The report, The Industrialization of Hacking, can be downloaded at: http://www.imperva.com/ld/industrialization.asp
As an example of this 'industrial revolution', Imperva has discovered new hacker scheme that is infecting educational servers worldwide with Viagra ads. According to Imperva, cyber-criminals are using industrialized methods to automate an as-yet unreported scheme that has infected hundreds, possibly thousands of .edu servers worldwide with Viagra ads. "This attack on academic institutions highlights how hacking has become industrialized infecting servers from major institutions including UC Berkeley, Ohio State and more. Ironically, this technique is the most prevalent method used to create havoc in cyberspace, yet remains virtually unknown to the general public," explained Imperva CTO Amichai Shulman.
The mass infection can be easily seen by searching Google US with the terms "Viagra and .edu": http://www.google.com/search?hl=en&source=hp&q=viagra+.edu&aq=f&aqi=g10&aql=&oq=
Key findings in the report include the organizational structure and technical innovations for automating attacks:
o Researchers: A researcher's sole responsibility is to hunt for vulnerabilities in applications, frameworks, and products and feed their knowledge to malicious organizations for the sake of profit. o Farmers: A farmer's primary responsibility is to maintain and increase the presence of botnets in cyberspace through mass infection. o Dealers: Dealers are tasked with the distribution of malicious payloads.
o Search engine manipulation. This technique is the most prevalent method used to spread bots, yet remains virtually unknown to the general public. Essentially, attackers promote Web-link references to infected pages by leaving comment spam in online forums and by infecting legitimate sites with hidden references to infected pages. For example, a hacker may infect unsuspecting Web pages with invisible references to popular search terms, such as "Britney Spears" or "Tiger Woods." Search engines then scour the websites reading the invisible references. As a result, these malicious websites now top search engine results. In turn, consumers unknowingly visit these sites and consequently infected their computers with the botnet software.
o Executing mass attacks through automated software—To gain unauthorized access into applications, dealers input email addresses and usernames as well as upload lists of anonymous proxy addresses into specialized software, the same way consumers upload addresses to distribute holiday cards. Automated attack software then performs a password attack by entering commonly used passwords. In addition, today's industrialized hackers can also input a range of URLs and obtain inadequately protected sensitive data.
Imperva, the Data Security leader, enables a complete security lifecycle for business databases and the applications that use them. More than 4,500 of the world's leading enterprises, government organisations, and managed service providers rely on Imperva to prevent sensitive data theft, protect against data breaches, secure applications, and ensure data confidentiality. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user and is recognised for its overall ease of management and deployment. For more information, visit www.imperva.com.
For further information, please contact: