM) cyber attack.

The OPM attack utilized stolen credentials in combination with lateral movement to find classified data that was hidden deep in the data center.  To ensure similar attacks didn't happen again, Vidder developed an access solution that verified identity (to stop credential theft) and then provisioned an application layer tunnel (to stop lateral movement).

Application layer access control protects cloud assets by ensuring only authorized devices are granted connectivity.  Only whitelisted applications on the user’s device are allowed access to a specific port on the application server.  If a hosted app should become infected, application layer connectivity ensures that malware can’t spread from the cloud back to the user’s device.

Similarly application layer access control can protect IoT infrastructure from lateral movement malware by only allowing authorized process-to-process connectivity.  Subsequently malware cannot re-task IoT devices or backend cloud infrastructure.

With cyber attackers now developing malware that can hunt for vulnerable compute devices, we must deploy proven counter-measures to protect cloud and IoT assets.  Application layer access control, such as Vidder's PrecisionAccess, is a proven counter-measure that should be deployed before disaster strikes.

###

By Junaid Islam

Junaid is the CTO and founder of Vidder which provides distributed access control solutions for large Enterprise and IoT systems. Prior to founding Vidder, Junaid founded Bivio Networks which developed the first Gigabit speed security platform in the industry. Earlier in his career Junaid helped create networking standards such as Frame Relay, ATM and MPLS while at StrataCom and Cisco. 

In addition to his technical achievements, Junaid has also made significant contributions to his local community as well as network industry. Junaid was the Human Relations Commissioner of Santa Clara County (Silicon Valley) from 2002 to 2009. Currently Junaid is leading the development of the Software Defined Perimeter (SDP) standard. The Cloud Security Alliance (CSA) awarded Junaid the Ron Knode Award and gave him the title of Research Fellow in recognition of his technical contributions.

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information, resources and thought leadership services.

Contact us for a list of our leading programs.

How to Improve the Backup Success Rate of Data Centers?

How to Improve the Backup Success Rate of Data Centers?

Improve Backup Success Rate According to industry analysts, a significant number of backup jobs (from 5 to 25%) are failing across various tiers of data centers. This impacts datacenters heavily on revenue loss, SLA-based penalties, ...
Global Public Cloud Spending To Double By 2020

Global Public Cloud Spending To Double By 2020

The Cloud and Endpoint Modeling The worldwide migration of IT resources to the public cloud continues, at a head-spinning pace. Global public-cloud spending was forecast to reach $96.5 billion in 2016, according to IDC — ...
Are you being served by an empathetic Bot! And do you even care?

Are you being served by an empathetic Bot! And do you even care?

Are you being served by an empathetic Bot! Move over chatbots - it is time for the empathetic bot. Say what? Recall the American Airlines snafu with the passenger and her baby. Coming on the ...
What Skills Do I Need to Become a Data Scientist?

What Skills Do I Need to Become a Data Scientist?

Becoming a Data Scientist Leveraging the use of big data, as an insight-generating engine, has driven the demand for data scientists at enterprise-level, across all industry verticals. Whether it is to refine the process of ...
MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape Mapping the customer journey is one of the biggest strategic shifts currently underway in the marketing industry. With the rise of social media, the way customers interact with brands has changed forever ...

CLOUDBUZZ NEWS

Cambridge Analytica files for bankruptcy in U.S. following Facebook debacle

Cambridge Analytica files for bankruptcy in U.S. following Facebook debacle

(Reuters) - Cambridge Analytica, the political consultancy at the center of Facebook Inc’s (FB.O) privacy scandal, filed for Chapter 7 bankruptcy in the United States late on Thursday. This past March allegations surfaced that Cambridge ...
China Approves Toshiba's $18 Billion Sale of Its Memory-Chip Unit

China Approves Toshiba’s $18 Billion Sale of Its Memory-Chip Unit

TOKYO—Private-equity firm Bain Capital received approval from Chinese antitrust regulators for its deal to buy Toshiba Corp.’s memory-chip unit, a person familiar with the matter said Thursday. A Bain-led consortium reached the $18 billion deal ...
Researchers combine wearable technology and AI to predict the onset of health problems

Researchers combine wearable technology and AI to predict the onset of health problems

A team of Waterloo researchers found that applying artificial intelligence to the right combination of data retrieved from wearable technology may detect whether your health is failing. The study, which involved researchers from Waterloo’s Faculties ...
The Lighter Side Of The Cloud - Checking It Twice
The Lighter Side Of The Cloud - Wearable Infection
CloudTweaks Comic
The Lighter Side Of The Cloud - Autonomous Sleigh
The Lighter Side Of The Cloud - Passwords
The Lighter Side Of The Cloud - F96qL#5
The Lighter Side Of The Cloud - Direct Reporting
The Lighter Side Of The Cloud - The Letter "G"
The Lighter Side Of The Cloud - Day 5