Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    Denial of Service Most Common Attack Vector in Second Half 2010

    By
    Fahmida Y. Rashid
    -
    March 15, 2011
    Share
    Facebook
    Twitter
    Linkedin

      Organizations were hit by more distributed denial-of-service attacks in the second half of 2010, and their applications were knocked offline because of poorly implemented defenses, according to a Web hacking report.

      The number of DDoS attacks jumped 22 percent to become the most frequently used attack vector in the second half of 2010, Trustwave found in its semiannual Web Hacking Incident Database report, released March 14. DDoS attacks successfully disrupted commerce and brought down Websites and large organizations, the company found. More than 32 percent of all attacks in the second half of 2010 involved DDoS attacks, according to the report. SQL Injection was the second most popular vector, at 21 percent.

      The primary goal appeared to be aimed at causing downtime, SpiderLabs, Trustwave’s security research and testing group, wrote on its Anterior blog. Incidents that resulted in some kind of application downtime jumped 21 percent to account for 33 percent of all attacks, the report found. Defacement and leakage of information were the second and third most popular outcomes.

      “This is mainly a result of ideological hacking efforts utilizing distributed denial of service (DDoS) attacks as part of the Anonymous Group versus Anti-Piracy and WikiLeaks events,” wrote Ryan Barnett, the principal investigator on the report. The incidents include the attacks on PayPal and MasterCard, according to the report.

      The report analyzed top outcomes, attack methods and weaknesses for vertical markets. When broken down by vertical, SQL injection attacks remained popular for government agencies and retail organizations. About 24 percent of all attacks against government agencies and 27 percent of incidents in retail were by SQL injection, the report found. The two sectors had the same application weakness: improper input handling within the application that attackers exploited the most. The most common outcome after an attack on a government agency was defacement, while credit card numbers were more likely to be stolen from retail.

      In contrast, the most common attack method for financial services was stolen credentials, at 36 percent. Applications lacked, or did not have enough, authentication built-in, the report found. The financial sector suffered financial losses in 64 percent of the attacks.

      “Cyber-criminals never stop trying to exploit Web applications,” said Nicholas J. Percoco, senior vice president and head of SpiderLabs.

      Most businesses “wrongly assume” that network hardware will stop DDoS attacks, or believe their Website will not be targeted, Trustwave found. The increase in the number of attacks in 2010 “proves” that organizations, regardless of size, need to test their applications to understand how they would fare under attack, the report said.

      Along with being vulnerable to automated brute force and DoS attacks, businesses need to test their sites for cross-site-scripting flaws and that input handling does not allow SQL injection attacks, according to Barnett. Applications need to have strong authentication processes and sufficient authorization rules and be configured correctly, he said. Other top tactics included CSRF and domain name hijacking, click-fraud, and other brute force tactics to crack passwords, he said.

      The WHID is a database of Web application-related security incidents and the business impact of those attacks. The latest report analyzed data from 75 incidents reported between July 2010 and December 2010. To be included in WHID, an incident must be publicly reported, be associated with Web application security vulnerabilities and have an identified outcome, Trustwave said.

      Fahmida Y. Rashid
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×