Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014



Similar documents
AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Cloud Security In Your Contingency Plans

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks

Akamai Security Products

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Introducing IBM s Advanced Threat Protection Platform

CS 558 Internet Systems and Technologies

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services

JOOMLA REFLECTION DDOS-FOR-HIRE

Enterprise-Grade Security from the Cloud

Shellshock. Oz Elisyan & Maxim Zavodchik

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

10 Things Every Web Application Firewall Should Provide Share this ebook

Introduction: 1. Daily 360 Website Scanning for Malware

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Analyzing HTTP/HTTPS Traffic Logs

How To Mitigate A Ddos Attack

Web Application Vulnerability Scanner: Skipfish

XpoLog Center Suite Log Management & Analysis platform

The Hillstone and Trend Micro Joint Solution

Akamai Cloud Security Solutions:

Concierge SIEM Reporting Overview

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Cutting the Cost of Application Security

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

How To Protect A Dns Authority Server From A Flood Attack

End-to-End Application Security from the Cloud

Akamai to Incapsula Migration Guide

Cisco RSA Announcement Update

A Network Administrator s Guide to Web App Security

A Layperson s Guide To DoS Attacks

Improving Web Application Security: The Akamai Approach to WAF

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

End to End Security do Endpoint ao Datacenter

FortiWeb 5.0, Web Application Firewall Course #251

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

Security F5 SECURITY SOLUTION GUIDE

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Stop DDoS Attacks in Minutes

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

IBM Advanced Threat Protection Solution

Learn How to Defend Your Online Marketplace from Unwanted Traffic

#ITtrends #ITTRENDS SYMANTEC VISION

SSDP REFLECTION DDOS ATTACKS

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Good Bot, Bad Bot, Ugly Bot. Battle of the Bots!

Stephen Coty Director, Threat Research

Reference Architecture: Enterprise Security For The Cloud

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Fighting Advanced Threats

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Malware Analysis Quiz 6

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

85% of business networks identified with bot infections 63% of business networks identified to have downloaded malware files 89% of business networks

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Application Security in the Software Development Lifecycle

Security Toolsets for ISP Defense

Malicious Network Traffic Analysis

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

Crypto at Scale. Brian Sniffen

Streamlining Web and Security

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

SANS Top 20 Critical Controls for Effective Cyber Defense

Securing the endpoint and your data

McAfee Network Security Platform

CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE

Security Solutions for the New Threads

Redefining SIEM to Real Time Security Intelligence

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Continuous Penetration Testing

Transcription:

SESSION ID: SPO2-W04 Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 John Summers VP, Security Products Akamai #RSAC

The Akamai Intelligent Platform The Platform 167,000+ Servers 2,300+ Locations 750+ Cities 92 Countries 1,227+ Networks The Data 2 trillion hits per day 780 million unique IPv4 addresses seen quarterly 13+ trillion log lines per day 260+ terabytes of compressed daily logs 15-30% of all web traffic

The Akamai Solution Kona Site Defender + Prolexic (Cloud) Data Centers + Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and End User sophistication of web attacks. Origin Traffic 10000 1000 100 10 1 Akamai Traffic 10000 1000 COVERED 100 10 1

Leveraging Big Data to Understand Attackers The following slides are based on a real events on January 5 th 2014. Akamai, we are under attack!...

Ad-Hoc Attack Analysis An attempt to exploit an old (2007) WordPress Remote File Inclusion vulnerability. The victim application was running ASP.NET GET /wp-content/wordtube-button.php?wppath=http://www.google.com/humans.txt? HTTP/1.1 Host: www.vulnerable.site User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_4) Attacked parameter : Malicious payload: wppath http://www.google.com/humans.txt

What Else Did This Attacker Do On This Site? Same attacker Sent 2122 different RFI exploit attempts

34 different sites were attacked by the same attacker with a total of 24,301 attacks

Was There Similar Activity Going On At The Same Time? Attacks originated from a botnet containing 272 attacking machines 1696 victim applications were targeted 1,358,980 attacks were launched during the campaign The campaign lasted for 2 weeks

Security Big Data at Akamai: Cloud Security Intelligence 20 Terabytes of daily attack data 2 Petabytes of security data stored Up to 90 days retention 600K log lines/sec. indexed by 30 dimensions 8000 queries daily scanning terabytes of data Benefits Unrivaled Web Security visibility Perform WAF accuracy analysis on any customer at any time Detect new attacks, including 0-day and quickly issue new protections A powerful web security research tool Improve WAF Accuracy Behavioral analytics platform

