Web Hacking Incident Database Shows DoS Attacks On The Rise

The New Acunetix V12 Engine


It seems like the formidable Anonymous army has managed to change the weighting of stats collected by the Web Hacking Incident Database (WHID) with it’s vast array of DDoS attacks.

We’ve reported on a couple of them like back in December when the WikiLeaks Attacks Caused Rival DDoS Retaliation. There have been a whole lot of other attack types going as usual though with SQL Injection and XSS (Cross Site Scripting) making up the to the top 3 with DDoS Attacks.

But if you haven’t worried about it before, perhaps now is the time to look into prevention/protection against denial-of-service attacks.

Driven by the hacktivism of the loose-knit Anonymous group, denial-of-service attacks surged to the top of the list of Web incidents, outpacing SQL injection and cross-site scripting, according to a survey of publicly disclosed attacks.

The ongoing survey, known as the Web Hacking Incident Database, categorized 222 incidents in 2010 and found that attackers aimed to take down the Web sites in a third of the incidents, while defacement accounted for 15 percent of attacks and stealing information was the goal in 13 percent of incidents. Unsurprisingly, the popular goal of causing downtime meant that denial-of-service attacks accounted for about a third of attack types, followed by SQL injection (21 percent) and cross-site scripting (9 percent).

In many industry reports, denial-of-service is not even on the list, but companies should worry about such brute-force tactics, says Ryan Barnett, a senior security researchers with security firm Trustwave’s SpiderLabs, who manages the WHID project. “You need to re-prioritize because Web servers are actively being targeted with denial-of-service attacks,” says Barnett.

Simple tools like Slowloris can give even the most robust web sites a big headache. Of course you also have to make sure you are secured against SQL Injection and any other kind of web attacks that can comprise your up-time or data.

According to the data different industries need to be prepared for different kinds of attacks, obviously skilled attackers will focus different ways of compromising hosts in different sectors.


Yet, different industries should also worry about different types of attacks, he says. Attackers focus on stealing money from financial firms using stolen credentials, according to the WHID data. They also tend to focus on defacing government sites and stealing credit-card numbers from retailers, using SQL injection in both cases, according to the WHID. The latter two relationships are weaker, however: While those are the most popular goals for attackers, each only accounts for a bit more than a quarter of attacks against the particular vertical. Money is the goal in two-thirds of attacks against financials.

“The outcomes and attacks and weaknesses are different, so depending on what market you are in, we have a pool of attacks that worked,” says Barnett. “So CSOs should pick out examples in their market because those are most applicable to them.”

Attackers’ focus on downtime means that corporate CSOs need to make sure that they can handle Web-specific denial-of-service attacks. Many times such attack focus on flooding the Web servers, but low-and-slow attacks are becoming more popular and require a different defense.

“Many of these organizations foolishly think that the network security gear that they have to handle the lower level DOSing floods will take care of this and it won’t,” Barnett says. “The overall amount of traffic that you have to send to take down the Web server is a lot less, and it looks legitimate.”

Downtime has gotta be one of the worst types of attack, especially for e-tailers or online vendors. Yah theft of credentials is bad, but honestly – most of the time those attacks aren’t even disclosed and no-one knows about them.

And from what I’ve seen most companies seem to think sticking a mid-range firewall in front of whatever they are doing is the be all and end all of security – it’ll protect their applications, their data, their organisation…and so on.

How misguided they are.

Source: Network World

Posted in: Networking Hacking, Privacy

, , , , ,


Latest Posts:


BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.
Acunetix Vulnerability Scanner For Linux Now Available Acunetix Vulnerability Scanner For Linux Now Available
Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.
Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.


2 Responses to Web Hacking Incident Database Shows DoS Attacks On The Rise

  1. nosperantos March 17, 2011 at 4:50 pm #

    In addition to SlowLoris, R.U.D.Y can also cause a lot of damage to SCADA web services and virtually any website with forms.
    Download at:
    http://hybridsec.com/tools/rudy/

  2. Praful Agarwal March 22, 2011 at 8:51 am #

    Truly.. DoS attacks are increasing indefinitely..