• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Endpoint Security • Ransomware  /  Attacks on SSL are on the rise: Know more who is hiding in your encrypted traffic.
Attacks on SSL are on the rise: Know more who is hiding in your encrypted traffic.
02 October 2017

Attacks on SSL are on the rise: Know more who is hiding in your encrypted traffic.

Written by Seqrite
Seqrite
Cybersecurity, Endpoint Security, Ransomware

Most of the organizations have already moved on to SSL (Secure Sockets Layer) to protect their data in motion. We like to believe that once SSL protocol is implemented our data is safe from the hackers. However, the hackers too have learned to take advantage of this technology for their benefit. It is not just the hackers, but also the security agencies, the government, and many other organizations, who are using SSL to snoop on data and communications. A well-known case of a whistleblower in 2014 exposed that the government of a country was injecting surveillance software in web traffic. This ‘leak’ has led to a rise in attacks that are hidden in the SSL traffic.

Why is there a risk in SSL?

Encryption makes the network and all the software and devices on it, blind to the data. Except for the sender and the final receiver, who has the decoding key, no one can see the data including the cybersecurity software and devices. Cybersecurity works by analyzing data streams. They look for patterns in data and digital signatures to identify the known viruses, malware, and ransomware. Once these malware travel over SSL, they also appear as gibberish to the security software, and it becomes ineffective in identifying the infection. The receiving program decodes the encrypted data, which then may turn out to be malware and jump onto the other programs or data on the computer. This way the cyber infection can spread over any channel that uses SSL such as secured web pages, email attachments, Instant messages, etc.  Let’s look at some of these threat sources and varieties in a bit more detail.

DDoS attack: Once a malware enters a network via SSL, it can spread across servers and computers. Now, most of the organizations protect themselves against external threats but rarely do they take precautions against internal, validated software and tools. This leaves them vulnerable to internal attacks, DDoS being the most common one. The nature of attack makes it more difficult to locate and isolate. Such an attack can affect multiple internal corporate servers and effectively bring down the whole corporate infrastructure which requires a complicated recovery procedure.

Insider Abuse for Data Exfiltration: While the cyber defense systems cannot look at incoming encrypted data, they also cannot look at the outgoing encrypted data. Most of the web-based email, file sharing services use SSL encryption. Employees can use these to send confidential data out of the corporate network without being detected by the organization’s defense systems. It is nothing less than irony that the most significant assets of the company, the employees, become the greatest threat to it.

Social Media: Facebook, Twitter, LinkedIn, the web interface of WhatsApp, all use SSL encryption. While many organizations actively control access to certain social networks, some other sites are made an exception considering them harmless. . Similarly, WhatsApp is being used for instant communication within teams on the go. Organizations tend to not block the web interface of WhatsApp. However, all these social media tools have been known to carry malware. With these sites moving onto SSL, it has become harder for cyber defense systems to detect the encrypted malware coming in from these sites.

Read More: Use CAA DNS records for SSL Certificate and minimize cyber threats

Protecting against the SSL threat

Organizations need to decrypt the encrypted data and inspect inbound and outbound data. To start with; organizations can deploy SSL inspection platforms that decrypt SSL traffic and send it to the third party organizations for inspection. For outbound data, the enterprises own the endpoints, and these should be monitored rigorously. Extra care needs to be taken to allow access to social media sites using corporate infrastructure. It’s best to rent cloud-based storage which is effectively under organization’s control for sharing files and information beyond the organization’s network. Firewalls are still very effective in blocking access from unknown sources and can be forced to remove encryption on data coming from known sources. It can then be presented for inspection to cyber defense tools of the organization.

Encryption is a great way to secure cyber infrastructure against attacks from unknown sources. However, enterprises must realize that encryption alone cannot protect them against all threats out there. They must continue to be vigilant of threats and compromise of new defense mechanisms to adequately protect themselves.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostAnalysis of recent Locky ransomware outbreak
Next Post  Evolution of jRAT JAVA Malware
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies