The State of IT Automation: New Pressures Invite New Opportunities Read Report

Who left the door open? How big-name websites are self-sabotaging cybersecurity

Who left the door open? How big-name websites are self-sabotaging cybersecurity
June 27, 2017 • Resolve Staffer

“People are basically just plopping down really complex servers to do caching, analytics, and loads of fancy complex functionality in front of their Web server without much thought as to whether these features might carry risks.”

Those are daunting words from PortSwigger Web Security Head of Research, James Kettle, in speaking of major—including the Department of Defense—websites’ gaping vulnerabilities through back-end servers.

Like having a car alarm activated with the windows down

Kettle used hacker intelligence and collected $30,000 in bug bounty rewards recently for his discovery. He demonstrated holes in the DOD and other big-name commercial websites by dropping “malformed Web requests and phony headers” like magic beans in a fairy tale.

Kettle found back-end server infrastructure such as web caching and analytics; proxy and load-balancing servers can be left hanging in the breeze for attackers to burrow into the enterprise’s internal network through the public domain.

According to an article in Dark Reading, in just a few hours time, Kettle hacked into almost six dozen servers—including prominent brand name sites.

Kettle affirms the exercise is a wake-up call for information security. “People need to treat this like an attack surface. They need to realize shiny features in back-end analytics” can tow hefty security holes, which he says let him repeatedly gain direct access to systems and data that should’ve been secure. Since best practices for network and system architecture were not in place, Kettle could all-too-easily spider out to other systems once he got inside.

Kettle will reveal the high-profile websites he infiltrated and other details of the research at the Black Hat USA conference in Las Vegas next month.

Learn, Connect, Protect and Secure Your Company at Black Hat Conference

Resolve Systems is a proud sponsor of Black Hat USA 2017 at Mandalay Bay in Las Vegas July 22-27. We will be hosting a booth in Business Hall featuring a live demo on how agile and readily our human-guided automation defuses threats. For a snapshot of our IR in large-scale security breaches, take a look at our latest article.

Read more: WannaCry | Resolve Launches WanaCryptor Detection and Triage Playbook

Resolve Systems is the pioneer—and continues to be the most progressive frontrunner— in enterprise-wide incident response and automation solutions for IT Operations, Network Operations, service desk and Security Operations teams. We’re the only platform that allows you to automate incrementally and pragmatically, with tools like human-guided automation.

What sets us above other security platforms are how we enable the automation of—and embed tailored content into—IR processes for any SOC-driven resolution playbook.

Where some platforms exclusively push closed-loop automation, our customizable human-guided automation doesn’t monopolize incident response; it weaponizes security teams to provide consistent, thorough and formidable cybersecurity.


About the Author, Resolve Staffer:

This post was written by one of the awesome contributors on the Resolve team.

Recommended Reads

What Is the State of IT Automation Going into 2023?

What Is the State of IT Automation Going into 2023?

Where is automation heading? Business leaders track the latest trends.

Automate. Innovate. Celebrate.

Automate. Innovate. Celebrate.

Automation is the backbone of the digital enterprise.

Observability and Auto-Remediation

Observability and Auto-Remediation

Learn how Resolve addresses alert overload with auto-remediation