blog.radware.com Open in urlscan Pro
192.229.133.139  Public Scan

URL: https://blog.radware.com/security/2015/12/how-smoke-screen-cyber-attacks-are-being-used/
Submission: On August 03 via manual from SG — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://blog.radware.com/

<form method="get" class="td-search-form" action="https://blog.radware.com/">
  <!-- close button -->
  <div class="td-search-close">
    <a href="#"><i class="td-icon-close-mobile"></i></a>
  </div>
  <div role="search" class="td-search-input">
    <span>Search</span>
    <input id="td-header-search-mob" type="text" value="" name="s" autocomplete="off">
  </div>
</form>

GET https://blog.radware.com/

<form method="get" class="td-search-form" action="https://blog.radware.com/">
  <div role="search" class="td-head-form-search-wrap">
    <input id="td-header-search" type="text" value="" name="s" autocomplete="off"><input class="wpb_button wpb_btn-inverse btn" type="submit" id="td-header-search-top" value="Search">
  </div>
</form>

POST https://blog.radware.com/wp-comments-post.php?wpe-comment-post=blogradwarepr

<form action="https://blog.radware.com/wp-comments-post.php?wpe-comment-post=blogradwarepr" method="post" id="commentform" class="comment-form" novalidate="">
  <div class="clearfix"></div>
  <div class="comment-form-input-wrap td-form-comment">
    <textarea placeholder="Comment:" id="comment" name="comment" cols="45" rows="8" aria-required="true"></textarea>
    <div class="td-warning-comment">Please enter your comment!</div>
  </div>
  <input name="wpml_language_code" type="hidden" value="en">
  <div class="comment-form-input-wrap td-form-author">
    <input class="" id="author" name="author" placeholder="Name:*" type="text" value="" size="30" aria-required="true">
    <div class="td-warning-author">Please enter your name here</div>
  </div>
  <div class="comment-form-input-wrap td-form-email">
    <input class="" id="email" name="email" placeholder="Email:*" type="text" value="" size="30" aria-required="true">
    <div class="td-warning-email-error">You have entered an incorrect email address!</div>
    <div class="td-warning-email">Please enter your email address here</div>
  </div>
  <div class="comment-form-input-wrap td-form-url">
    <input class="" id="url" name="url" placeholder="Website:" type="text" value="" size="30">
  </div>
  <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"><label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
      I comment.</label></p>
  <div class="gglcptch gglcptch_v2">
    <div id="gglcptch_recaptcha_635501556" class="gglcptch_recaptcha">
      <div style="width: 304px; height: 78px;">
        <div><iframe title="reCAPTCHA"
            src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Ld4YGMUAAAAADxvntEsXFnnUJyAZycNbuOTE9CX&amp;co=aHR0cHM6Ly9ibG9nLnJhZHdhcmUuY29tOjQ0Mw..&amp;hl=de&amp;v=5JGZgxkKwe0uOXDdUvSaNtk_&amp;theme=light&amp;size=normal&amp;cb=2tv76hxxfu8"
            width="304" height="78" role="presentation" name="a-avnjm2iub0d0" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
        </div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </div>
    <noscript>
      <div style="width: 302px;">
        <div style="width: 302px; height: 422px; position: relative;">
          <div style="width: 302px; height: 422px; position: absolute;">
            <iframe src="https://www.google.com/recaptcha/api/fallback?k=6Ld4YGMUAAAAADxvntEsXFnnUJyAZycNbuOTE9CX" frameborder="0" scrolling="no" style="width: 302px; height:422px; border-style: none;"></iframe>
          </div>
        </div>
        <div style="border-style: none; bottom: 12px; left: 25px; margin: 0px; padding: 0px; right: 25px; background: #f9f9f9; border: 1px solid #c1c1c1; border-radius: 3px; height: 60px; width: 300px;">
          <textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
            style="width: 250px !important; height: 40px !important; border: 1px solid #c1c1c1 !important; margin: 10px 25px !important; padding: 0px !important; resize: none !important;"></textarea>
        </div>
      </div>
    </noscript>
  </div>
  <p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="5003" id="comment_post_ID">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0">
  </p>
  <p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="b408d71ca4"></p>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1659508706445">
    <script>
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

Text Content

 * Application Delivery
   * Virtualization
   * WPO
   * NFV
   * SDN
 * Security
   * DDoS
   * Cloud Security
   * WAF
   * SSL
   * Attack Types & Vectors
   * Hacks
 * Premium Content
 * Bios
 * Resources
 * Registration
 * Login


Search

Radware Blog
 * Application Delivery
   * Virtualization
   * WPO
   * NFV
   * SDN
 * Security
   * DDoS
   * Cloud Security
   * WAF
   * SSL
   * Attack Types & Vectors
   * Hacks
 * Premium Content
 * Bios
 * Resources
 * Registration
 * Login

Home Security Attack Types & Vectors
 * Security
 * Attack Types & Vectors
 * Hacks


HOW SMOKE SCREEN CYBER-ATTACKS ARE BEING USED IN DATA BREACHES

By
Ron Winward
-
December 9, 2015
0
3610
Facebook

Twitter

Linkedin


2015 was a paramount year in data exfiltration. You may be familiar with many of
the data breaches that were covered in the media this year, including the United
States IRS, several major health care providers, Ashley Madison, and most
recently, the personal data of children and parents from the vTech breach. Just
last week, retailer Target agreed to settle with several banks for $39 million
over their 2013 data breach.



