- A10 Networks works with RSA Security to provide enhanced interoperable threat protection capabilities
- Pushdo spamming botnet gains strength again
- Same bug hits dozens of plugins, potentially affecting millions of websites
- RSAC 2015: RSA Conference (Day 1)
- Google's push to encrypt ads will improve security, but won't kill malvertising
- 14 May 2010 10:29
Imperva discovers more dangerous DDoS attack threat
SYDNEY, May 14. Imperva, the data security leader, has uncovered a new DDoS attack that appears to be more powerful, more efficient and less traceable than traditional methods.
The new threat was identified by Imperva's lab, the Application Defense Center (ADC). Already the new attack mode has compromised hundreds of web servers by turning them into bots. Unlike typical DDoS attacks that capitalise on bot-infected PCs by using the servers as the attack platforms, the hackers have created a much stronger force. Below are details of the discovery:
What it is: A new type of DDoS attack that has currently infected hundreds of web servers. Unlike traditional DDoS methods that capitalise on bot-infected PCs, the attackers have turned the web servers themselves into payload-throwing bots
How it works: Rather than use the server as a means of distributing DoS malware to PCs, attackers infect the servers themselves with a malicious DoS application. Then, using a simple software program with a dashboard and control panel, the hackers configure the IP, port and duration of an attack. The simply insert a URL they wish to attack, click and go.
Imperva was able to acquire the source code of this application - which consisted of just 90 lines of PHP code - and has screenshots . We've also witnessed an attack as it was taking place and can describe what we saw and what we learned.
Why Imperva believes this is unique:
* Although servers are typically harder to compromise than PCs, by capitalising on their greater horsepower, the hackers create a much more efficient and powerful DDoS tool using servers as the attack platform. Attack volumes are multiplied by the numbers of exploited web servers.
* By using web servers, the attackers are less detectable. Tracebacks typically lead to a lone server at a random hosting company.
About Imperva Imperva, the Data Security leader, enables a complete security lifecycle for business databases and the applications that use them. Over 4,500 of the world’s leading enterprises, government organizations, and managed service providers rely on Imperva to prevent sensitive data theft, protect against data breaches, secure applications, and ensure data confidentiality. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user and is recognised for its overall ease of management and deployment. For more information, visit www.imperva.com.
Media queries Grenadine Lau Imperva Phone: +65.6749 4482 Mobile: +65.9666 1886 Email: Grenadine.Lau@Imperva.com
David Frost PR Deadlines Pty Ltd, for Imperva Phone: +61.2.4341 5021 Mobile: +61 (0) 408 408 210 Email: firstname.lastname@example.org
- AusCERT2015 | st-5th June 2015 | Hear from Brian Krebs, Eva Galperin and Bruce Schneier - New registration packages
- Check out the NEW f5 Resource centre | New content, infographics, white papers and research
- Transition to the Agile Data Centre. Partnering with innovators to drive business and IT forward.