You are on page 1of 7

Safer web browsing in four steps

Technology to help you reduce risk


by Chris McCormack, Product Manager, and John Metzger, Senior Product Marketing Manager

The web is now the cybercriminals favored means of attack, with a newly infected
website discovered every few seconds. Hijacked trusted sites, poisoned search
results, fake anti-virus software and phishing websites are a sample of the exploits
that hit users browsers every day. That leaves your business in a bind: Accessing
the web poses enormous risks, yet you cant afford to be isolated from the
internet and its resources. This white paper examines the latest web threats, and
recommends four best practices and a layered approach that enables your users
while also protecting your organizations endpoints, network and data.

To crush the threats without squeezing user productivity, your organization must
Safer web browsing
take generally accepted preventive steps that include rigorous software patching, in four steps:
strong passwords and user education about the hazards of browsing. As essential
1. Limit exposure on the web
as these actions are, you need more. Traditional URL filtering solutions cannot
keep up with todays risks because they are slow to update and cant catch 2. Block threats at the source
emerging threats in real time. It takes a comprehensive best practices approach
3. Reduce your vulnerabilities
to web protection to keep your users and your organization safer.
4. Prevent data theft and loss

Safer web browsing in four steps-Technology to help you reduce risk


Safer web browsing in four steps
Technology to help you reduce risk

Understanding internet threats browser, browser plug-in, application or operating


systemthat is, an unpatched vulnerability. Other threats
Organized criminals generate a steady onslaught of web- depend on deceiving the user, and may or may not also
borne threats to exploit newly discovered vulnerabilities exploit a technical vulnerability.
and to evade detection by security software. Much of their
dirty work is automated so they can perpetrate misdeeds Criminals have no shortage of techniques for exploiting the
widely with little effort and cost. Although specific attacks weaknesses in technology and human behavior. Whats
can come and go rapidly, the following four dimensions will more, hackers often combine multiple techniques. The
help you understand the problems and the harm they inflict. drive-by download is one example common to hijacked
trusted sites and known malicious sites. Users simply have
to visit a site to download malicious code that exploits a
Limited exposure: Where web threats lurk vulnerable browser or plug-in, without the users knowledge.

Known malicious or risky websites arent the only places Other attacks rely on trickery. Social engineering attacks
where cybercriminals host their wares and scams. use links on blogs, forums and social network sites to
Compromising legitimate sites is an increasingly common entice users to view or download content, only to infect
tactic because visitors believe what they find on trusted them with malware or mislead them into providing
sites. News, technology, ecommerce, government, private information. Phishing is a specific kind of social
military, sports, entertainment and social networking sites engineering where criminals sites pose as legitimate sites
all have been subverted. (Visit Sophos at www.sophos. to acquire sensitive data such as visitors passwords and
com/security/topic/recently-infected-sites.html for a account numbers.
sampling of recent incidents.)
In SEO poisoning, hackers exploit search engine
Files downloaded from websites present another peril optimization strategies to get their malware-laden sites
because they can be vehicles for malware. Some file ranked highly on common search terms. To lure visitors,
types, including .exe and .dll files, carry extra risk; they blackhat SEO campaigns abuse breaking news and other
are often disguised as something legitimate but may trending topics. Past examples include celebrity deaths
harbor a virus or other malicious code. such as Michael Jacksons, and natural disasters such as
the Haiti earthquake in 2010.

Block them at the source and reduce your


vulnerabilities: How infections occur

For a threat to successfully infect a website visitor, that


threat needs to exploit some weakness in the users

Safer web browsing in four steps-Technology to help you reduce risk 2


Safer web browsing in four steps
Technology to help you reduce risk

Prevent data theft and loss: What Layers of web protection


happens when your computer is infected
A chain of events must occur for hackers to succeed. You
Some exploits involve browser hijacking, in which increase your opportunities to break that chain when you
malware takes over the browser and/or changes settings use layers of security, such as those listed below, in a
such as the home page to redirect users to more malware defense-in-depth strategy:
or phony sites.
Productivity filtering
Other malware scares users into thinking their computers Live URL filtering
have a virus and leads them to buy fake anti-virus Proxy filtering
software. In one notable attack, a poisoned ad stream on File type control
The New York Times website led visitors to download fake Anti-malware
anti-virus software that compromised their Windows PCs. HTTPS filtering
Application control
Data theft and financial loss occur when malware Data loss prevention (DLP)
or spyware silently steals personal information, login
credentials or account passwords. Some of these attacks
go on for years before being uncovered. Consider a An additional consideration is that todays threats are
string of incidents reported in 2008, in which drive-by complex and designed to escape detection. That means
downloads and the Sinowal Trojan compromised more only one or two layers of a security solution may have the
than 500,000 bank, credit and debit card accounts. opportunity to stop any given threat.

