Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

11/14/2007
04:24 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Researchers 'Spy' on Web Attackers

'Undercover' research finds banner ad/click-fraud, spam - and automated attacks - dominate

Researchers with the Web Application Security Consortium (WASC) are hitting Web attackers and spammers where they live and hide out -- in open Web proxy servers. According to the latest findings by WASC, banner ad/click-fraud and spam ranked as the most common traffic visiting the organization's honeynet of decoy proxy servers for tracking real Web attacks.

Open proxies are an attacker's camouflage, providing them with anonymity in their requests to the Web. WASC's honeynet researchers are basically using the attackers' own tool against them, with fake open proxies in the honeynet. "I know that attackers use open proxies, so you can't always track them down. So I turned the tables on them," says Ryan Barnett, an officer with WASC and director of application security training for Breach Security.

Barnett, who heads up the WASC honeynet project, says the researchers have put in controls so that attackers can't loop through the honeynet to attack other sites, however. "If the traffic is normal or benign, we do proxy it through and it goes to its destination. If we see a live attack, we block it, and also spoof back some information to the attacker, such as HTTP status codes," Barnett says. "We want to see what the bad guys are really doing" in their Web attacks, he says.

Of the 9 million Web requests that hit the WASC honeynet in October, more than 2 million contained malicious, known attacks or other suspicious behavior. The global honeynet of Apache proxy servers configured with VMware was set up in January, and contains 15 of Breach Security's ModSecurity Web application firewalls, which identify, block, and log the attack traffic. The servers sit as decoys, gathering attack data that's monitored by the WAPs.

Banner add/click-through fraud traffic accounted for 2.6 million requests in October alone -- a major jump from 158,000 in the period between January and April of this year. And spammers weren't far behind, with nearly 2 million requests to the WASC honeynet proxies last month. That number was up from nearly 110,000 in the first phase of the project.

"And the bad guys are using automation as well," Barnett says.

This automated approach is all about brute-force attacks, he says. "Forget the bad guy just going to a porn site. With brute force, it's only a matter of time before they break into" legitimate sites, he says.

One method attackers are using is distributed reverse-brute force authentication, where an attacker scans a popular email provider's accounts in search of user names. "They are using common passwords and cycling them through different user names that might use them," Barnett says. That reverse method -- trying to crack the user name instead of the password -- lets them evade detection and prevents them from getting locked out of an account.

Barnett says he and his fellow researchers have also witnessed spammers using "Google-hacking" to search for blogs and to identify targets. "Then they are sending spam messages to user forums and blog postings."

And WASC says it found evidence that there are numerous legitimate Websites with malicious JavaScript code implanted in them, which targets unpatched browser vulnerabilities and then installs malware onto the victim client's machine. "It used to be if you didn't go to gambling or Warez sites, you were okay, but we're seeing more and more that that's not the case," Barnett says. "Legitimate sites are getting malware injected into them."

Websites are also suffering from "information leakage," where they provide too much detail in error messages, which can give the attacker valuable information about vulnerabilities in the site that he or she could use to wage an attack, according to WASC, which will present its findings today at the Open Web Application Security Project (OWASP) & WASC AppSec 2007 Conference in San Jose, Calif.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Breach Security Inc.

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 5/28/2020
    The Problem with Artificial Intelligence in Security
    Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
    10 iOS Security Tips to Lock Down Your iPhone
    Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-6342
    PUBLISHED: 2020-05-28
    An access bypass vulnerability exists when the experimental Workspaces module in Drupal 8 core is enabled. This can be mitigated by disabling the Workspaces module. It does not affect any release other than Drupal 8.7.4.
    CVE-2020-11082
    PUBLISHED: 2020-05-28
    In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.
    CVE-2020-5357
    PUBLISHED: 2020-05-28
    Dell Dock Firmware Update Utilities for Dell Client Consumer and Commercial docking stations contain an Arbitrary File Overwrite vulnerability. The vulnerability is limited to the Dell Dock Firmware Update Utilities during the time window while being executed by an administrator. During this time wi...
    CVE-2020-13660
    PUBLISHED: 2020-05-28
    CMS Made Simple through 2.2.14 allows XSS via a crafted File Picker profile name.
    CVE-2020-11079
    PUBLISHED: 2020-05-28
    node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.