Smoke screen attacks are an interesting technique that is common in data
exfiltration. As the name suggests, these are attacks on the network that are
specifically designed to misdirect security personnel from the real threat,
which is data exfiltration. By distracting a security team, attackers are hoping
they can slip under the protection sets by overloading them with activity in
other parts of the network.


HOW IT WORKS

Security personnel typically monitor the network using tools that generate
alerts when there is an anomaly. When configured to do so, things like changes
in bandwidth usage, latency, availability, and responsiveness will all send
alerts to the Network/Security Operations Center (NOC or SOC). It’s that team’s
job to begin investigating those events and one of the first places to look are
event logs. It is best practice to have network appliances like routers,
firewalls, and IPSs send their logs to a central collector, which allows for
better correlation between network events, so tools like this make sense as the
first place to look.

That is exactly what smoke screen attackers are hoping for. By attacking a
network on multiple fronts, the attacker hopes to create confusion and
misdirection. Knowing that security personnel will check the traditional tools,
attackers will attempt to overwhelm them with irrelevant traffic, slowing down
unrelated applications or filling logs with irrelevant data. Doing so makes
identifying unique events more difficult.


WHAT CAN YOU DO?

If you notice an attack, you must be mindful of the intent. Was it designed to
disrupt your network but your infrastructure handled it? Was it a decoy? Check
your logs and perhaps filter out vectors once you’ve ruled them out. Check your
other assets or collaborate with other departments in your organization to
ensure that nothing else looks wrong.

The best way to assess and mitigate a smoke screen attack is with the use of a
Web Application Firewall (WAF) that can help prevent data theft and the
manipulation of sensitive corporate data, as well as protecting customer
information. By combining this with an on premise detection and behavioral
analysis device, you can mitigate smoke screen attacks while protecting customer
data at the same time.

It is absolutely critical that organizations protect consumer data. Security
professionals need to leverage all of the tools available to protect the
integrity of this data. At Radware, we feel that layered security is the best
way to do this. Web Application Firewalls can protect your websites and
databases. DDoS mitigation appliances can protect you from the smoke screens.
Firewalls and a strong perimeter can secure access. Make use of the tools and
forensic data that you have available. And finally, remember that things aren’t
always what they seem and a smoke screen attack just might be real intent of
obvious network events.

Cyber-attacks are complex and dynamic challenges for anyone responsible for
cyber security.


> DOWNLOAD THE DDOS HANDBOOK FOR THINGS TO CONSIDER WHEN PLANNING FOR ATTACKS.

 * TAGS
 * data breach
 * information security
 * network security
 * Smokescreen Attacks

Facebook

Twitter

Linkedin

Previous articleHybrid Cloud is Not Genetically Modified, But You Can Still
Benefit

Next articleSSL Breaks Bad: A Protective Technology Turned Attack Vector
Ron Winward
As a Security Evangelist at Radware, Mr. Winward is responsible for developing,
managing, and increasing the company’s security business in North America. Ron’s
entire career has been deeply rooted in internet and cybersecurity. For over 20
years, Ron has helped design complex solutions for carriers, enterprises, and
cybersecurity providers around the world. Ron is an industry-recognized expert
in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s
first complete analysis of the Mirai attack vectors, producing forensic examples
for public distribution of each attack and the specific impact each attack had
on networks. His work on IoT attack analysis has been presented at conferences
worldwide and has been referenced by NIST. Prior to joining Radware, Ron was
Director of Network Engineering for a global datacenter provider and ISP. In
this role, Ron oversaw the growth and development of a global network
infrastructure that delivered services to other ISPs, hosting providers, and
enterprises around the world. During this time, Ron assisted some of the world’s
top businesses in mitigating cyberattacks on their infrastructure, cultivating
an extensive knowledge in DDoS attack methodologies. Ron holds a Bachelor of
Science degree in Business and has earned many technical certifications
throughout his engineering-focused career. Ron acutely understands the impact of
technology and security on business and is enthusiastic about their
interrelation.



RELATED ARTICLESMORE FROM AUTHOR


THIS WAS H1 2022 – PART 1 – THE FIGHT AGAINST CYBERCRIME


VISIBILITY INTO PEACETIME TRAFFIC. IS IT TOO MUCH TO EXPECT FROM YOUR DDOS
PROTECTION PROVIDER?


HOW TO FIGHT BAD BOTS AND WIN: RADWARE’S NEW CRYPTO MITIGATION ALGORITHMS


THE FOUR PILLARS OF A CYBERSECURITY STRATEGY THAT WORKS


THE SECURITY VULNERABILITIES OF THIRD-PARTY COLLABORATION TOOLS


THE DANGER OF API SECURITY OVERCONFIDENCE: FOUR TAKEAWAYS FROM RADWARE’S 2022
STATE OF API SECURITY SURVEY




LEAVE A REPLY CANCEL REPLY

Please enter your comment!
Please enter your name here
You have entered an incorrect email address!
Please enter your email address here


Save my name, email, and website in this browser for the next time I comment.







Δ



LEARN MORE ABOUT RADWARE’S PRODUCTS AND SERVICES


 * Application & Network Security
 * Application Delivery & Load Balancing
 * Cloud Services

LEARN BEST PRACTICES FROM OUR LIBRARY OF RESOURCES


 * Read White Papers, Customer Stories and Research

HAVE A QUESTION?


 * Contact US

© Radware Ltd. | 2022 All Rights Reserved. | Privacy Policy | Terms of Use |
Legal Notice | Cookie Preferences

Facebook
LinkedIn
Twitter
Youtube