Monday, September 28, 2009
Dasient details new attack @ Cyber Security East
Wednesday, August 19, 2009
Dasient @ HostingCon 2009
Tuesday, August 11, 2009
Dasient launches Web Anti-Malware Lite
Dasient Releases Free Open-Source Web Anti-Malware TechnologyTest version of Dasient WAM remediation technology enables site owners and web hosts to keep their sites from infecting users in the event of a malware infectionDasient also launches partner center and announces new distribution partnerships with web hosting providersWASHINGTON DC - August 11, 2009 - Today at HostingCon 2009, Dasient launched Mod Anti-Malware Lite, an open source version of its Web Anti-Malware (WAM) remediation technology. Mod Anti-Malware Lite is an Apache server module that will help site owners, web hosts, and developers protect themselves against the effects of web-based attacks that can compromise their sites and spread malware to their users. Mod Anti-Malware Lite will be made available today at www.dasient.com/partners and www.sourceforge.net."Every day, thousands of legitimate websites are infected with malicious code, and the speed, scale, and complexity of these attacks makes it difficult for website owners to identify and address the resulting infections," said Dr. Neil Daswani, one of Dasient's three co-founders. "Now more than ever it's important for site owners to deploy defenses that can operate at the scale and speed required to deal with the problem."The most immediate result of web malware infection is blacklisting by search engines like Google and Yahoo; browsers like Internet Explorer, Firefox, and Chrome; and desktop anti-virus providers like Norton and McAfee. Using Dasient's Web-Anti Malware service can help sites stay off these blacklists, all of which can have a significant impact on site traffic, reputation, and revenue. Dasient WAM is the only web anti-malware service on the market that can monitor, automatically identify, and quarantine malware on websites before it can infect visitors and cause a loss of traffic, reputation, and revenue.Dasient is making Mod Anti-Malware Lite available as open source so that web hosts, site owners, and developers can test the Dasient WAM technology on their sites and explore different uses of the technology. When used in conjunction with the Dasient WAM monitoring and diagnostic service, the module will prevent any page that's been infected with malware from being served to users. Anyone who downloads and installs Mod Anti-Malware Lite will be granted a limited free trial of the Dasient WAM monitoring and diagnostic service, to be used in conjunction with the module.Compared with the technology offered in Mod Anti-Malware Lite, the remediation technology in the premium service takes things a step further, removing any dangerous code but still serving the rest of the page to users, so site owners both protect their users from infection and stay open for business.Also today, Dasient is launching a new partner center at www.dasient.com/partners. The partner center is designed to be a resource for web hosting providers, enabling them to quickly and easily sign their customer domains up for free blacklist monitoring, download Mod Anti-Malware Lite, and more.Dasient is also happy to announce new distribution partnerships with five web hosting providers: Consolidated, Vexxhost, Ultrahosting, and Nerds on Site in North America and Diadem Technologies in India. These partners will be integrating Dasient WAM into their product platforms in the coming months, selling the product to their customers and sharing revenue with Dasient.
Thursday, August 6, 2009
Dasient Co-Founder Neil Daswani Gives Talk At Google
Enjoy!
Wednesday, July 22, 2009
How does a web page harm thee? Let me count the ways....
When analyzing a blacklist, the primary fact to keep in mind is that the term "bad" is not well defined. As such, each list operates under different criteria. Google, for example, focuses on technical threats such as drive-by downloads. McAfee and Norton take a broader view, and will flag a site based on things like "annoyance factors" or "excessive popups." McAfee also signs up for any mailing lists it finds and records the amount of spam generated. Google limits itself to a binary response marking a site as potentially harmful (e.g., "This site may harm your computer") or not, while McAfee and Norton label websites as "Safe," "Caution," "Warning," or "Untested."
Given these divergent criteria, the first thing that is immediately apparent is that it would be much too simplistic to call all blacklisted sites "malicious," while calling all non-blacklisted sites "safe." To see how similar or different these blacklists are in practice, we took a set of relatively popular domains on the Internet and queried all three lists.
Of the sites that were flagged by at least one of the blacklists:
- 57% were marked as potentially harmful or "Warning," with the other 43% marked as "Caution."
