Vulnerabilities / Threats
7/25/2011
03:25 PM
Connect Directly
RSS
E-Mail
50%
50%

Blended Web Attacks Hitting More Websites

Hackers increasingly use four top techniques, such as cross site scripting and SQL injection, in combination, researchers say.

Strategic Security Survey: Global Threat, LocalPain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)
The average large business's website sees 27 attacks per minute, though attackers--thanks to automation--can create spikes of up to seven attacks per second, or about 25,000 attacks per hour.

Those findings come from a new study, conducted by Imperva, of more than 10 million Web application attacks targeting the websites of 30 large businesses and government agencies, launched between January 2011 to May 2011. The study also assessed traffic that flowed via the onion router, better known as TOR, which helps anonymize Web traffic.

The study found that the four most prevalent attacks against Web applications were directory traversal (37%), cross site scripting (36%), SQL injection (23%), and remote file include (4%), aka RFI.

Attackers often employed those techniques in combination, whether to steal data, surreptitiously install malware on servers, or simply create a denial of service. "For example, a hacker may use directory traversal during a reconnaissance phase of the combined attack to identify the directory structure of an attacked server before sending an additional effective exploit vector, such as an RFI," according to the report.

Interestingly, the LulzSec hacking group employed three of those techniques, sometimes in combination. But LulzSec's exploits, which largely occurred in June, fell outside the scope of the report. "Consequently, we didn't directly witness any attacks from Lulzsec," according to Imperva's report. However, the Imperva researchers did see an "incredible similarity" between the most prevalent Web application hacking techniques, and the techniques used by LulzSec's members.

Imperva's research presents an interesting contrast with other vulnerability information, such as the Open Web Application Security Project (OWASP) list of the top 10 worst Web application vulnerabilities. According to Amichai Shulman, CTO of Imperva, when it comes to the OWASP top 10, "RFI and directory traversal were not identified as top vulnerabilities, yet our research shows that these are two of the most common attacks used by hackers to steal data."

The difference comes from assessing vulnerabilities, versus what's actually being attacked, he said via email. "The shortcoming of OWASP Top 10 is that they concentrate on the most prevalent vulnerabilities. And while this is important, it does not concentrate on what hackers are actually hacking."

According to Imperva's research, attackers largely pursue the easiest exploits, rather than the most prevalent vulnerabilities. "Our report shows that if there is a vulnerability out there--even overlooked by Web application developers, not appearing in OWASP top 10, though easily exploitable--then hackers will go after it," said Shulman.

Beyond attack type, the Imperva report also assessed attack origin. Overall, most Web application attacks are launched from botnets involving exploited PCs located in the United States (for 61% of attacks), followed by China (9%), Sweden (4%), and France (2%).

But the identity of whoever's behind those attacks, and where they might be based, isn't clear. "Our data shows that it is increasingly difficult to trace attacks to specific entities or organizations," said Rob Rachwald, director of security strategy at Imperva, in a blog post. "This complicates any effort to retaliate, shut down cybercriminal gangs or identify potential acts of war."

Black Hat USA 2011 presents a unique opportunity for members of the security industry to gather and discuss the latest in cutting-edge research. It happens July 30-Aug. 4 in Las Vegas. Find out more and register.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0985
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName parameter.

CVE-2014-0986
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.

CVE-2014-0987
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.

CVE-2014-0988
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.

CVE-2014-0989
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode2 parameter.

Best of the Web
Dark Reading Radio