Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Top Five Pitfalls When Considering Client Side Security

When looking to secure online applications and protect them from fraud, enterprises have traditionally turned to preventative and detective controls on the server side.  In other words, policies, alongside data, logs, and transaction information have long been a go to mechanism for mitigating risk from security breaches and fraud events.

When looking to secure online applications and protect them from fraud, enterprises have traditionally turned to preventative and detective controls on the server side.  In other words, policies, alongside data, logs, and transaction information have long been a go to mechanism for mitigating risk from security breaches and fraud events. In recent years, many enterprises have begun to consider the question of whether or not they should look at the client side environment as well, and, if so, how exactly they should look at it.

The question of the importance of the state of a client device is a debate that has been around for a few years in the security field. On the one hand, client devices are a big unknown and, in some cases, come infected with malicious code (e.g., banking Trojans) or are vulnerable to phishing attacks, malicious JavaScripts, and other such client side attacks.  On the other hand, policing client devices is an extremely complex undertaking, and beyond that, infected or vulnerable client devices aren’t necessarily what is responsible for introducing fraud into an enterprise. 

While I believe that enterprises should take a balanced, calculated, and measured approach to client side security, I would like to offer a few thoughts to consider while doing so.  Here are the top five pitfalls that enterprises may encounter when considering client side security:

1. Playing whack-a-mole: Banking Trojans, malicious JavaScript, and other client side attacks are plentiful and abundant. They will also be around for quite a while as far as I can tell. As such, once an enterprise opens the Pandora’s box that is the client side, it may soon be overrun. Of course, each enterprise needs to decide for itself what, if any, action it will take each time a client device is discovered to be accessing the online application from a compromised environment. If not designed wisely, any processes around this can soon lead to a never-ending game of whack-a-mole that will bury the security and fraud teams.

2. Losing focus on risk: It is important to treat information about a compromised client side environment as just that – information. While that information may be helpful in understanding the overall risk to that particular client’s accounts, in and of itself, it is not reliable as an indicator of risk. Why is that so?  With so much compromised PII and stolen account information out there, there are many ways for a fraudster to accomplish Account Takeover (ATO). In other words, a compromised client device doesn’t necessarily mean that ATO will occur, and it doesn’t necessarily mean that a fraud loss will be incurred by the enterprise.  That determination requires a number of different data points, with one of them being the state of the client device. Forgetting this important point can cause the enterprise to lose focus on risk.

3. Losing focus on transactions: When looking to mitigate risk and reduce fraud losses, it is important to remain focused on transactions. It is far too easy to get distracted by other data points that seem interesting but don’t, in and of themselves, tell us whether or not a specific transaction is legitimate, suspicious, or fraudulent. Helpful information on the client device can add to our ability to determine whether or not a transaction is fraudulent, but it is not sufficient to make that determination without other important data points.  If we lose sight of this focus on transactions, it is far too easy to fall into a never-ending trap of false positives and noise that will soon bury us.

4. Losing focus on sensitive data: When an enterprise opens the door to the client side, there is often an overwhelming amount of data to look at. All of that data, if not properly analyzed, categorized, and triaged, may lead to an abundance of alerting – most of it with little to no value. It is important to remember what is truly important – sensitive data that may find its way into the attacker’s hands and the potential to add, modify, and/or remove transaction data. It is also important to remember that although Magecart attacks are perhaps the most common method used in this type of attack, they are not the only one. As enterprises begin to look at the client side, they need to remain focused on sensitive data to avoid being overrun by other, less relevant data.

5. Forgetting user experience: While, in the effort to combat fraud, it may be tempting to institute strict, draconian measures, it is important to remember that those measures may not always result in reduced fraud. They may, however, negatively impact the user experience to the point where they cost the organization in lost revenue. It is important to institute proper controls to protect online applications from fraud, but it is also important to remember that a user experience riddled with friction will cost the enterprise in other ways. When an enterprise forgets this important balance, it creates a new risk – that of leaving potential revenue for competitors to claim.

Advertisement. Scroll to continue reading.
Written By

Joshua Goldfarb (Twitter: @ananalytical) is currently Global Solutions Architect - Security at F5. Previously, Josh served as VP, CTO - Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. He has consulted and advised numerous clients in both the public and private sectors at strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT) where he built from the ground up and subsequently ran the network, endpoint, and malware analysis/forensics capabilities for US-CERT.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Fraud & Identity Theft

Famed hacker Kevin Mitnick has died after a battle with pancreatic cancer.  At the time of his death, he was Chief Hacking Officer at...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Cybercrime

Deepfakes, left unchecked, are set to become the cybercriminals’ next big weapon