- Google flagged 5.2% with a "This site may harm your computer" label.
- Norton flagged 16.3% of the sites with a rating of "Warning," and another 14.4% with a rating of "Caution."
- McAfee flagged 38.6% of the sites with a rating of "Warning," and another 32% with a rating of "Caution."
When we compare which sites were blacklisted, however, the results become far more interesting. Of the sites that Google blacklisted:
- Norton labeled less than half with "Warning," half with "Safe," and the remaining ones as "Untested." None were labled with "Caution."
- McAfee labeled a quarter with "Warning," a quarter were "Untested," and the remaining half were safe. None were labled with "Caution."
- McAfee's users lodged complaints about more than half of the sites.

were flagged only by McAfee. Only 1% were flagged by all three lists.
Tuesday, July 7, 2009
Attackers infect websites via ad networks, widgets
Malicious advertisements are increasingly being used by attackers as a vector for distributing malware via legitimate sites. In this case, what happens is that the malicious code that the website ends up serving to users is being sourced in from an advertising partner. The website itself has not been compromised by attackers -- rather, the ad network used by the site has been compromised. Attackers often use malicious ads to achieve scale and avoid detection. It would have been difficult for the attackers to infect a large number of high-profile websites directly; instead, they were able to leverage the trusted relationship between the websites and their ad network to get malicious content (in this case an ad) served to the sites' end users. In some cases, Dasient has added certain ad networks to its internal blacklist to inform its customers where there is a risk that ads may result in infecting their users.
In addition to malware coming in through ads, we have also seen cases where malicious code comes into a website via content mash-ups or third-party widgets. For example, third-party widgets such as traffic counters have been used to infect websites (see section 4.4 of "The Ghost in the Browser"). We have spoken to website owners who explained that their sites were infected not through attackers exploiting a vulnerability in the website, but because they included a plug-in or widget that ended up being malicious. In some cases, the widget is benign for a period of time (even years), but then drastically changes behavior to become malicious (either because the widget provider was itself malicious or, more likely, because the widget provider's servers were hacked).
Attackers will continue to find network and web application vulnerabilities in websites that they can exploit to directly plant malicious code. However, it is clear from the Eyewonder incident that the attackers will also seek ways of exploiting the trusted relationships between websites and their third-party advertising or content partners to create the same effect. The nature of the open web encourages websites to mash up best-of-breed content (and ads) from various sources. To reduce risk, it is important for websites to perform due diligence on all third-party content and ad providers, as well as employ automated detection and remediation services.
Tuesday, June 16, 2009
Introducing Dasient Web Anti-Malware (WAM)
Co-Founders, Dasient
If you've been following our blog, you'll know that we've been talking quite a bit about the latest security threats on the web. One of the threats we've been focusing on specifically is web-based malware. This kind of attack -- in which hackers compromise a legitimate site and turn it into a delivery vehicle for drive-by malware downloads -- has long been regarded as an emerging threat.
But one look at the numbers makes it clear that this threat has officially arrived: In the last two years, there's been a 600% increase in the number of malware-infected webpages, and 80% of those pages are legitimate. Google first reported the problem of malware-infected pages exploding from April 2007 to January 2008. Microsoft estimated in an April 2009 report that the total number of legitimate webpages being compromised per month is more than 1 million. And now that search engines like Google and Yahoo; browsers like IE8, Firefox, and Chrome; and desktop AV providers like Norton and McAfee are blacklisting compromised sites, those sites are seeing double-digit losses in traffic and revenue and taking significant hits to their reputation.
Those are just some of the reasons we're proud to be opening up our Dasient Web Anti-Malware service to a broader audience today. Dasient Web Anti-Malware -- or "WAM," as we like to call it -- is the world's first complete anti-malware solution for websites. Dasient WAM monitors, automatically identifies, and quarantines malware on websites, before those sites suffer significant losses in traffic, revenue, and reputation.
We're making the monitoring and diagnostic elements of WAM openly available in public beta today, and making the quarantining element available in private beta. WAM is available both to site owners and to web hosting providers interested in offering their customers protection against web-based malware. If you want to learn more, jump down to the full text of our news release, which we've included below. If you're ready to get started right away, head here to sign up for free blacklist monitoring for your site.
