[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
|
|
|
- Aldous Spencer
- 9 years ago
- Views:
Transcription
1 TLP: GREEN Issue Date: Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO) attack campaign promoting cheating and infidelity stories. The attack leverages SQL Injection vulnerabilities within target websites to inject bogus web content into the database. If successful, the target website will distribute hidden Hypertext Markup Language (HTML) links that Search Engine bots will index and use to raise the link destination site s rankings. 1.0 / Attack Overview / SEO campaigns are perfectly legitimate ways to promote websites in order to get better visibility and more traffic, but what happens when an SEO campaign crosses the line into the dark side and uses web application vulnerabilities to carry out their tasks? The complexity of this attack campaign includes the defacement of hundreds of web applications across the Internet. This is considered a defacement based on the fact that attackers are able to modify the HTML data coming out of the web application and presented to site visitors. This is different from normal defacements, however, as the data is not visible to normal site users and is only intended for Search Engine bots. By abusing SQL Injection vulnerabilities in web applications that use Microsoft s MSSQL backend database, attackers can inject reference links between the defaced applications and the cheating stories website. Once the injected content is placed, the attacker counts on the scanning that search engines perform to determine what should be the best results for any given keywords. As a result, the rating of the cheating stories application will be calculated based on the quality and quantity of those links. By successfully compromising many different sites, the attackers are trying to mimic the normal distribution of content over the web, thus fooling the Search Engine s SEO algorithms. 1
2 2.0 / Anatomy of the Attack / By analyzing Internet traffic data on the Akamai Intelligent Platform during a twoweek period of Q3 2015, the Threat Research Team was able to detect distributed attack activity where attackers targeted more than 3,800 websites. Figure 1 shows the attack count over this twoweek window: SEO SQL Injection Attack Count Attack Count /22/15 6/23/15 6/24/15 6/25/15 6/26/15 6/27/15 6/28/15 6/29/15 6/30/15 7/1/15 7/2/15 7/3/15 7/4/15 7/5/15 7/6/15 7/7/15 7/8/15 7/9/15 7/10/15 7/11/15 7/12/15 7/13/15 7/14/15 7/15/15 7/16/15 7/17/15 7/18/15 7/19/15 7/20/15 Figure 1: SEO SQL Injection Attacks identified The Akamai Threat Research Team has continued to monitor this attack campaign and it is still ongoing. 2
3 3.0 / Attacker Source Locations / We identified 348 unique source IP addresses participating in this attack campaign during the twoweek window. The IP addresses were distributed globally as shown in the following map: Figure 2: Geolocation of source IP addresses involved in SEO attacks 4.0 / Mass SQL Injection Targeting MSSQL / It is difficult to execute mass SQL Injection attacks against web applications if the goal is to exfiltrate data. This is mainly due to websites running custom coded applications, which results in different backend databases for each site. No two sites are the same and thus no two databases are identical. Since attackers don t have access to the target code, if they wanted to extract out customer creditcard data from a backend database, they would be forced to run reconnaissance probes in order to enumerate the database structure and naming conventions. For a realworld analogy, think of each target database like a lock on a door. Attackers must create different unique keys that can unlock each specific lock. An attack session could take several hundred individual requests to extract out sensitive data from the database. This manual probing offers defenders time to identify and react to attacks before successful compromise of customer data. In these SEO attack campaigns, however, the goal is not to exfiltrate data but rather to inject data into the database without prior knowledge of the database structure. They accomplish this by using multiple SQL commands that create a script that will generically gather data from the database and then loop through various table names and append the malicious javascript that points to a 3rd party site. 3
4 Going back to the door/lock analogy, these SQL Injections act as skeleton keys, if you will. This is actually a technique that was first seen almost 7 years ago when the ASPROX SPAM botnet first employed them. Whereas the goal in those attacks was the injection of drivebydownload malware links, these attacker s instead focus on SEO manipulations to drive traffic to their sites. It is the same exploit technique but with a different payload and end goal. 4.1 / SQL Injection Payload Analysis / The SEO attackers were targeting websites using Microsoft s MSSQL database as evidenced by the construct of the SQL Injection payloads. It is important to note that this attack is NOT exploiting a vulnerability within Microsoft s Internet Information Systems (IIS) web server or the MSSQL database software. The vulnerabilities are not a result of a software flaw that requires the vendor (Microsoft) to release a patch. The vulnerability is introduced by web application developers who are using Microsoft software, do not properly validate usersupplied input for their custom coded web application, and do not construct SQL queries using prepared statements in the database calls. Let s take a closer look at these SQL Injection payloads. Here is a sanitized example, where the injection point is within a querystring parameter value being passed to a Microsoft ASP page: Figure 3: An example SQL injection attack payload from the SEO campaign 4
