Blended Web Attacks Hitting More Websites

  /     /     /  
Publicated : 22/11/2024   Category : security


Blended Web Attacks Hitting More Websites


Hackers increasingly use four top techniques, such as cross site scripting and SQL injection, in combination, researchers say.



Strategic Security Survey: Global Threat, Local Pain (click image for larger view and for full slideshow)
The average large businesss website sees 27 attacks per minute, though attackers--thanks to automation--can create spikes of up to seven attacks per second, or about 25,000 attacks per hour.
Those findings come from a
new study
, conducted by Imperva, of more than 10 million Web application attacks targeting the websites of 30 large businesses and government agencies, launched between January 2011 to May 2011. The study also assessed traffic that flowed via
the onion router
, better known as TOR, which helps anonymize Web traffic.
The study found that the four most prevalent attacks against Web applications were directory traversal (37%),
cross site scripting
(36%),
SQL injection
(23%), and remote file include (4%), aka RFI.
Attackers often employed those techniques in combination, whether to steal data,
surreptitiously install malware on servers
, or simply create a
denial of service
. For example, a hacker may use directory traversal during a reconnaissance phase of the combined attack to identify the directory structure of an attacked server before sending an additional effective exploit vector, such as an RFI, according to the report.
Interestingly, the LulzSec hacking group
employed three of those techniques
, sometimes in combination. But LulzSecs exploits, which largely occurred in June, fell outside the scope of the report. Consequently, we didnt directly witness any attacks from Lulzsec, according to Impervas report. However, the Imperva researchers did see an incredible similarity between the most prevalent Web application hacking techniques, and the techniques used by LulzSecs members.
Impervas research presents an interesting contrast with other vulnerability information, such as the
Open Web Application Security Project
(OWASP) list of the top 10 worst Web application vulnerabilities. According to Amichai Shulman, CTO of Imperva, when it comes to the OWASP top 10, RFI and directory traversal were not identified as top vulnerabilities, yet our research shows that these are two of the most common attacks used by hackers to steal data.
The difference comes from assessing vulnerabilities, versus whats actually being attacked, he said via email. The shortcoming of OWASP Top 10 is that they concentrate on the most prevalent vulnerabilities. And while this is important, it does not concentrate on what hackers are actually hacking.
According to Impervas research, attackers largely pursue the easiest exploits, rather than the most
prevalent vulnerabilities
. Our report shows that if there is a vulnerability out there--even overlooked by Web application developers, not appearing in OWASP top 10, though easily exploitable--then hackers will go after it, said Shulman.
Beyond attack type, the Imperva report also assessed attack origin. Overall, most Web application attacks are
launched from botnets
involving exploited PCs located in the United States (for 61% of attacks), followed by China (9%), Sweden (4%), and France (2%).
But the identity of whoevers behind those attacks, and where they might be based, isnt clear. Our data shows that it is increasingly difficult to trace attacks to specific entities or organizations, said Rob Rachwald, director of security strategy at Imperva, in a
blog post
. This complicates any effort to retaliate, shut down cybercriminal gangs or identify potential acts of war.
Black Hat USA 2011 presents a unique opportunity for members of the security industry to gather and discuss the latest in cutting-edge research. It happens July 30-Aug. 4 in Las Vegas.
Find out more and register
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Blended Web Attacks Hitting More Websites