CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC



Similar documents
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Where every interaction matters.

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution

DDoS Overview and Incident Response Guide. July 2014

SecurityDAM On-demand, Cloud-based DDoS Mitigation

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

DDoS Attacks & Mitigation

Global DDoS Prevention Market

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

How To Protect Yourself From A Dos/Ddos Attack

How Cisco IT Protects Against Distributed Denial of Service Attacks

DoS: Attack and Defense

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Complete Protection against Evolving DDoS Threats

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

The Hillstone and Trend Micro Joint Solution

Denial of Service Attacks, What They are and How to Combat Them

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Arbor s Solution for ISP

TDC s perspective on DDoS threats

Acquia Cloud Edge Protect Powered by CloudFlare

Network attack and defense

A Layperson s Guide To DoS Attacks

Check Point DDoS Protector

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

DDoS Protection on the Security Gateway

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.

First Line of Defense

FortiDDos Size isn t everything

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

NASCIO 2015 State IT Recognition Awards

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

Security. 26 November 2012 Vol.18 No11

CS 356 Lecture 16 Denial of Service. Spring 2013

CloudFlare advanced DDoS protection

IBM Managed Security Services Vulnerability Scanning:

IBM Advanced Threat Protection Solution

10 Things Every Web Application Firewall Should Provide Share this ebook

Radware s Behavioral Server Cracking Protection

Intelligent, Scalable Web Security

Overcoming Five Critical Cybersecurity Gaps

Practical Threat Intelligence. with Bromium LAVA

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

Radware s Attack Mitigation Solution On-line Business Protection

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Securing Your Business with DNS Servers That Protect Themselves

Cloud Security In Your Contingency Plans

Security Toolsets for ISP Defense

A HELPING HAND TO PROTECT YOUR REPUTATION

NSFOCUS Web Application Firewall

VALIDATING DDoS THREAT PROTECTION

Taxonomic Modeling of Security Threats in Software Defined Networking

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Guideline on Vulnerability and Patch Management

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Network Virtualization Platform (NVP) Incident Reports

Spyders Managed Security Services

E-Guide. Sponsored By:

Packet Level Authentication Overview

The Risk vs. Cost of Enterprise DDoS Protection

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Transcription:

: CASE STUDY WEB APPLICATION DDOS ATTACK 1

WEB APPLICATION DDOS ATTACK CASE STUDY MORAL Ensuring you have DoS/DDoS protection in place, before you are attacked, can pay off. OVERVIEW XYZ Corp (name changed to protect client identity), an NTT Group managed security service client, was subjected to a distributed denial-of-service (DDoS) attack. The attack, which had seen little previous use, was an application layer DDoS attack, targeting a web application at a rate of less than a megabit per second. This was a significant difference from many of the large, distributed attacks which NTT mitigates every day in the global backbone provided to its customers. 2

TIMELINE OF EVENTS TIMELINE OF EVENTS DATE EVENT DAY 1 Possible application DDoS attack detected Incident escalated to NTT Group Client Team verified no operational issues causing delays leading to indication of an attack Logs requested from the client s Internet Service Provider (ISP) Detailed analysis reveals an attacker maliciously using a WordPress feature as a focus of the attack Mitigation steps identified and signature is created, tested and deployed Client fully mitigates the attack Escalation of sanitized details related to the attack traffic is transmitted to DoS prevention vendor Total elapsed time for this incident: 5.5 hours Elapsed time once logs were received from ISP: 1.5 hours DAY 7 Vendor deploys new official signature DESCRIPTION OF EVENT During the spring of 2014, NTT Group security analysts in a Security Operations Center (SOC) detected a DDoS attack by observing anomalous responses from various systems within a single client s monitored environment. NTT Group initiated further investigations along with XYZ Corp, as well as XYZ Corp s IT 3

service provider and ISP. The team quickly identified that latency experienced with application performance was not caused by maintenance or network equipment failures. The NTT SOC team requested relevant logs, and further investigations indicated attackers were using legitimate functionality in WordPress called Pingback 7 to conduct a DDoS attack. Once NTT Group security analysts identified the nature of the attack, they developed, tested and deployed a signature to mitigate future attacks. Following the successful mitigation, the DoS prevention vendor was informed about the incident and how NTT Group mitigated the attack. The vendor created and deployed an official signature, which was made available to all of their other customers. ROOT CAUSE This attack was an application attack, where the goal was to consume all the resources of the targeted web application. However, the attack did not affect network access to the website, as the volume was low. This is typical of application attacks, and can make it difficult to distinguish them from normal website traffic. The low bandwidth also means other applications sharing the same Internet access were not affected by the attack. Using this feature in WordPress, the attackers could take advantage of legitimate third-party servers with good reputations, creating what appeared to be legitimate HTTP requests directed at the victim s web servers. The victim s website was not running WordPress. 7 https://en.support.wordpress.com/comments/pingbacks/ 4

