- 73% of companies using vulnerable end-of-life networking devices
- As security concerns stifle consumer buying, endpoint protection offers a solution
- New desktop malware declines for the first time in years
- Six US senators demand more details about the Yahoo data breach
- Swift CEO reveals three more failed attacks on banking network
- 14 May 2010 10:29
Imperva discovers more dangerous DDoS attack threat
SYDNEY, May 14. Imperva, the data security leader, has uncovered a new DDoS attack that appears to be more powerful, more efficient and less traceable than traditional methods.
The new threat was identified by Imperva's lab, the Application Defense Center (ADC). Already the new attack mode has compromised hundreds of web servers by turning them into bots. Unlike typical DDoS attacks that capitalise on bot-infected PCs by using the servers as the attack platforms, the hackers have created a much stronger force. Below are details of the discovery:
What it is: A new type of DDoS attack that has currently infected hundreds of web servers. Unlike traditional DDoS methods that capitalise on bot-infected PCs, the attackers have turned the web servers themselves into payload-throwing bots
How it works: Rather than use the server as a means of distributing DoS malware to PCs, attackers infect the servers themselves with a malicious DoS application. Then, using a simple software program with a dashboard and control panel, the hackers configure the IP, port and duration of an attack. The simply insert a URL they wish to attack, click and go.
Imperva was able to acquire the source code of this application - which consisted of just 90 lines of PHP code - and has screenshots . We've also witnessed an attack as it was taking place and can describe what we saw and what we learned.
Why Imperva believes this is unique:
* Although servers are typically harder to compromise than PCs, by capitalising on their greater horsepower, the hackers create a much more efficient and powerful DDoS tool using servers as the attack platform. Attack volumes are multiplied by the numbers of exploited web servers.
* By using web servers, the attackers are less detectable. Tracebacks typically lead to a lone server at a random hosting company.
About Imperva Imperva, the Data Security leader, enables a complete security lifecycle for business databases and the applications that use them. Over 4,500 of the world’s leading enterprises, government organizations, and managed service providers rely on Imperva to prevent sensitive data theft, protect against data breaches, secure applications, and ensure data confidentiality. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user and is recognised for its overall ease of management and deployment. For more information, visit www.imperva.com.
Media queries Grenadine Lau Imperva Phone: +65.6749 4482 Mobile: +65.9666 1886 Email: Grenadine.Lau@Imperva.com
David Frost PR Deadlines Pty Ltd, for Imperva Phone: +61.2.4341 5021 Mobile: +61 (0) 408 408 210 Email: email@example.com
- Harnessing the Power of Metadata for Security: FIND OUT MORE
- See Your Traffic for What It Really Is
- Check your Future Risk
- The Future is Encrypted. What's your defense?
- The Future is Encrypted. Manage It.
- How to Use Metadata to Make Data-Driven Decisions - Download NOW!
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Melbourne Fashion Week: Using digital and insight to drive engagement and attendance
- Report: Australians still love a customer loyalty program
- Adobe Marketing Cloud to run on Microsoft Azure under new partnership
- Why CMO tenure is falling and what you can do about it
- How this university team is improving email marketing on a shoestring budget