Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Blended Web Attacks Hitting More Websites

Hackers increasingly use four top techniques, such as cross site scripting and SQL injection, in combination, researchers say.

Strategic Security Survey: Global Threat, LocalPain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)
The average large business's website sees 27 attacks per minute, though attackers--thanks to automation--can create spikes of up to seven attacks per second, or about 25,000 attacks per hour.

Those findings come from a new study, conducted by Imperva, of more than 10 million Web application attacks targeting the websites of 30 large businesses and government agencies, launched between January 2011 to May 2011. The study also assessed traffic that flowed via the onion router, better known as TOR, which helps anonymize Web traffic.

The study found that the four most prevalent attacks against Web applications were directory traversal (37%), cross site scripting (36%), SQL injection (23%), and remote file include (4%), aka RFI.

Attackers often employed those techniques in combination, whether to steal data, surreptitiously install malware on servers, or simply create a denial of service. "For example, a hacker may use directory traversal during a reconnaissance phase of the combined attack to identify the directory structure of an attacked server before sending an additional effective exploit vector, such as an RFI," according to the report.

Interestingly, the LulzSec hacking group employed three of those techniques, sometimes in combination. But LulzSec's exploits, which largely occurred in June, fell outside the scope of the report. "Consequently, we didn't directly witness any attacks from Lulzsec," according to Imperva's report. However, the Imperva researchers did see an "incredible similarity" between the most prevalent Web application hacking techniques, and the techniques used by LulzSec's members.

Imperva's research presents an interesting contrast with other vulnerability information, such as the Open Web Application Security Project (OWASP) list of the top 10 worst Web application vulnerabilities. According to Amichai Shulman, CTO of Imperva, when it comes to the OWASP top 10, "RFI and directory traversal were not identified as top vulnerabilities, yet our research shows that these are two of the most common attacks used by hackers to steal data."

The difference comes from assessing vulnerabilities, versus what's actually being attacked, he said via email. "The shortcoming of OWASP Top 10 is that they concentrate on the most prevalent vulnerabilities. And while this is important, it does not concentrate on what hackers are actually hacking."

According to Imperva's research, attackers largely pursue the easiest exploits, rather than the most prevalent vulnerabilities. "Our report shows that if there is a vulnerability out there--even overlooked by Web application developers, not appearing in OWASP top 10, though easily exploitable--then hackers will go after it," said Shulman.

Beyond attack type, the Imperva report also assessed attack origin. Overall, most Web application attacks are launched from botnets involving exploited PCs located in the United States (for 61% of attacks), followed by China (9%), Sweden (4%), and France (2%).

But the identity of whoever's behind those attacks, and where they might be based, isn't clear. "Our data shows that it is increasingly difficult to trace attacks to specific entities or organizations," said Rob Rachwald, director of security strategy at Imperva, in a blog post. "This complicates any effort to retaliate, shut down cybercriminal gangs or identify potential acts of war."

Black Hat USA 2011 presents a unique opportunity for members of the security industry to gather and discuss the latest in cutting-edge research. It happens July 30-Aug. 4 in Las Vegas. Find out more and register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26030
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error page
CVE-2021-26031
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate filters on module layout settings could lead to an LFI.
CVE-2021-27710
PUBLISHED: 2021-04-14
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system funct...
CVE-2021-28484
PUBLISHED: 2021-04-14
An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send i...
CVE-2021-29654
PUBLISHED: 2021-04-14
AjaxSearchPro before 4.20.8 allows Deserialization of Untrusted Data (in the import database feature of the administration panel), leading to Remote Code execution.