A new product dedicated to security, designed to perform a scan in an anonymous form of the dark web will enable companies (or security providers) to seek corporate data stolen?
Some are skeptical (and in this article will tell all if and but also a competitor) but we leave those who read the final decision.
The web scanner in question, produced by the Terbium Labs Baltimore and called Matchlight, is proposed as a scanner always active in the dark web in order to find stolen data that were offered for sale on the black market. Terbium Labs says, the constant search for these stolen data as soon as you enter the web, take the time to detection of a violation by a few minutes to a few seconds.
The software has been developed to be sold to companies that may well create a fingerprint from the sensitive data: this will imprint to be used by Matchlight to find out which data possibly stolen , they are on sale in the dark web. All this process of scanning, says Danny Rogers, CEO of Terbium Labs, runs for another without Terbium Labs is aware of what the data actually sought. The match, in fact, is done in much the same approach to a snapshot.
“The fingerprint involves unpacking data into portions which are then encrypted with the hash function – Rogers explained -. We do the same procedure on the web crawlers and this allows us to compare hashes only other hash. This method allows us to search the digital signatures of data without the need to know what are really the original data stolen. “
Software-defined security: work really?
Morey Haber, vice president of BeyondTrust Of Technology, software company specializing in the marketing of security products based in Phoenix, said that this approach is a new facet of other services offered by companies such as Dark Web ID, that scan the dark web looking for stolen data to urge companies to buy their products based on the results they get. It is a useful tool for companies and further element of security for the data center .
Haber also explained that the product itself has meaning, but seems a bit ‘dangerous first because you have to trust that Termio Labs will never have to see the sensitive data that is looking for: the theme not the pursuit of hash in the web, but the fact that you are allowing a third-party software in your environment to build those hash.
Rogers, in response, said that the hashes are generated only one-way and Terbium Labs has no way to reverse this process and then to see these sensitive data. Another doubt Haber regards the fresh from data in the dark web, because it is not clear how fast the data, possibly stolen, from being placed on the web for sale.
“If it can be shown that the data is offered on the dark web just are violated, the software Terbium Labs then it may make sense – said Haber -. It must be said that the stolen data can only be part of a coordinated attack for identity theft that only later would be offered for sale through the dark web. There are many sites that ask only first and last name and a few other credentials, but if these bad guys have a purpose or a fraudulent plan to be implemented with this data, do not necessarily need to sell this information. “
Roger admitted that some hackers may have more nefarious plans behind a theft of data , but said that very often the most individuals or hacker groups who commit theft are not the same people who then use them for criminal acts. Typically, the data is not stolen by the very people who are using them. Normally the data is stolen by an attacker who then sells them to other crooks acting on the Web. The critical point, and that creates the most damage, it occurs when data stolen as a result of a violation are sold. For this reason, by detecting quickly and quietly these stolen data before they are sold, we are able to reduce most of the damage caused by breaches. Rogers has finally declared that he is working with a number of companies of the Fortune 500 and Matchlight currently in beta but with the intention, later this year, to release the final version.
No comments:
Post a Comment