Industry Research : Imperva Analyzes High-Profile ‘Anonymous’ Attack
Imperva, Inc. (NYSE: IMPV), a provider of a new category of data security solutions for high-value business data in the data center, released today a report that reveals details on an attack by hacktivist group ‘Anonymous’ against a high-profile unnamed target during a 25-day period in 2011.
2018 Top Ranking Performers Present:
The Hacker Intelligence Summary Report –The Anatomy of an Anonymous Attackoffers a comprehensive analysis of the attack, including a detailed timeline of activities from start to finish, an examination of the hacking methods utilized and insights on the use of social media to recruit participants and coordinate the attack.
"Our research shows that Anonymous generally mimics the approach used by for-profit hackers, leveraging widely known methods – SQL injection and DDoS – to carry out their attack. We found that Anonymous, although it has developed some custom attack tools, generally uses inexpensive, off-the-shelf tools as opposed to developing complex attacks," said Amichai Shulman, Co-Founder and CTO of Imperva."Our research further shows that Anonymous will try to steal data first and, if that fails, attempt a DDoS attack."
Highlights from the study of the Anonymous attack include:
-The attack was made up of three distinct phases: recruitment and communication, reconnaissance and application layer attacks and, finally, a distributed denial of service (DDoS) attack.
-Social media channels, especially Twitter, Facebook and YouTube, were the predominant means for suggesting a target and justifying the attack, as well as recruiting volunteers to participate in the hacking campaign, during the first recruitment and communication phase.
-Sophisticated hackers made up only a small portion of the volunteers and were primarily active during the reconnaissance and application attack phase, tasked with probing for vulnerabilities and waging application attacks like SQL injection to attempt to steal data from the targets.
-Laypeople were leveraged only in the third phase - to help carry out a DDoS attack - since the attempt to steal data through application attacks failed.
-Anonymous has developed some custom attack tools – specifically the low orbit ion cannon (LOIC) and a tool to enable the launch of a DDoS attack from mobile browsers.However, the group also relies on widely available tools for finding and exploiting web application vulnerabilities during the reconnaissance and application attack phase.
-Unlike for profit hackers, Anonymous rarely relies on common hacking techniques such as botnets, malware, phishing or spear phishing.
CONTACT CENTER & CUSTOMER ENGAGEMENT
BERLIN - ORLANDO - MACAO
FIND OUT MORE!
"Imperva’s Application Defense Center (ADC) was able to witness and report on an Anonymous attack from start to finish," continued Shulman. "The analysis of this attack provides useful insight into how Anonymous recruits participants and wages an attack. We believe these details will help organizations prepare for and respond to a potential attack, as well as offer the greater security community a deeper understanding of how hacktivists operate."
2018 Top Ranking Performers Present:
Today's Tip of the Day - Measure Progress Not Activity
More Editorial From Imperva
Published: Tuesday, February 28, 2012
Genesys® powers 25 billion of the world’s best customer experiences each year. Our success comes from connecting employee and customer conversations on any channel, every day. Over 10,000 companies in...
Five9 is a provider of cloud software for the enterprise contact center market, bringing the power of the cloud to thousands of customers and facilitating approximately three billion customer interact...
Aspect Software contact center and workforce optimization solutions engage consumers, empower agents, improve quality, and lower the cost of delivering remarkable experiences. Our cloud, private cloud...
Seamless customer engagement begins and lasts with Netcall. Contact centre technology designed with your customers experience in mind, allows you to access data and content where it’s needed using ou...