5 Here is a URL decoded and beautified version of the resulting SQL injection: Figure 4: A reformatted version of the SQL injection payload In this SQL injection payload, the attackers utilized many features of the MSSQL query language to access and modify database content. If this particular example were successful, then the HTML response data coming out of the web application would include these new hidden DIV elements. 5
6 [state akamai s of [state the internet] of the internet] / SEO Attacks / Threat Advisory 4.2 / Multiple Injection Points / In addition to the querystring parameter injection point shown previously, the attackers also attempted to inject the payloads into different request headers such as UserAgent and Referer. Figure 5: Example HTTP request with SQL Injection payload in UserAgent and Referer header fields The rationale for injecting these payloads into HTTP request header fields is that some web applications may use data from these headers as part of an SQL database query, perhaps as part of website visitor analytics. These injection points may also not have the same security inspection and filtering that are present when the application looks at parameter and cookie payloads. 4.3 / Resulting HTML Modifications / If the inbound SQL Injection attacks are successful, the HTML data returned to website visitors will have new hidden data. Here is a realworld snippet of what a victim website s HTML source code looked like before being compromised: Figure 6: Victim website s HTML before the attack. 6
7 And here is what that same HTML snippet looked like after being compromised: Figure 7: Victim website s HTML after the compromise Notice that all of the new bogus data stored within the MSSQL database content is now echoed back within the page TITLE data and also other elements such as META tag content data. Keep in mind that this SQL Injection technique is a sledgehammer approach as it indiscriminately modifies database fields. The end result is that many of the web pages become broken when clients view them. More often than not, organizations identify that they have been compromised once their customers start complaining about broken web pages. In this case, the goal of the attack was merely to drive traffic to the application in question. So the outcome of a successful attack resulted in web application defacement by referring links. While this may not be as severe as customer data leakage, the attackers could just as easily have injected malicious javascript code that targeted web application users. 7
8 5.0 / SEO Ranking Tricks/ Search engines consider many factors to determine search results ranking. For example, the number of links redirecting to the web application and the reputation of the referring links (or web applications) influence the rank of the site in question. This is the basis for Page Rank, the original brains behind the Google search engine. While most of the elements that affect a page s rank are wellknown, the exact recipe or combination of those factors into the search engine ranking formula is a big mystery. Figure 8: An illustration of the SEO campaign In this case, attackers used a number of SEO techniques that mimic valid Internet content and made sure it would be properly factored by search engines. 5.1 / Chain of links redirection / The attacker created a chain of external links leading to the cheating stories web application. The first chained link was created by the SQL injection Botnet attack, injecting HTML links into as many web applications as possible across the Internet. In the entire attack campaign, dozens of referring links to web applications were used none of which are the cheating stories web application. The second chained link was from those dozens of web applications that contain contextaware HTML pages to the target of the SEO campaign, which is the cheating stories web application. While there hasn t been evidence of it yet, it is expected that dozens of web applications were also a victim of defacement. It is assumed that the chaining of links is done in order to mimic normal distribution of content over the web in a way that will lead search engines to see it as legitimate content. 8
