Powered by: Motilal Oswal
01-01-1970 12:00 AM | Source: IANS
Cybercriminals using automated tools to launch attacks: Report
News By Tags | #874 #2306 #4401

Follow us Now on Telegram ! Get daily 10 - 12 important updates on Business, Finance and Investment. Join our Telegram Channel

Cybercriminals targeting web applications have grown more reliant on automated tools as nearly 20 per cent of the attacks detected were fuzzing attacks, trying to find the points at which applications break to exploit, a report said on Wednesday.

Fuzzing is the usually automated process of finding hackable software bugs by randomly feeding different permutations of data into a target programme until one of those permutations reveals a vulnerability.

The cloud-enabled security solutions provider Barracuda Networks that analyzed a sample of two months of blocked data on web application attacks in the month of November and December, found that the top five attacks using automated tools were fuzzing attacks, injection attacks, fake bots, App DDoS and blocked bots.

"While analyzing the current state of encryption, our researchers identified that even though it can prevent a variety of attacks like man-in-the-middle, and provides one layer of protection for users visiting websites, attacks can still occur within the stream," Murali Urs, Country Manager-India, Barracuda Networks, said in a statement,

After fuzzing attacks, injection attacks were the next at about 12 per cent, and most of the attackers were using automated tools like sqlmap to try getting into the applications.

Automated attacks use bots to try to exploit vulnerabilities in web applications. These attacks can range from fake bots posing as Google bots to avoid detection to application DDoS trying to crash a site by subtly overloading the application, the report said.

Bots pretending to be a Google bot or similar accounted for just over 12 per cent of the web application attacks. Application DDoS (distributed denial of service) was surprisingly dominant, making up more than 9 per cent of the sample the team analyzed.

An overwhelming number of data exfiltration attempts seen in the sample were for credit card numbers and social security numbers, etc.

Visa was the clear focus, accounting for more than three-quarters of these attacks. This was followed distantly by JCB with more than 20 per cent and Mastercard, Diners, and American Express at much smaller volumes, the report said.