Vulnerabilities / Threats
7/25/2011
03:25 PM
Connect Directly
RSS
E-Mail
50%
50%

Blended Web Attacks Hitting More Websites

Hackers increasingly use four top techniques, such as cross site scripting and SQL injection, in combination, researchers say.

Strategic Security Survey: Global Threat, LocalPain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)
The average large business's website sees 27 attacks per minute, though attackers--thanks to automation--can create spikes of up to seven attacks per second, or about 25,000 attacks per hour.

Those findings come from a new study, conducted by Imperva, of more than 10 million Web application attacks targeting the websites of 30 large businesses and government agencies, launched between January 2011 to May 2011. The study also assessed traffic that flowed via the onion router, better known as TOR, which helps anonymize Web traffic.

The study found that the four most prevalent attacks against Web applications were directory traversal (37%), cross site scripting (36%), SQL injection (23%), and remote file include (4%), aka RFI.

Attackers often employed those techniques in combination, whether to steal data, surreptitiously install malware on servers, or simply create a denial of service. "For example, a hacker may use directory traversal during a reconnaissance phase of the combined attack to identify the directory structure of an attacked server before sending an additional effective exploit vector, such as an RFI," according to the report.

Interestingly, the LulzSec hacking group employed three of those techniques, sometimes in combination. But LulzSec's exploits, which largely occurred in June, fell outside the scope of the report. "Consequently, we didn't directly witness any attacks from Lulzsec," according to Imperva's report. However, the Imperva researchers did see an "incredible similarity" between the most prevalent Web application hacking techniques, and the techniques used by LulzSec's members.

Imperva's research presents an interesting contrast with other vulnerability information, such as the Open Web Application Security Project (OWASP) list of the top 10 worst Web application vulnerabilities. According to Amichai Shulman, CTO of Imperva, when it comes to the OWASP top 10, "RFI and directory traversal were not identified as top vulnerabilities, yet our research shows that these are two of the most common attacks used by hackers to steal data."

The difference comes from assessing vulnerabilities, versus what's actually being attacked, he said via email. "The shortcoming of OWASP Top 10 is that they concentrate on the most prevalent vulnerabilities. And while this is important, it does not concentrate on what hackers are actually hacking."

According to Imperva's research, attackers largely pursue the easiest exploits, rather than the most prevalent vulnerabilities. "Our report shows that if there is a vulnerability out there--even overlooked by Web application developers, not appearing in OWASP top 10, though easily exploitable--then hackers will go after it," said Shulman.

Beyond attack type, the Imperva report also assessed attack origin. Overall, most Web application attacks are launched from botnets involving exploited PCs located in the United States (for 61% of attacks), followed by China (9%), Sweden (4%), and France (2%).

But the identity of whoever's behind those attacks, and where they might be based, isn't clear. "Our data shows that it is increasingly difficult to trace attacks to specific entities or organizations," said Rob Rachwald, director of security strategy at Imperva, in a blog post. "This complicates any effort to retaliate, shut down cybercriminal gangs or identify potential acts of war."

Black Hat USA 2011 presents a unique opportunity for members of the security industry to gather and discuss the latest in cutting-edge research. It happens July 30-Aug. 4 in Las Vegas. Find out more and register.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.