Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

NASDAQ Attackers Likely Monitored Director Communications

Two unknown sources close to the NSADAQ investigation have told Reuters that malicious software that worked its way into a web-based communications platform at NASDAQ last year allowed the attackers to monitor communications between busin

Two unknown sources close to the NSADAQ investigation have told Reuters that malicious software that worked its way into a web-based communications platform at NASDAQ last year allowed the attackers to monitor communications between business leaders using its Director’s Desk system.

Directors Desk is a solution to help board members communicate and collaborate “securely”, which the company says is used by more than 10,000 directors around the globe.

Hackers Penetrate NASDAQ Directors DeskIt is unknown what the attackers may have stolen information wise, or what passive communications were viewed as they monitored on the directors of several publically held companies. At the time of the breach, NASDAQ reported that no evidence was discovered that pointed to access of customer’s information, but given the nature of Director’s Desk, the latest details are far from cheery.

NASDAQ CEO Robert Greifeld told the news agency that the exchange is under constant attack. Because of this, they spend nearly a billion dollars annually on their information security program. Yet, is this money that should be applied elsewhere? Perhaps on basic Application Security?

“Due to the true nature of the Director’s Desk Web-based application, it appears that vulnerabilities within the application were probably successfully exploited by remote attackers that allowed them to peruse information exchanges between various company directors. There are several classes of common vulnerabilities that would allow attacks like this, and I would direct people to take a closer look at the OWASP Top-10 application security risks,” commented Damballa’s Gunter Ollman.

“Gaining remote access to confidential data held within the Director’s Desk application could have been through SQL injection, broken authentication and session management, and URL restriction failures. In my years of running penetration tests against Fortune-500 companies, these were the most common vulnerabilities that could be exploited to reveal this level of confidential data.”

He added that the new details of the malicious usage of Director’s Desk, or any major Web application being targeted should come as no surprise.

“Overall, vulnerabilities within large Web-based applications are very common. They are under constant development and change, which means that vulnerabilities can be unintentionally introduced at any time. If there are multiple development teams working on the same application portal – all developing their own micro applications – then the probability of new vulnerabilities being introduced grows considerably. This is why Web applications need to be security tested continuously.”

Directors Desk is completely unrelated to the NASDAQ trading platforms which power the exchange and trading operations were never affected.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...