Showing posts with label targeted. Show all posts
Showing posts with label targeted. Show all posts

Wednesday, 28 August 2013

Apple is the company most targeted by patent trolls

Apple, HP and Samsung have been attacked the most by so-called “patent trolls” within the last five years, a Silicon Valley lawyer said Tuesday. But recent legislative activity may be weakening their power.

Patents represented 5 percent of all U.S. exports in 2009, or $89.8 billion, Michael Brody, the vice chair of intellectual propert at Winston & Strawn, said during a presentation at the Hot Chips conference at Stanford University on Tuesday. That’s big business, and represents a jump in patent filings not seen since the Industrial Revolution.

Winston & Strawn

Perhaps not surprisingly, the number of patents filed by semiconductor and software firms have led that charge. Chip patents, as measured by Winston & Strawn, have grown from 15,000 annually to more than 65,000 since 1990, more than 25 percent of all filed. About 125,000 software patents are filed annually.

And that kind of meat has attracted sharks.

“Patent trolls,” also known as “non-practicing entities” or NPEs, don’t actually manufacture products based on their technology. Instead, they either develop technology themselves, patent it, or buy or license the patents from others. The key, however, is that NPEs amass a patent pool, then try to extract license fees from target companies through lawsuits. And that sort of business has arguably stifled the growth of new businesses in Silicon Valley, some have claimed.

Winstron & Strawn

“Ultimately, a patent is nothing more or less than a license to sue someone,” Brody said. “As a result, the generator of all the economic value that we’re looking at is simply that right, that right to create those lawsuits, and the value generated by those lawsuits.”

It stands to reason, then, that the largest tech titans have become the most frequent targets. Apple and HP, followed by Samsung. have become the most frequent targets of patent trolls throughout the last five years, Brody said. In 2012, more than 4,200 separate companies or individuals were sued by NPEs, he said.

Not surprisingly, the largest firms are the frequent target of suits; however, by the number of suits filed, the vast majority, or 63 percent, of those targeted have less than $100 million in revenue. Those smaller companies often pulled in just one or two suits, however, while the largest companies with over $50 billion revenue attracted an average of 7.3 suits in 2012 alone, Brody said.

(Most suits take 30 months to resolve, so that many are settled out of court; the average licensing cost for a case that goes to trial is $7.5 million; the average licensing cost for an out-of-court settlement is $29.75 million.)

Suits fled against larger companies also tend to demand higher amounts of damages; the mean resolution cost, including damages and the cost of the settlement, totaled $7.5 million for companies with over a billion dollars in revenue, and $7.8 billion for those over $10 billion in revenue.

That assumes the cost to defend each suit ranges from $800,000 per suit for startups to an average cost of $7.9 million for the those firms with over $50 billlion of annual revenue. (The median cost of those suits was much lower—$540,000—for the largest companies, indicating that the cost of just a few suits was over $10 million.)

Winston & Strawn

That can hurt smaller companies and larger companies alike, Brody noted. While the costs of suits to those with under $100 million in revenue were on the order of $200,000, those startups had far less revenue to work with.

In total, the annual cost or “troll tax” for defending NPE suits costs $1.04 million annually for those firms with annual revenue under $1 billion, to up to $57.67 million for those with revenues over $50 billion, Brody said.

That’s had a significant impact on smaller companies, with consequences that include product delays or revisions to the product itself, he said. Using a database compiled by RPX and analyzed by Brody, 13 percent of those companies polled either “pivoted” to another business model or closed up shop after an NPE suit.

So why would patent NPEs do what they do? Because it’s profitable. All told, an NPE has a 24.1 percent chance of “winning,” either by negotiating a settlement, winning at court, or at appeal. Even assuming the NPE has its own costs, Winston & Strawn estimated that the “net discounted value” of an NPE suit was $800,000—meaning that it was likely that the suit would itself would net at least that much just by being filed.

“That’s a good business to be in, and that’s why a lot of people are in it,” Brody said.

That doesn’t mean that NPEs are a long-term trend, Brody said. The costs to defend patents have gone down, and litigation has been introduced in Congress to minimize the impact of NPE abuses. Patent aggregators and covenants not to sue have also emerged.

Perhaps the biggest sticks, however, have simply been the fact that injunctions barring the sale of products have been rarely obtained, as have orders barring the sale and import of products by the International Trade Commission.

The NPE phenomenon may in fact be a bubble, Brody suggested. But it’s a bubble with a bite. For Brody, patent litigation of all stripes means a large paycheck. But until NPEs are reigned in—or the patent system is changed—they’ll remain a potential threat.

Follow TechHive on Tumblr today.


View the original article here

Monday, 5 August 2013

Industrial control systems targeted by malicious attackers, research shows

Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps.

The ICS honeypot system, designed to attract attackers, was created by Kyle Wilhoit, a researcher from security firm Trend Micro. He shared some initial findings in March based on the system's original deployment in the U.S.

The researcher shared new data regarding attacks at the Black Hat security conference on Thursday and also released the tools for others to build and deploy similar systems.

Since March, he has made significant changes to the system architecture. He virtualized it and deployed it in additional countries, including Brazil, Russia, Ireland, Singapore, China, Japan and Australia.

The new architecture uses a tool called the Browser Exploitation Framework (BeFF) to inject JavaScript code into attackers' browsers if they break into the system and access secure areas.

The injection is not malicious in nature, but it allows the honeypot operator to obtain information about the attacker's computer, which significantly enhances the ability to attribute attacks, Willhoit said. The JavaScript code can perform Wi-Fi triangulation to determine the attacker's location and can gather information about his computer and local network, including the OS, computer name and IP address, he said.

Wilhoit has identified 74 attacks against the ICS honeypot systems, 10 of which can be considered critical and could have compromised the integrity of the water pump.

In one case, an attacker tried to change the water temperature in the pump to 130 degrees Fahrenheit and in two other cases, the attackers issued commands to shut down the water pump.

Overall, 58 percent of attacks originated from Russia, but all of them were non-critical in nature.

Attacks classified as non-critical would have not have severely affected the water pump, but they could have led to critical attacks in the future, the researcher said.

Five of the critical attacks originated from China, and one each from Germany, the U.K., France, Palestine and Japan.

The critical attacks were targeted in nature and the attackers behind them generally tried to manually identify vulnerabilities in the components of the simulated water pump system, Willhoit said.

Meanwhile, the individuals behind the non-critical attacks first performed port scans and then used automated vulnerability scanners or known ICS vulnerabilities to try to break in.

The goal of some of the critical attacks was probably espionage or reconnaissance, as attackers were actively monitoring the data coming from the system, the researcher said.

During the past few years, security researchers have identified a large number of vulnerabilities in various components of industrial control systems. However, real-world information on who might attack such systems, and how likely attacks are, has been limited.

The big takeaway from this research is that attacks against Internet-facing ICSs are occurring and some of them appear to be targeted, Wilhoit said. Many ICS engineers are likely not aware that this is happening, he said.

The researcher hopes the tools he released will help ICS owners build and deploy their own honeypots in order to see who's targeting them and why and what changes they need to make to protect their real systems.

The ICS world needs more security information sharing, Wilhoit said. Researchers and IT professionals are sharing good information in other fields of IT security and same thing needs to happen for ICS, especially in those areas that could be considered critical infrastructure, he said.


View the original article here