Kaspersky Nabs Linux Threats With Mail Security
Kaspersky Lab released Kaspersky Linux Mail Security, aimed at addressing a rising tide of multi-platform threats. The offering speaks to the growing number of Linux and Mac OS X threats that will likely prompt partners to bolster their arsenals with more comprehensive security tools.
Send to Kindle
It’s well established that attacks are becoming more indiscriminate. Threats once relegated to Microsoft Corp. Windows machines are more likely to hit those Macs and Linux systems too. In short, nothing is safe.
To that end, Kaspersky Lab Inc. is aiming to ramp up its email protection for other with the release of Kaspersky Linux Mail Security.
The solution relies on a variety of existing technologies from the Woburn, Mass.-based vendor such as heuristics and the company’s cloud-based Urgent Detection System, regularly used in its security solutions.
Among other things, the new mail security tool touts easy integration into a variety of Linux-based mail server configurations in an effort to block malware and malicious attachments, fight spam and stop exploits from infiltrating the corporate network. That means partners will likely have a few less headaches when integrating the solution into their customers’ multi-platform environments.
All in all, the new solution features a series of perks that include beefed up endpoint protection, attachment filter and format recognizer that blocks malicious attachments, enforced spam update service that gives users access to experts, reputation based spam filtering and a new AV engine.
Additionally, the solution offers support for IPv6, as well as comprehensive traffic and management rules and protection for ActiveDirectory and OpenLDAP.
Specifically, the e-mail security offering from Kaspersky Lab, a subsidiary of the Moscow-based Kaspersky Lab ZAO, aims to address the “hit and run” nature of attacks, the company says. For example, when a spam campaign is unleashed on an enterprise, around half of the intended victims are subjected to the messages within the first 10 minutes of the attack. That gives security solutions a short window to respond.
But for the channel, the Linux Mail Security system is another reminder that the days when attacks were relegated to Windows environments are long since gone, and will likely stay that way.
Enterprises housing diverse, multi-platform environments have existed since computers were introduced in the workplace. However, these days, it almost goes without saying that organizations’ are dealing with a lot more complexity as they incorporate virtualization, cloud and mobile infrastructure, as well as increasingly more reliance on Mac and Linux systems to fulfill various IT requirements.
That fact is not lost on cybercriminals, who are now making their attacks more holistic to address a wider variety of platforms, and hitting the proverbial two, five or 10 birds with one stone.
That means that malware is becoming more universal. Last month, researchers at F-Secure detected malware on compromised Colombian transport Web sites that targeted Windows, Mac and Linux users. During the attack, users trigger a Java Archive vulnerability by visiting a compromised Web site, which then determines if the users are running a Windows, Mac or Linux system before executing the attack.
In 2010, the Boonana malware similarly exploited a malicious Java applet to execute cross-platform attacks that downloaded malicious code on Windows, Unix and Mac OS X machines.
And last week, another Java vulnerability gave rise to a rampant exploit that allegedly swept across more than 100,000 systems before parent company Oracle Corp. issued an emergency patch repairing the flaw. While the exploit only appeared to attack Windows systems, it also contained the capability of infecting Mac OS X and Linux environments.
That said, partners will need to start rethinking security holistically, if they haven’t done so already. That means educating and informing their customers about security best practices that should be universally applied to all systems, not just to vulnerable Windows environments. And it means that it will likely behoove partners to start bolstering their arsenal with security tools that address a multitude of threats on a variety of platforms—if for nothing else, than to save some time and a lot of hassles tackling a plethora of new threats silo by silo.