We're excited to be bringing these necessary protections to the web, and are looking forward to your feedback. Stay tuned to this space for more news on Dasient WAM and further insights on the development of new web-based threats.
Here is the press release:
Dasient Introduces First Web Anti-Malware Service
Addresses Growing Need for Protection From New Web-Based Attacks
PALO ALTO, June 16, 2009 – Dasient today introduced the industry's first service to protect companies against a fast-growing class of web-based attacks that compromise legitimate websites and then use them to spread malware to the sites' visitors. Dasient's new Web Anti-Malware (WAM) service continually monitors websites, diagnoses any infections, and helps businesses address the infections, before the sites suffer significant losses in traffic, revenue, and reputation.
"In the last two years, we've seen a fundamental shift in the way malware is spread," said Dasient co-founder Dr. Neil Daswani. "Hackers are using highly automated and mutable attacks to turn websites into delivery vehicles for malicious software. This is a web problem at its core, and it requires a solution that can function at web speed and web scale. That's exactly what we had in mind when we designed the Dasient WAM service."
Sharp Increase in Malware-Infected Webpages
Each day, thousands of legitimate websites are infected with malicious code, often without their knowledge. The speed, scale, and complexity of these attacks makes it extremely difficult for website owners to identify and fix the resulting infections, and in some cases to even know they've occurred.
The most immediate result of web malware infection is blacklisting by search engines like Google and Yahoo; browsers like Internet Explorer, Firefox, and Chrome; and desktop anti-virus providers like Norton and McAfee. When blacklisted, a website's visitors are redirected to a warning that the site they're about to visit might be dangerous. In many cases, being blacklisted causes a sharp drop in traffic to the site, depriving the site owner of advertising or e-commerce revenue, damaging the site's brand, and spurring additional support costs.
Dasient Identifies and Contains Malware That Can Infect Site Visitors
Today Dasient is announcing the following updates to its patent-pending Web Anti-Malware service, which has been in alpha testing with thousands of websites since early this year:
- Free Blacklist Monitoring: Regularly monitors blacklists from search engines, browsers, and desktop anti-virus companies and provides customers with instant alerts if they've been flagged by those providers. The WAM Blacklist Monitoring service is now in public beta, and is available for free to direct customers and web hosting providers.
- Premium Monitoring and Diagnosis: Continuously monitors customer websites for malicious code that can be distributed by web applications, user-generated content, third-party widgets, advertisements, and other vulnerable site elements. When an infection is identified, customers are notified and provided with detailed diagnostic information, including all malicious source code and infected URLs. The WAM Premium Monitoring service is now in public beta, and is available on a subscription basis to direct customers and web hosting providers.
- Quarantining: Used in conjunction with the Premium Monitoring service, Dasient's quarantining technology automatically contains infections as soon as they're diagnosed, serving the webpages in question but not the malicious code. Quarantining prevents the site from spreading malware broadly to its visitors and keeps it from being flagged by blacklist providers. The WAM Quarantining service is now in private beta, and direct customers and web hosting providers can sign up to join the beta on the Dasient site.
The Dasient WAM monitoring and diagnostic services are built on a set of behavioral analysis technologies that continually crawl customer sites and the web, identifying new web-based malware infections. The monitoring and diagnostic tools are provided to customers as a web service, and the quarantining technology is made available as a web server module that can be installed by customers or web hosting providers.
More information about the Dasient WAM service and pricing can be found at www.dasient.com.
About Dasient
Dasient is an Internet security company that protects businesses from web-based malware attacks. It is the first to develop a complete Web Anti-Malware service that can monitor, automatically identify, and quarantine malware on websites before it can infect visitors and cause a loss of traffic, reputation, and revenue. Dasient was founded by former Google engineers Neil Daswani and Shariq Rizvi and former McKinsey strategy consultant Ameet Ranadive. They are backed by a group of seed investors who also invested in VeriSign, Citrix, Twitter, Digg, Tumbleweed, Finjan, and more. More information about Dasient can be found at www.dasient.com.