Why Your Firewall May Be Missing Stealthy Threats
Cybercrime has always been something of a high-stakes game of hide-and-seek, with malicious actors continually developing new ways to ensure their activities remain undetected. Over the past year or so, they have stepped up their game by concealing threats in encrypted traffic. According to a recent report, two-thirds of all malware delivered in the first quarter of this year arrived encrypted.

Hackers are simply seizing on the increased use of encryption for legitimate purposes. Most organizations today use the technology to maintain data privacy — in fact, it is mandated by a host of data privacy laws. Because of this increased reliance on encryption, many organizations actually configure their perimeter defenses to let encrypted traffic pass through firewalls without inspection.

With little to no visibility into encrypted traffic, organizations are hard-pressed to identify, prevent or mitigate threats. According to a recent Vanson Bourne survey of 3,100 IT managers in 12 countries, 68 percent of respondents experienced a cyberattack last year, even though 91 percent had advanced security measures such as next-generation firewalls (NGFWs) in place. What’s more, even after extensive post-attack forensic analysis, 20 percent were never able to identify the source of the attack.

The survey also found that only 3.5 percent of organizations are decrypting traffic in order to inspect it. It’s a tradeoff most have made in order to avoid intolerable performance degradations.

New Protocol Helps

The Secure Socket Layer (SSL) protocol and its successor, the Transport Layer Security (TLS) protocol, are the industry standards for encrypting data in transit. Although many NGFWs can decrypt and inspect SSL/TLS traffic, it is a computationally intensive task. According to a 2018 NGFW security and performance test, SSL/TSL decryption caused an average 92 percent degradation of NGFW connections, a 60 percent drop in throughput and a 672 percent rise in latency.

The latest version of the TLS protocol — TLS 1.3 — attempts to resolve these issues, primarily through stronger cryptographic ciphers and an improved handshake process for establishing encrypted communication sessions.

When initiating communication between two devices, TLS requires a handshake negotiation between the two sides. This involves exchanging messages to acknowledge each other, verify each other, establish the encryption algorithms they will use, and agree on session keys. In previous versions of the protocol, this required approximately a half-dozen round-trip communications, which added significant latency. TLS 1.3 cuts the required round-trips in half, making the entire process a bit quicker and more responsive.

Older versions also offered dozens of different choices for cipher suites, the set of algorithms that secure the connections. The process of negotiating which suite would be used was time-consuming, again adding to latency. In TLS 1.3, that process is much faster because there are now only five recommended cipher suites. The suites themselves are smaller, too, comprising fewer ciphers.

Inspection without Decryption

Cisco Firepower Threat Defense (FTD) firewalls are among the NGFWs that support the TLS 1.3 protocol. Cisco says they boost performance by three times when compared to the previous generation of NGFWs, and they also feature unique capabilities for inspecting encrypted traffic at scale without requiring decryption.

FTD firewalls work in conjunction with Cisco’s Encrypted Traffic Analytics (ETA), a software platform that monitors network packet metadata to detect malicious traffic. ETA inspects an encrypted message’s initial data packet, records the size, shape and sequence of packets, and how long they take to traverse the network. It also monitors for other unusual characteristics. If anything seems suspicious, the packets are flagged for deep packet inspection and blocked by the FTD firewall.

While encryption has become essential for data privacy, it has also become an incredibly efficient delivery mechanism for malware. However, recent firewall enhancements can give organizations the tools they need to expose those hidden threats. Give us a call to learn more about how these the latest firewalls can improve your organization’s perimeter defenses.

Related Articles

A sampling of other articles you may enjoy if you liked this one.

Keep your Workforce Connected with the Cisco Webex Work Bundle
Sep 24, 2020

Keeping your workers connected to their coworkers and customers is essential for maintaining product...

Read More
Webinar Replay: Rethinking the Firewall
Sep 24, 2020

The firewall has traditionally been the cornerstone of network security. It was designed based on th...

Read More
Webinar Replay: Remediating the Gaps in Office 365 Email Security Settings
Aug 27, 2020

Email is the easiest route into the network for most organizations, as more than 99% of all security...

Read More
For Emergency Support call: (877) 423-7486
For other support requests or to access your Cerium 1463° portal click here
Stay in the Know

Stay in the Know

Don't miss out on critical security advisories, industry news, and technology insights from our experts. Sign up today!

You have Successfully Subscribed!