Industry expert Jeremiah Grossman recently wrote a piece on his blog about pivot attacks. What are pivot attacks,...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
and how can we prevent them from affecting our organization?
In a pivot attack, an attacker targets a lower security host, where less security is in place, which in turn enables him or her use the access to the lower security host to exploit the access privileges granted to that host to attack a higher security host with better probability of success.
In a traditional scenario, the attacker would target a low-security Web server on a lower security part of the network by first scanning an organization's externally accessible IP addresses to gain access to a DMZ or internal network, and then use that access to be able to attack a database storing credit card numbers or other sensitive information. This is similar to attacking shared libraries in large programs to be able to inject malicious code into the overall program.
To prevent these types of attacks, minimize the amount of external party content on your website, vet the content prior to allowing it to be served up, automatically follow all of the links on your website and scan them for malicious code.
One of the protections that Jeremiah Grossman points out is sandboxing. Sandboxing would limit code to only access objects or data in its sandbox and not access everything that Web browser could access. This would mean that the malicious code potentially would only be able to access the objects it had access to in its sandbox, rather than the more broad access that a Web browser might have access to.
Dig Deeper on Web Server Threats and Countermeasures
Related Q&A from Nick Lewis
Vonteera adware has the ability to disable antimalware software on endpoint devices. Expert Nick Lewis explains how enterprises can prevent this ...continue reading
ModPOS, a new POS malware, compromised millions of credit card accounts in 2015. Expert Nick Lewis explains how cybercriminals use this malware and ...continue reading
Amex cards have been discovered to be vulnerable to credit card hacking. Expert Nick Lewis explains how this happens, and what can be done about Chip...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.