Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in you inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go

Stonesoft Detects AET Assaults Working against Port 80 HTTP Protocol

Stonesoft, which detected online-crime assaults utilizing AET (advanced evasion techniques) during October 2010, has found one more thing: AET assaults are being executed on Port 80 HTTP traffic. Infosecurity-magazine.com published this on October 4, 2011.

Actually according to Stonesoft, the finding can be described as a prominent discovery since various kinds of software currently use Port 80 to conduct online communications. However, that makes it harder for tracking Internet Protocol traffic across the port.

Reportedly, AETs are basically one fresh classification of cyber-assaults that work as one fresh technique for cyber-criminals trying to access vulnerable computers. Utilizing 'Advanced Evasion Techniques,' according to Stonesoft, malicious software can be camouflaged as appearing safe as well as security software approved that remains wholly unrecognized.

The security firm states that hitherto people have seen AETs as an insider attack that work within a network as also merely affects Intrusion Prevention System (IPS) applications. Nevertheless, the finding about AETs delivered through Port 80 HTTP implies that they're also capable of evading firewalls as also can be launched from outside on Web-traffic, Stonesoft adds.

Telling further about the recent finding, Head of Advanced Technology Professor Andrew Blyth at The University of Glamorgan (UK), who also did the research along with Stonesoft, stated that clues of AETs getting utilized across the Web were increasingly observed as also how they imposed more-and-more threat on organizations globally. The latest study had disclosed that AETs were served on HTTP traffic alongside others, as also that basically implied that any organization having an Internet connection was in danger of the attack, he continued. Stonesoft.com published this on October 4, 2011.

Blyth explained that there was apparently one misconception that the threat from AET was essentially internal; however, that had been proven otherwise. It was vital that while AETs were served through HTTP, they managed in circumventing IPS devices and firewalls. That plainly demonstrated that AETs could trigger off as well as get launched externally of a company network, the professor added.

The above revelation made AET attacks increasingly real compared to what was earlier computed, therefore, Stonesoft advised security firms to be less relaxed, Blyth concluded.

Related article: Stonesoft’s CISO Forecasts Rise in malware Assaults Against Twitter, Facebook Etc.

» SPAMfighter News - 14-10-2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next