9 5.2 / Context awareness / Since the web application was promoted via the cheating business, we can see link anchor text the text used on a hyperlink, content, and comments that uses words such as: husband, cheat, affairs, women, etc. This usage of keywords plays handinhand to the way that search engine algorithms do their job and map keywords to the relevant pages. Figure 2 is an example of page content from the second link in the chain leading to the cheating stories. Research also indicated that the attackers created content that emphasized the relevant context by implanting meaningful content inside meaningless content (as seen in the figure below). Figure 9: Example for page content of the second link in the chain, leading to the cheating stories Web application 6.0 / Postmortem Analysis / As part of the attack postmortem analysis, the following findings were revealed: Evidence of mass defacement when searching the Internet for the HTML links that were used as part of this campaign, hundreds of web applications contained malicious links. Leading search engines when searching for a combination of common words such as cheat and story, it was apparent that the cheating stories application appeared on the firstreturned page of the leading search engines. Web application analytics looking at Alexa analytics, the ranking of the cheating stories application has dramatically increased in the past three months. 9
10 [state of the internet] / security / case study This campaign illustrates the level of sophistication attackers are using in order to promote web applications, including malicious techniques such as SQL injection, distributed botnet attacks, defacement, and search engine optimization (SEO) attacks. Attackers showed a deep understanding of search engine algorithms, mimicking the normal distribution of content over the web. The outcome of this attack campaign is clear: the cheating stories web application is now highly ranked by leading search engines. 7.0 / Defensive Measures / There are several defensive techniques that can be employed to help prevent this attack from exploiting a website. For Web Application Developers Considerations in the Design phase of the SDLC: Ensure that you have implemented proper input validation checks for all usersupplied data that will be used within a backend database query. Reference: org/index.php/input_validation_cheat_sheet Only use prepared statements with parameterized queries when constructing SQL queries based on usersupplied data. Reference: SQL_Injection_Prevention_Cheat_Sheet For Web Application Defenders Protections once the application is in production: Deploy a Web Application Firewall (WAF) that is configured in a blocking mode for SQL Injection attacks. Consider profiling and monitoring the HTML response body format to help identify if there are significant changes such as the number of web links. 8.0 / Conclusion / The searchengine economy is built on the concept of visibility and exposure to Internet content. Simply put: a high searchengine ranking can translate into significant revenue. If Internet history has taught us anything, it is that if there is money to be made, cyber criminals will find a way. Detecting highly scaled, distributed attacks across the Internet is much easier when done in a cloud network. Having the knowledge of such attack campaigns can be used as an actionable insight for improving the mitigation of future attack campaigns. 10
11 Threat Research Team The Threat Research Team is responsible for the security content and protection logic of Akamai s cloud security products. The team performs cutting edge research to make sure that Akamai s cloud security products are best of breed, and can protect against the latest application layer threats. About Akamai As the global leader in Content Delivery Network (cdn) services, Akamai makes the Internet fast, reliable and secure for its customers. The company s advanced web performance, mobile performance, cloud security and media delivery solutions are revolutionizing how businesses optimize consumer, enterprise and entertainment experiences for any device, anywhere. To learn how Akamai solutions and its team of Internet experts are helping businesses move faster forward, please visit or blogs.akamai.com, and on Twitter. Akamai is headquartered in Cambridge, Massachusetts in the United States with operations in more than 57 offices around the world. Our services and renowned customer care are designed to enable businesses to provide an unparalleled Internet experience for their customers worldwide. Addresses, phone numbers and contact information for all locations are listed on Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Akamai and the Akamai wave logo are registered trademarks. Other trademarks contained herein are the property of their respective owners. Akamai believes that the information in this publication is accurate as of its publication date; such information is subject to change without notice. Published 01/16. 11
The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.
1 TLP: GREEN 02.11.15 GSI ID: 1086 SECURITY BULLETIN: MS SQL REFLECTION DDOS RISK FACTOR - MEDIUM 1.1 / OVERVIEW / Beginning in October 2014, PLXsert observed the use of a new type of reflection-based
SSDP REFLECTION DDOS ATTACKS
TLP: AMBER GSI ID: 1079 SSDP REFLECTION DDOS ATTACKS RISK FACTOR - HIGH 1.1 OVERVIEW / PLXsert has observed the use of a new reflection and amplification distributed denial of service (DDoS) attack that
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
JOOMLA REFLECTION DDOS-FOR-HIRE
1 TLP: GREEN GSI ID: 1085 JOOMLA REFLECTION DDOS-FOR-HIRE RISK FACTOR - HIGH 1.1 / OVERVIEW / Following a series of vulnerability disclosures throughout 2014, the popular content management framework Joomla
AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.
CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Web Application Vulnerability Scanner: Skipfish
Web Application Vulnerability Scanner: Skipfish Page 1 of 7 EXECUTIVE SUMMARY Skipfish is an automated web application vulnerability scanner available for free download at Google s code website. It is
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
DNS FLOODER V1.1. akamai s [state of the internet] / Threat Advisory
GSI ID: 1065 DNS FLOODER V1.1 RISK FACTOR - HIGH 1.1 OVERVIEW / PLXSert has observed the release and rapid deployment of a new DNS reflection toolkit for distributed denial of service (DDoS) attacks. The
Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014
SESSION ID: SPO2-W04 Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 John Summers VP, Security Products Akamai #RSAC The Akamai Intelligent Platform The Platform 167,000+ Servers 2,300+
Secure Content Delivery Network
kamai Technologies Inc. Secure Content Delivery Network Physical Access Information May 13, 2014 Table of Contents Purpose... 2 Risk Analysis... 2 Physical Access... 2 Issue/Response... 3 Records... 4
AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry
AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection Trend Micro, Incorporated Marco Dela Vega and Norman Ingal Threat Response Engineers A Trend Micro Research Paper I November
THE AKAMAI SERVICE CONSULTING PACKAGE 10FOR10 IMPROVES YOUR WEB PERFORMANCE METRIC(S) BY AT LEAST 10%! AKAMAI 10For10 AKAMAI INDUSTRY BROCHURE
AKAMAI 10For10 THE AKAMAI SERVICE CONSULTING PACKAGE 10FOR10 IMPROVES YOUR WEB PERFORMANCE METRIC(S) BY AT LEAST 10%! Whether delivering web applications from behind the firewall, hosting in the cloud,
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Web Security. Discovering, Analyzing and Mitigating Web Security Threats
Web Security Discovering, Analyzing and Mitigating Web Security Threats Expectations and Outcomes Mitigation strategies from an infrastructure, architecture, and coding perspective Real-world implementations
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
Understanding Web Application Security Issues
Understanding Web Application Security Issues Pankaj Sharma January 30, 2009 Indian Computer Emergency Response Team ( CERT - IN ) Department Of Information Technology 1 Agenda Introduction What are Web
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Improving Web Application Security: The Akamai Approach to WAF
Improving Web Application Security: The Akamai Approach to WAF Akamai White Paper The Akamai Approach to WAF 2 TABLE OF CONTENTS INTRODUCTION 3 CHALLENGES WITH DEPLOYING WAFS 3 WAF DESIGN PRINCIPLES 4
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
How to Evaluate DDoS Mitigation Providers:
Akamai White Paper How to Evaluate DDoS Mitigation Providers: Four Critical Criteria How to Evaluate DDoS Mitigation Providers 2 TABLE OF CONTENTS INTRODUCTION 3 CRITERIA #1: THREAT INTELLIGENCE 3 CRITERIA
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Secure Content Delivery Network
Akamai Technologies Inc. Akamai Security and Compliance Secure Content Delivery Network Physical Access Information May 13, 2014 Table of Contents Risk Analysis... 1-2 Physical Access... 2-3 Records...
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
The New PCI Requirement: Application Firewall vs. Code Review
The New PCI Requirement: Application Firewall vs. Code Review The Imperva SecureSphere Web Application Firewall meets the new PCI requirement for an application layer firewall. With the highest security
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
NTP-AMP: AMPLIFICATION TACTICS AND ANALYSIS
GSI ID: 1070 NTP-AMP: AMPLIFICATION TACTICS AND ANALYSIS RISK FACTOR - HIGH 1.1 OVERVIEW / Amplification is not a new distributed denial of service (DDoS) attack method, nor is the misuse of the Network
Web Application Security 101
dotdefender Web Application Security Web Application Security 101 1 Web Application Security 101 As the Internet has evolved over the years, it has become an integral part of virtually every aspect in
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
Making the Internet Business-Ready
Making the Internet Business-Ready If you ve ever shopped online, downloaded music, watched a web video or connected to work remotely, you ve probably used Akamai. Our solutions help to deliver the best
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
ONLINE RECONNAISSANCE
ONLINE RECONNAISSANCE HOW YOUR INTERNET PROFILE CAN BE USED AGAINST YOU May 2013 Most people and organisations put information about themselves on the web. Companies advertise their work and achievements
2015 Vulnerability Statistics Report
2015 Vulnerability Statistics Report Introduction or bugs in software may enable cyber criminals to exploit both Internet facing and internal systems. Fraud, theft (financial, identity or data) and denial-of-service
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION Stephen Gates Chief Security Evangelist Corero Network Security Session ID: SEC-W04 Session Classification: Intermediate Recent Headlines Are Denial of
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Website Report for http://www.cresconnect.co.uk by Cresconnect UK, London
Website Report for http://www.cresconnect.co.uk by Cresconnect UK, London Table of contents Table of contents 2 Chapter 1 - Introduction 3 About us.................................... 3 Our services..................................
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1
Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
Hacker Intelligence Initiative, Monthly Trend Report #15
January 2013 Hacker Intelligence Initiative, Monthly Trend Report #15 Lessons Learned From the Yahoo! Hack How SQL Injection Vulnerabilities in Third-Party Code Can Make for Security Cloudy 1. Executive
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
An analysis of exploitation behaviors on the web and the role of web hosting providers in detecting them
An analysis of exploitation behaviors on the web and the role of web hosting providers in detecting them Davide Canali, Davide Balzarotti Aurélien Francillon Software and System Security Group EURECOM,
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
