Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Q2 2012 FireHost Web Application Attack Report Shows Sharp Rise in SQL Injections

July 2012 by FireHost

Secure cloud hosting company, FireHost, has revealed the latest statistical analysis of attacks successfully blocked by its servers located at data centres in the US and Europe. During the period of April to June 2012, the web applications, databases and websites of FireHost’s customers – spread across 33 countries worldwide – were protected from a total of 17 million cyber attacks, of which more than two million were categorised as the most serious kind of attack, and among FireHost’s ‘Superfecta’.

The Superfecta is a group of four attack types considered by FireHost as being the most malicious and dangerous – they are Cross-site Scripting (XSS), Directory Traversals, SQL Injections, and Cross-site Request Forgery (CSRF). One of the most significant changes in attack traffic seen by FireHost between Q1 and Q2 2012 was a 69% increase in SQL Injection attacks. Rising from 277,770 blocked attacks in the first quarter, to 469,983 between April and June, this type of attack is frequently cited as an attack vector of choice for data thieves.

In simple terms, SQL Injection involves the entering of malicious commands into URLs and text fields on websites that happen to be vulnerable, usually in an attempt to steal the contents of databases storing valuable data such as credit card details or usernames and passwords. The attack vector has been associated with many high profile data breaches, most famously Sony in 2011 and, more recently, it is suspected to be the method used by hackers to steal passwords from LinkedIn, eHarmony and Yahoo!.

“Many, many sites have lost customer data in this way,” said Chris Hinkley, CISSP – a Senior Security Engineer at FireHost. “SQL Injection attacks are often automated and many website owners may be blissfully unaware that their data could actively be at risk. These attacks can be detected and businesses should be taking basic and blanket steps to block attempted SQL Injection, as well as the other types of attacks we frequently see.”

Similarly to Q1 2012, the majority of attacks FireHost blocked during the second calendar quarter of 2012 originated in the United States (14 million / 83%). Southern Asia came in second with 8%, while Europe was in third, as the origin of 6% of malicious attack traffic seen by FireHost.

As a result of the recent and high profile data breach incidents, more businesses are now familiar with the malice of cyber attacks. FireHost warns them not to underestimate the scale at which automated attacks are launched by hackers on the poorly protected web pages of businesses of all sizes.
“One thing we can always expect is for the security threat landscape to change quickly and be very fluid. With so many moving parts, hosters and service providers need to ensure that transparency is a core element of their security strategy," said Philbert Shih, managing director of Structure Research. "Companies that are able to provide realtime customer data that can speak to market threats not only do right by their customers but contribute to the research community’s knowledge and understanding. Spotting a rise in SQL Injection hack attempts, for instance, is not something to overlook and should be seen as a warning to all who monitor this space."

“Some of the data theft incidents that are reported in the media are precisely targeted, but a more substantial risk to most comes from an abundance of automated, malicious bots that attack websites in a more random fashion,” said Todd Gleason, Director of Technology at FireHost. “Businesses should take readily available and basic steps to block any kind of unwanted traffic from accessing their sites. Mitigating Denial of Service attacks and ensuring web applications are secure can go a long way toward fighting off these random attacks”


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts