- As tech bridges cloud gaps, security is best managed outside the IT shop
- Antivirus vendor warns Fireball malware infects 250m PCs! Try 5m, says Microsoft
- 7 elements of a successful security awareness program
- Breach costs down but slow forensics still threaten Australian companies’ regulatory compliance
- To secure BYOD, involve the business in managing its mobile privacy
- 14 May 2010 10:29
Imperva discovers more dangerous DDoS attack threat
SYDNEY, May 14. Imperva, the data security leader, has uncovered a new DDoS attack that appears to be more powerful, more efficient and less traceable than traditional methods.
The new threat was identified by Imperva's lab, the Application Defense Center (ADC). Already the new attack mode has compromised hundreds of web servers by turning them into bots. Unlike typical DDoS attacks that capitalise on bot-infected PCs by using the servers as the attack platforms, the hackers have created a much stronger force. Below are details of the discovery:
What it is: A new type of DDoS attack that has currently infected hundreds of web servers. Unlike traditional DDoS methods that capitalise on bot-infected PCs, the attackers have turned the web servers themselves into payload-throwing bots
How it works: Rather than use the server as a means of distributing DoS malware to PCs, attackers infect the servers themselves with a malicious DoS application. Then, using a simple software program with a dashboard and control panel, the hackers configure the IP, port and duration of an attack. The simply insert a URL they wish to attack, click and go.
Imperva was able to acquire the source code of this application - which consisted of just 90 lines of PHP code - and has screenshots . We've also witnessed an attack as it was taking place and can describe what we saw and what we learned.
Why Imperva believes this is unique:
* Although servers are typically harder to compromise than PCs, by capitalising on their greater horsepower, the hackers create a much more efficient and powerful DDoS tool using servers as the attack platform. Attack volumes are multiplied by the numbers of exploited web servers.
* By using web servers, the attackers are less detectable. Tracebacks typically lead to a lone server at a random hosting company.
About Imperva Imperva, the Data Security leader, enables a complete security lifecycle for business databases and the applications that use them. Over 4,500 of the world’s leading enterprises, government organizations, and managed service providers rely on Imperva to prevent sensitive data theft, protect against data breaches, secure applications, and ensure data confidentiality. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user and is recognised for its overall ease of management and deployment. For more information, visit www.imperva.com.
Media queries Grenadine Lau Imperva Phone: +65.6749 4482 Mobile: +65.9666 1886 Email: Grenadine.Lau@Imperva.com
David Frost PR Deadlines Pty Ltd, for Imperva Phone: +61.2.4341 5021 Mobile: +61 (0) 408 408 210 Email: firstname.lastname@example.org
- Uber for the truckies: How one Aussie startup is disrupting the freight industry
- CMO's top 8 martech stories for the week - 22 June 2017
- Grace Group undergoes first rebrand in 30 years to unify and contemporise
- Why it's important your brand is meaningful to your customers
- What blockchain will do to the experience economy