Another sort of exploit hijacks PCs into a botnet to serve


up malware and spam campaigns on command, while
users remain unaware.

Safer web browsing in four steps-Technology to help you reduce risk 3


Safer web browsing in four steps
Technology to help you reduce risk

1. Limit your exposure on the web appear all the time and many are quite obscure, which
makes it impossible for IT administrators to identify all
The first defense is limiting your exposure, while giving of them.
end users access to the tools and information they need to
do their jobs. You can shut down anonymizing proxy use by pairing two
techniques: a reputation-based service that actively seeks
Productivity filtering: Prohibiting access to illegal, out new proxies, and a real-time proxy detection engine
inappropriate or non-business-critical web content is a that inspects traffic for signs of being routed through a
standard practice for businesses that should continue. proxy. Learn more about proxy filtering.
Many organizations blacklist site categories such as
adult, gambling, sports and finance. Productivity filtering File type control: This form of content filtering analyzes
is important for optimizing your staff productivity and file downloads to identify the nature of traffic coming
network performance, but is not enough to combat threats back from a website. You can permit the content or not,
now that web malware isnt confined to questionable sites. depending on your organizations policy. You are able to
Learn more about productivity filtering. disallow content types that tend to carry malware, which
significantly reduces exposure to infection. In addition,
Live URL filtering: URL filtering historically has been blocking resource-hungry content, such as streaming
associated with productivity filtering, which blocks video and audio, will help you prevent unwanted files and
categories of questionable sites. Security vendors are media from depleting network bandwidth.
now combining reputation-based data with URL filtering
to stop users from accessing sites known to be infected, The ability to scan actual file content to determine
or sites that repeatedly host malware or other unwanted its true nature is an advantage. Otherwise, malware,
content. Reputation-based URL filtering that performs unauthorized information and illegal content can slip
real-time lookups against the security vendors database through by masquerading as a permitted file type. Learn
is especially effective at blocking the thousands of new more about file type control.
malware sites, SEO poisoning attacks and hijacked
trusted sites that pop up daily. Learn more about Live
URL filtering. 2. Block threats at the source

Proxy filtering: Anonymizing proxies are portals that Limiting exposure is fundamental. But modern threats
let users anonymously browse any site. When they do, try to dodge detection by morphing themselves, hiding or
users bypass your organizations web security and control both. That calls for an additional set of safeguards.
mechanisms. That exposes your organization and your
users to unlimited security risks, liability issues and Anti-malware: A real-time malware scanning engine is
productivity losses. Vast numbers of anonymizing proxies perhaps the single most essential component in a web

Safer web browsing in four steps-Technology to help you reduce risk 4


Safer web browsing in four steps
Technology to help you reduce risk

security solution. Anti-malware scans all web traffic, 3. Reduce your vulnerabilities
including trusted content, to identify known threats as
well as new zero-day exploits. Every time a user accesses Criminal hackers look for easy prey. For that reason,
a site, the scanning engine inspects the traffic using a modern malware uses exploit packs to probe for
combination of anti-malware signatures and behavior- weaknesses with a variety of vulnerability testers, site
based techniques. Online, real-time lookups against redirectors and malware code.
the security vendors database provide the most timely
defense against emerging threats. Application control: Although your business depends
on a variety of end-user applications, unnecessary and
Malware authors increasingly use obfuscation to morph unauthorized applications expand the attack surface area
and hide their malicious code. An effective anti-malware by exposing more potential targets. Applications such
solution helps you fight back by detecting hidden suspect as web browsers, PDF readers, media players, tool bars,
code; for example, by deobfuscating and emulating instant messaging (IM) clients and peer-to-peer (P2P)
JavaScript before it is executed. Learn more about clients have been exploited. These applications introduce
anti-malware filtering. possible productivity, legal and data loss issues, besides
increasing the number of applications that IT must
HTTPS filtering: Web applications and protected websites manage and patch.
use Secure Sockets Layer (SSL) protocol to encrypt the
communication of sensitive content including payment Application control cuts your security risk and
transactions. That creates an unintended blind spot for management overhead by stopping users from installing
traditional web security solutions. Proxy sites, phishing non-business-related software on their machines. But
exploits, fake anti-virus sites and other malware threats your organization may find a blanket application control
abuse this point of entry. Its also a hole for data leakage, policy to be overly restrictive. Users will resort to
unwanted downloads and bandwidth-hogging traffic. workarounds when they dont have the applications they
need and want.
HTTPS filtering lets you balance user privacy and your
organizations security needs. You can have certificate Granular application control offers the flexibility to enable
validation performed for sites such as financial institutions, different policies that are appropriate for different groups
while traffic in other HTTPS sessions can be scanned and of users. That way, you can ensure applications are
proxied. Learn more about HTTPS filtering. managed to keep everyone productive and protected.
Learn more about application control.

