Notes from AusCERT 2008

The interesting discussions from the Australian security conference

I've had the pleasure of speaking and attending this year's AusCERT 2008 security conference held in Gold Coast, Australia. If you've never been to Australia, you're missing some of the best that life has to offer, and I feel the same way about the conference. Although a bit smaller than most US security conferences, it's intentionally kept small (around 1,000 participants) and makes up in quality speaker presentations and vendor participation what it lacks in headcount. One of the great attributes of the typical Aussie is their aversion to marketing hype, along with their ability to "cut the fat off a chicken" (as my grandmother used to say) and pull out the salient points. If a vendor tries to push marketing fluff about their product too much, they are likely to get verbally assailed rugby-style. Here are some of my favorite notes and quotes from selected speakers:

Kimberly Zenz, of iDefense, discussed cybercrime within the Russian federation of countries. Longtime readers of mine already know about the power and scale of the Russian Business Network, but Zenz showed that I was being quite myopic by considering RBN the only Russian threat. Essentially, cybercrime against foreigners is widespread, as are services (money laundering, bulletproof hosting services, and so on) supporting cybercrime. For example, hundreds of legitimate companies exist in Russia to launder ill-gotten gains. Many have public, physical points of presence and advertise, "Three convenient offices located next to the metro."

Zenz shared that cybercrime against foreigners is not seen as a completely bad thing in most Russian circles. She revealed that when speaking to a Russian minister who was supposed to be preventing cybercrime, he bragged about the quality of their malicious hackers -- so much for getting global cooperation against the threat. But my favorite quote from her talk addressed what she felt needed to happen before Russia started to better fight cybercrime: "I can only hope that Russian-against-Russian cybercrime continues to grow." While most Russians don't see anything wrong with Russian-against-foreigner cybercrime, when directed internally, it causes locally felt pain. Zenz thinks that rising domestic cybercrime could, if only incidentally, cause foreign crime to be taken more seriously.

Ziv Mador, senior program manager with Microsoft US Research and Response (and my coworker), shared some interesting data points collected by Microsoft's anti-malware tools (such as Windows Defender) and their reach into hundreds of millions of computers. Although I think I know malware fairly well, many things he said startled me. For instance, Microsoft's most recent Microsoft Security Intelligence Report (see Figure 43), revealed that large percentages of people, when told that they are trying to install malware or other potentially unwanted software, tell Microsoft's products to get out of the way and to allow it. For instance, between 25 and 53 per cent of people, when told of a Trojan downloader, choose to install it. Why? Great social engineering, I guess. Many end-users will ignore any warning to see the latest viral (ironic use in this case) public video or cool game or add-on program. It reveals how difficult it is to pull off anti-malware defense, when people knowingly install malware. It goes to show that after two decades of trying, end-user education has its limits.

Dr. Charles Miller, of hacking Apple products fame, gave a presentation on the backroom world of researchers being paid for zero-day exploits. He said that although there are many legitimate companies paying for zero-day exploits, the market remains fragmented and undisciplined. He said while prices for some zero-days ranged from US$500 to more than $80,000, many remain unsold. In perhaps one of the boldest admissions, Dr. Miller discussed how much he was paid for two vulnerabilities he sold a few years ago. He was able to sell a SAMBA exploit for US$80,000, and while negotiating a friend's PowerPoint exploit for US$8,000 to $20,000, saw the market collapse when Microsoft released a patch that fixed the exploit. He also shared that selling zero-days to anyone apart from the vendor didn't feel quite right, but that vulnerabilities researchers need to make a living.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Roger A. Grimes

InfoWorld
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?