F5 Focus Group Assesses Security Risks from Politically Motivated Attacks, Stresses Focus on Fundamentals

IT security professionals view “hacktivism” as simply an extension of current threats and highlight the importance of network and application security

SEATTLE--()--F5 Networks, Inc. (NASDAQ: FFIV), the global leader in Application Delivery Networking, recently assembled a group of IT security professionals to examine the well-publicized WikiLeaks attacks of late 2010 and discuss the perceptions of similar threats within the IT industry. In a detailed findings report, the focus group concluded that the DDoS attacks used by hackers did not represent a new kind of threat, and that in many cases these attacks would be indistinguishable from other types of malicious traffic.

The group did acknowledge some novel aspects of the WikiLeaks attacks, however. Most notably, this was the first known large-scale attack to involve voluntary participation. Instead of having to rely on the exploitation of vulnerable machines to create a botnet, many people willingly turned over control of their machines to hackers. With this approach, hackers can access a given machine’s full resources without needing to worry about being detected, meaning fewer machines are able to orchestrate larger attacks. The other significant aspect of these attacks, according to the focus group participants, was the act of hacking out of a sense of moral outrage rather than monetary gain.

The security experts also emphasized the importance of properly applying foundational security principles to manage emerging threats. By working with ISPs to detect and filter malicious traffic, organizations and their networks will have less risk of downtime in the event of a DDoS attack. This also frees IT personnel and resources that can be applied to strengthening security practices and focusing on threats aimed at both the network and applications.

Selected Quotes from Focus Group Attendees

“Whenever we are in the media or customers are in the media, that makes us a target,” said the senior security architect for a financial institution.

“We’ve been seeing an uptick in attacks over the last year or so,” noted the senior architect of an electronic publishing company, “but I don’t think I could attribute any of it to WikiLeaks.”

The senior security architect of a large financial institution stated, “We made sure that our Internet service providers have the capability to block these attacks and keep that traffic off of our pipe so we can keep serving our customers.”

“We’re involved in watching discussions and code sharing and chat groups,” said the director of security services for a large communication solutions provider, speaking about the importance of monitoring social media sites for indications that groups or individuals may be coordinating a targeted attack.

Supporting Quotes

“ESG anticipates continued growth in politically motivated cyberattacks,” said Jon Oltsik, Senior Principal Analyst at Enterprise Strategy Group. “As attacks increase, unprepared enterprises will find their resources and security defenses strained, putting sensitive corporate information at further risk.”

“The key to successfully weathering a DDoS attack is to uphold fundamental security best practices,” said Kenneth Salchow, Senior Manager of Technical Marketing and Syndication at F5. “To mitigate the effects of attack, work with your ISP to develop a defensive plan for stopping malicious traffic before your network is compromised. Then focus on expanding beyond the network level to address application-layer vulnerabilities.”

Additional Resources

About F5 Networks

F5 Networks is the global leader in Application Delivery Networking (ADN), focused on ensuring the secure, reliable, and fast delivery of applications. F5’s flexible architectural framework enables community-driven innovation that helps organizations enhance IT agility and dynamically deliver services that generate true business value. F5’s vision of unified application and data delivery offers customers an unprecedented level of choice in how they deploy ADN solutions. It redefines the management of application, server, storage, and network resources, streamlining application delivery and reducing costs. Global enterprise organizations, service and cloud providers, and Web 2.0 content providers trust F5 to keep their business moving forward. For more information, go to www.f5.com.

You can also follow @f5networks on Twitter or visit us on Facebook for more information about F5, its partners, and technology. For a complete listing of F5 community sites, please visit www.f5.com/news-press-events/web-media/community.html.

F5 and F5 Networks are trademarks or service marks of F5 Networks, Inc. in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.

This press release may contain forward-looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors, including those identified in the company's filings with the SEC.

Contacts

F5 Networks, Inc.
Alane Moran, 206-272-6850
a.moran@f5.com
or
Connect Public Relations
Holly Hagerman, 801-373-7888
hollyh@connectpr.com

Contacts

F5 Networks, Inc.
Alane Moran, 206-272-6850
a.moran@f5.com
or
Connect Public Relations
Holly Hagerman, 801-373-7888
hollyh@connectpr.com