Pingback is enabled by default on WordPress and is used to cross-reference between blogs. The attacker can forge the destination URL so the WordPress site will contact the victim s website to check if the pingback in fact originated from the location. The Pingback attack uses legitimate HTTP requests, but the query contains an arbitrary value which changes for each request. The arbitrary request is key to the effectiveness of the attack as it forces the website to reload the web page for each incoming request. This effectively bypasses any buffer storage or caching intended to reduce the load on the web server. Such reloads are very resource intensive on the application, and can create a denial-of-service (DoS) condition on the affected website. This is especially true in cases where the web page requested is media rich with larger file sizes and a large amount of content. For this particular type of WordPress attack, legitimate WordPress sites are turned against innocent victims. WordPress attacks have been observed in the wild, in some cases using more than 160,000 WordPress sites to send pingback requests to a single victim. A few months later, attackers attempted to use the same type of WordPress DDoS attack against the same client, along with several financial and transportation businesses. One financial institution s website was unavailable for over an hour, while other companies experienced varying degrees of impact for up to 12 hours. NTT Group clients experienced no measurable business impact. 5

COST OF INCIDENT Based on interaction with the client XYZ Corp, NTT Group estimated that the actual cost of this event was fairly low since the incident was discovered and mitigated rapidly. Costs associated with the incident were mostly related to coordination, communication, documentation and lessons-learned activities. COST OF INCIDENT ITEM Actual cost of investigation, remediation and professional incident support as described COST Less than $2,000 Actual cost of legal and public relations support $0 Actual loss due to website outage Low Actual total cost directly related to the event Less than $2,000 Actual total cost of the follow-on-attack (after signatures had been deployed) $0 Caption: Cost of successfully mitigated DDOS event. CASE STUDY SUMMARY Data from NTT Group shows denial-of-service attacks continue to be prevalent and pose a threat to any business with an online presence. In this particular case, XYZ Corp had proactively invested in protection against DoS/DDoS attacks. Once the attack was detected, experts were ready to mitigate the web application attack immediately. Skilled SOC analysts investigated and deployed effective permanent protection. Later, when new WordPress attacks targeted the business again, XYZ Corp did not experience any downtime. 6

THREAT MITIGATION, WEB APPLICATION DOS/DDOS ATTACK Service downtime not only affects customer interactions, but also has a huge impact on the reputation of any business. DoS/DDoS attacks vary in type and method, so there is no single solution which will stop them all. However, a proactive, layered defense following sound guidelines can help prevent these attacks and minimize impact. The following recommendations can help to mitigate the impact of DoS/DDoS attacks: Conduct an enterprise risk assessment: Identify your organization s important data and applications, and the potential impact which different attacks could have on your organization. If an attack could create an outage causing a measurable impact on your business, include DoS/ DDoS mitigation strategies in your organization s security plans. Create a formal DoS/DDoS incident response plan: Ensure that your incident response plan includes guidance for preparation and response to DoS/DDoS attacks. Deploy a layered DoS/DDoS defense strategy: Consider all aspects of your environment, and review on-site, cloud and ISP-based solutions. Not all DoS/DDoS attacks are equal; low and slow application attacks require a different response tactic than rate-based reflection attacks which flood the network layer. Understand ISP options: Include an accurate contact list with names and phone numbers for all ISP and third-party providers so you can readily contact them for assistance. Discuss DoS/DDoS detection and mitigation support options with your ISP before you actually need the services. Review lessons learned: After a DoS/DDoS attack, regardless of whether the attack was successful, review your lessons learned to help you manage future attacks. 7

Test your environment: Test your exposed systems to find, and mitigate, system limits and weak points before you are subjected to an attack. Leverage monitored and managed security services: Evaluate the offerings of any DoS/DDoS mitigation and assessment services supported by your managed security services provider. Be proactive about understanding their capabilities, and understanding how thirdparty services can complement other available resources. 8