You are on page 1of 1

issue.

qxd 24/03/2003 16:30 Page 3

news

What about Sun's Solaris sys- using a virus, and demanded structure of the database,
tem, its closed source isn't it? a ransom, which the corpo- which led to the recovery of all In Brief
Sun's Solaris system is not as rate victim paid. the data.
closed as Microsoft. We show The hackers bypassed fire- Margeson said: “This was a US UNIVERSITY
it to a much wider range of walls and other security sys- well thought out and targeted HACKED
customers on routine source tems to infect five servers from attack, the extortionists knew An intruder exploited a vul-
licenses than Microsoft does. Grafix Softech F.A. with a who they needed to talk to.” nerability in the University of
My belief is that a source virus, they then encrypted Texas administrative data
license is something that cus- vital data and demanded a
tomers can routinely get, its ransom in return for the key.
IDS — the new reporting system and stole
55200 records. A program
probably expensive but major “These hackers were good, it firewall? was written to bombard the
customers can get source took something special for Catherine Everett system with millions of social
licenses to look at Solaris code. them to break in” said Bill Until now, the high cost and security numbers. All SSNs
There was an attempt to Margeson, CEO of CBL Data complexity of IDS/IPS prod- that matched any of the mil-
open Solaris completely a few Recovery Technologies who ucts have meant they have lions of security numbers in
years ago and some rather helped Grafix Softech recover been deployed only by large the database were captured
complex patterns of owner- the data. organizations with stringent along with other personal
ship stopped us from publish- Grafix Softech, based in security requirements, accord- information. The case is cur-
ing all of it in the late 1990s. Costa Rica, lost $75 000 daily ing to Jeff Wilson, executive rently being investigated.
for eight days as a result of the director of Infonetics Research.
breach, which meant that vital But as companies of all sizes SECURITY ALERT ON
Security breach company data disappeared. begin to rely on the Internet PERSONAL STORAGE
more and more, they are realis- WEBSITES
forces closure of Margeson said that Grafix
ing that their firewalls, although Personal storage websites
were also under “intense pres-
company sure from business relation- widely deployed, are not 100% could increase the threat of
Janteknology, a software dis- ships.” effective and so are looking at industrial espionage warn
tribuor recently closed busi- Even though the intruders the next stage in how to protect Websense, an employee
ness after suffering an received the ransom and deliv- their perimeter security. Internet management compa-
internal security compromise. ered the encryption key, data "Though growth in 2003 ny. Websites such as brief-
Glen Miller, managing could not be retrieved from will be strong, the [IDS/IPS] case.yahoo.com and
director of Janteknology said one key server containing a list market will really take off in Hotdrive.com now number
in a statement “The company of consulting clients and details 2004 due to increased global 1000 worldwide and 71% of
has suffered a major internal for the operation of many gam- demand from customers of all companies around Europe do
security breach that among ing sites. sizes, and innovations that will not have policies on the use of
other things involved the “When the data was encrypt- make the technology easier to such websites. Approximately
removal and modification of ed a large temp file was created use, more accurate and widely 20% of company’s surveyed
company records.” so encryption effectively delet- available," explains Wilson. by Websense knew of spyware
Miller was unable to com- ed the MS SQL database” said A recent Infonetics study use within their organization.
ment further as investigations Margeson. When Grafix dubbed "Network Technology
are currently taking place. Softech complained to the Adoption Forecasts, North budget for them and do it.
In order to deal with exist- extortionists, they recommend- America 2003 and Europe We'll only start to see them
ing backorders, Jantecknology ed using ndustrial software for 2003" indicates that, while really penetrating the data
are restoring and validating a recovery, which failed to work. sales of IDS/IPS products hit centre and infrastructure
number of records. “Because Grafix Softech $382 million last year, by 2006 when they become cheap
don’t work at the hex level, they this figure is expected to leap enough, however, which
were misapplying products to to $1.6 billion, a compound won't be for another few
Large online retrieve the data” said annual growth rate of 42%. years yet."By 2002, about 38%
gamer paid Margeson so they summoned Marcus Ranum, an inde- of small, 48% of medium and
in CBL, data recovery experts. pendent consultant, agreed 63% of large organizations
ransom to hacker CBL examined the file struc- with the findings. "The IDS globally had already implement-
extortionists ture of the Microsoft SQL market is about to explode, ed IDS systems, but this figure
Russian extortionists took database, and wrote custom with most organizations see- is expected to grow to 62%,
control of servers on a major software to piece together ing their value now and just 83% and 92 % respectively by
online gaming company signatures left from the file trying to decide whether to 2007.

You might also like