My website got hacked, hijacked or held for ransom - how...why?
Software vulnerabilities. Hackers. Ransomware. Labels that people whisper about create an online battleground that we must deal with. So let’s talk about them openly and loudly.
If you have ever been the victim, whether it’s of an online hacker or an identity thief, you are likely left feeling vulnerable and violated. I know that’s how I felt and I’ve been the recipient (or target) of both. And I thought I had taken the precautions necessary to protect myself so I was also angry.
So how does it happen if you have all of the protections in place?
Well, the simplest answer is that software is fallible. There are mistakes and errors in software code that allow the application function, and yet be compromised. I get that brilliant minds with pedigreed educations and tremendous experience are creating the code and yet, they are human and as we know, humans make mistakes. Because humans are fallible, the software code they create is likewise fallible.
In today’s web-based world, there are a lot of software applications that are released to the world as “open source”. If you’re not familiar with that term, allow me to explain. A developer creates a software application by writing software code. It’s like writing a book but instead of being written in your native language, it’s written in a programming language. That code (known as the ‘source’ code) tells the computer what to do and how to do it. You’re probably familiar with the Microsoft suite of software applications that each perform a specific set of functions. In the case of Microsoft applications, you must purchase a license that allows you to use the application. You cannot change the application and must use it in its native form. Some people (and companies) create software applications that instead of selling them (like Microsoft), publish the application – and its code – to the world for free. That application becomes known as an “open source” application because 1) it’s free and 2) everyone has equal access to the ‘source code”. And by everyone, I mean the good guys and the bad guys.
Being open source and available to everyone, the good guys use the application for, well, good things. Content Management Systems (CMS) applications, for example, are an open source application that is commonly used for good. The popular CMS apps are DNN (DotNetNuke), WordPress, Drupal, and Joomla - and there are many others. These apps share a lot of similarities that extend beyond them just being open source. In fact, they are the backbone of the majority of websites today.
In fact, it so common, that companies like equaTEK build an entire business segment utilizing one of the popular CMS applications (DNN) as its foundation.
Just as we have access to the open source code, as mentioned, so do the bad guys. We use that access to augment the code to provide the functionality that a client desires in their website. The bad guys though want to discover vulnerabilities that is in the code and then exploit them for their personal gain. The havoc they reign through their illegal actions is immeasurable.
So how do you combat this? You put as many security barriers in place that is reasonable and then you watch and monitor. The alternative is expensive and requires using applications that are not open source. This prevents someone that does not have access to the source code (the bad guys) from exploiting its vulnerabilities. Just as we do not live in a perfect world, there is not a perfect solution.
If you'd like to discuss this article in greater detail, feel free to contact us. We welcome the opportunity to discover the right solution for you!