Safer web browsing in four steps-Technology to help you reduce risk 5


Safer web browsing in four steps
Technology to help you reduce risk

4. Prevent data theft and loss Layered protection in action

Intellectual property and other business data are the Layered web protection is the best defense against
crown jewels of every organization. Its hardly surprising complex web threats. Consider a scenario of a blended
that criminals scheme to acquire this sensitive data, as attack that employs multiple methods to spread, roughly
they did in the Operation Aurora attack that targeted similar to Operation Aurora:
Google and other prominent companies in late 2009.
When a user clicks on a link to a compromised website,
And with data privacy and confidentiality laws getting live URL filtering would stop the user from reaching the site.
tougher in jurisdictions around the globe, your business
must also safeguard customer data and enforce data Then proxy filtering would block the user from trying to get
protection rules that extend to mobile computers, USB around the website block if he or she attempted to access
devices, removable media, email and Web 2.0 applications. the compromised website through an anonymizing proxy.
The penalties are unforgiving: steep fines, damaging press
coverage, loss of businesseven prosecution. Should the user manage to reach a compromised site,
anti-malware would detect malicious code and block the
Data loss prevention: Protect against data theft and malware from executing in the users browser. HTTPS
leaks with data loss prevention (DLP) software that filtering would catch the presence of encrypted malware.
scans for sensitive content, such as credit card numbers,
personally identifiable information (PII), bank account Application control would limit potential entry points for
information, national identification numbers and more. threats by preventing the installation of applications with
The idea is to help authorized users do their work without known vulnerabilities.
being tripped up by data loss or exposure.

You can use DLP software to warn the user, or block the
file transfer, before privileged information moves from the
users PC into removable media, a USB device, an email
or an internet-enabled application. When sensitive content
must be sent outside your organization, ensure the files
are encrypted first so data isnt exposed or misused. Learn
more about DLP.

Safer web browsing in four steps-Technology to help you reduce risk 6


Safer web browsing in four steps
Technology to help you reduce risk

Users often find VPN connections to be slow, which


frustrates them and stifles their productivity.
Gateway, endpoint or both?
Just as important, endpoint protection blocks attacks and
Today you need web protection that enables both local data losses that target desktops and laptops, or are able
and remote users, while safeguarding your organizations to sidestep the security on your organizations network, by
endpoints, your network and your data. That is why providing an added layer of protection. For instance, an
pairing gateway and endpoint web security has become infected USB drive plugged into an unprotected PC will
the most effective approach. drop malware on that endpoint.

Gateway protection alone was once the standard, and As internet threats have grown more widespread and
its no less important today. Using a web appliance destructive, they have outpaced the capabilities of
for security at the network gateway is highly efficient traditional web protection solutions. An updated approach
for protecting users and data inside your organization. is required in order to keep your organization connected
Its also the way to mitigate threats introduced by any while your endpoints, your network and your data stay
vulnerable, unmanaged or unmanageable endpoints on safer. You need a strong set of best practices supported by
your network (e.g., unpatched computers and guests gateway and endpoint security technologies that provide
laptops). multiple layers of defense. Then you will have effective,
affordable and sustainable web protection that enables
Endpoint protection delivers a line of defense beyond the your business.
gateway. First of all, endpoint security keeps mobile and
remote users protected without forcing them to go back
through your organizations virtual private network (VPN)
every time they need internet access outside the office.

Sources
http://www.sophos.com/security/topic/security-report-2010.html
http://www.sophos.com/pressoffice/news/articles/2010/03/seo-attacks.html
http://www.sophos.com/blogs/gc/g/2009/09/14/fake-antivirus-attack-hits-york-times-website-readers
http://voices.washingtonpost.com/securityfix/2008/10/virtual_bank_heist_nets_500000.html
http://www.nytimes.com/2010/04/20/technology/20google.html?sudsredirect=true

Boston, USA| Oxford, UK


Safer web browsing in four steps-Technology to help you reduce risk 7
Copyright 2009. Sophos Plc. All rights reserved.
All trademarks are the property of their respective owners.

You might also like