Industry Research : Imperva Finds Business Logic Attacks Attractive To Hackers
Imperva (NYSE: IMPV), a provider of a new category of data security solutions for high-value business data in the data center, today announced the release of the second Imperva Web Application Attack Report (WAAR), which revealed that web applications are subject to business logic attacks. The WAAR, created as a part of Imperva’s ongoing Hacker Intelligence Initiative, offers insight into actual malicious web application attack traffic over a period of six months, June 2011 through November 2011.
??Imperva monitored and categorized attacks across the internet targeting 40 different applications. The WAAR outlines the frequency, type and geography of origin of each attack to help security professionals better prioritize vulnerability remediation.
??"Business logic attacks are attractive for hackers since they follow a legitimate flow of interaction of a user with the application," said Amichai Shulman, Imperva’s CTO."This interaction is guided by an understanding of how specific sequences of operations affect the application’s functionality. Therefore, the abuser can lead the application to reveal private information for harvesting, skew information shared with other users and much more — often bypassing security controls."
-In the six month period from June – November 2011, the observed web applications suffered attacks in the range of 130,000 to 385,000 per month. At its peak, the application set was under attack at a rate of nearly 38,000 per hour or ten per second.
-Hackers are relying on business logic attacks due to their ability to evade detection: Imperva also investigated two types of Business Logic attacks: Comment Spamming and Email Extraction. Comment Spamming injects malicious links into comment fields to alter search engine results and potentially defraud consumers.Email Extraction simply catalogs email addresses for building spam lists.These Business Logic attacks accounted for 14% of the analyzed malicious traffic.
-The geographic origin of Business Logic attacks were:
oEmail extraction was dominated by hosts based in African countries.
oAn unusual portion of the Comment-spamming activity was observed from eastern-European countries.
-Hackers exploit five common application vulnerabilities: The five most common application vulnerabilities are: Remote File Inclusion (RFI), SQL Injection (SQLi), Local File Inclusion (LFI), Cross Site Scripting (XSS) and Directory Traversal (DT). Cross Site Scripting and Directory Traversal are the most prevalent classical attack types. Why are these vulnerabilities targeted? Hackers prefer the path of least resistance and application vulnerabilities offer a rich target.
Related Editorial
- Imperva Report Examines Dangers In Light Of Military Singles Hack
- Imperva Research New Search Engine Hack Innovation
- Imperva Releases Details of How Search Engine Poisoning (SEP) Works
- Imperva Deconstructs Local and Remote File Inclusion Attack Vectors
- Imperva Analyzes High-Profile ‘Anonymous’ Attack
- 86% of IT Organisations Don’t Track Sensitive Documents
More Editorial From Imperva
- Imperva Report Examines Dangers In Light Of Military Singles Hack
- Imperva Deconstructs Local and Remote File Inclusion Attack Vectors
- Imperva Analyzes High-Profile ‘Anonymous’ Attack
- Imperva Research New Search Engine Hack Innovation
- Imperva Releases Details of How Search Engine Poisoning (SEP) Works
- 86% of IT Organisations Don’t Track Sensitive Documents
Published: Wednesday, February 1, 2012
Industry Suppliers | Get Listed |
![]() | PREMIUMGenesys http://genesys.com Genesys® powers 25 billion of the world’s best customer experiences each year. Our success comes from connecting employee and customer conversations on any channel, every day. Over 10,000 companies in... (view more) | |
![]() | NICE Systems NICE (NASDAQ: NICE), is a worldwide provider of intent-based solutions that capture and analyze interactions and transactions, realize intent, and extract and leverage insights to deliver impact in re... (view more) | |
![]() | Aspect Software Aspect Software contact center and workforce optimization solutions engage consumers, empower agents, improve quality, and lower the cost of delivering remarkable experiences. Our cloud, private cloud... (view more) | |
![]() | Dialogic Dialogic is a provider of technologies based on open standards such as host media processing and other multimedia products that enable its customers and partners to deliver mobile, video, IP, and TDM ... (view more) | |
Get Listed |