Behavioral Analytics & the Akamai Intelligent Platform DATA SOURCES Kona WAF Triggers HEURISTICS Attack Patterns Client Behavior Akamai Logs WAF Light CSI Platform Application Profiling NAT Detection Akamai Logs Behavioral IPs False Positive Reduction

Proactive Security using Behavioral Analytics Cloud Security Intelligence www.customer.site

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Risk score decay

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. 1549 SQL injection attempts w/37 unique payloads

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. 691 SQL injection attempts w/18 unique payloads

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. 232 SQL injection attempts w/9 unique payloads

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

Bots on the Akamai Platform How many bots does Akamai see IN ONE DAY? 8.01 BILLION Bot requests in 24-hours Avoid data theft and downtime by extending the security perimeter outside Data the Collected data-center and protect from increasing frequency, scale and sophistication of web attacks. April 1-2, 2015 Total Requests: 85,475,034,620 Bots were 9.4% of all requests

Bots on the Akamai Platform 24% Other Bots 42% 8.01 Crawlers, Spiders & Scrapers Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, 6% scale and sophistication of web attacks. API Engines Billion requests 26% Search engines & site indexers 1% Security scanning

Bots on the Akamai Platform 42% 8.01 Crawlers, Spiders & Scrapers 24% Other Bots Avoid data theft and downtime by extending the 24% Content Scrapers security perimeter outside the data-center and 7% Advertising protect from increasing frequency, 6% scale and 3% Data Aggregators sophistication of web attacks. API Engines Billion requests Crawlers, Spiders & Scrapers: 2% Web Archivers 2% Website Monitors 1% SEO Analyzers 26% 1% Social Media Search engines & site indexers 1% Security scanning

Bots The Akamai Viewpoint 24% Other Bots 42% 8.01 Crawlers, Spiders & Scrapers Common bot challenges Avoid data theft and downtime by extending the security perimeter outside the data-center and Stolen intellectual property protect from increasing frequency, 6% scale and Increased sophistication price of competition web attacks. API Engines Billion Additional requests bandwidth costs IT infrastructure overhead 26% DDoS and application downtime Search engines & site indexers 1% Security scanning

Bots The Akamai Viewpoint 8.01 Billion requests Avoid data theft and downtime by extending the Bot security management perimeter outside needs the data-center and Bot protect detection from and increasing identification frequency, scale and sophistication of web attacks. Advanced bot responses Report on bot activity and mitigations applied Policies to enab le business-level protection

A Year in the Life of a Botnet In January 2014 we published a blog on a global botnet: https://blogs.akamai.com/2014/01/analyzing-a-malicious-botnet-attack-campaign-through-thesecurity-big-data-prism.html Exploiting Joomla Content Editor vulnerability to install backdoors Began as a single event analysis of the exploit Zoomed out and discovered an entire botnet mining the web for vulnerable Joomla servers

A Truly Global Botnet Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

And a Very Active Botnet 43,000 malicious HTTP requests seen over the month 2008 different web applications were targeted

10 months later, the Botnet lives on In Nov. 2014, the team began a 3 month follow on analysis The botnet now contains 1037 members. All members are compromised public Web servers, mostly running Joomla and WordPress CMS The Botnet has targeted more than 7800 applications over the period Note the data is only based on Akamai customers probably targeted many more applications

Active Members Over Time

New Botnet Members Over Time

Activity Duration of Botnet Members and Evolution On average, Joomla botnet members spurted malicious traffic over 29 days. To compare, compromised web servers running other Web platforms, were maliciously active for 10 days on average. The reason for the difference between Joomla and the rest of the servers is unclear Likely related to the massive exploitation of the Joomla vulnerability The Botnet evolved over time to attempt to also exploit other vulnerabilities: Remote File Inclusion (RFI) on the TimThumb image resizer WordPress module Remote Code Execution (RCE) on the Open Flash Chart library

Longevity of Members Comparing the active Botnet members from 9 months ago to now 43 of the botnet members were also maliciously active 9 months ago. 4% of botnet members have not been cleaned up for 9 months Surprising, given that: The botnet targets a 3-year old vulnerability. Vulnerable web servers should have been upgraded with newer software ages ago The awareness for the usage of this vulnerability in the wild. This is not the first publication of a JCE vulnerability exploitation The botnet activity is visible and loud, targeting many applications across the Internet, making it easy to be detected.

Closing Thoughts Simply exposing a botnet and it s tactics has little impact Shutting down members of a Botnet only causes it to breed faster Broad visibility across the web into these kinds of attacks is part of the solution Effective mitigation requires a way to share actionable information about botnets and other repeat attackers A risk scoring reputation system can provide such actionable data

John Summers, VP Security Products jsummers@akamai.com