SlideShare a Scribd company logo
1 of 10
Download to read offline
akamai.com
[Q4 2014]
• New analysis technique using data from the Akamai
Intelligent PlatformTM
• Automate discovery of web application vulnerabilities for
Remote File Inclusion (RFI) and OS Command Injection
attacks
• Botnets profiled by identifying malicious code resource
URLs and seemingly identical payloads
• Analysis does not require inclusion in the botnet or taking
over the botnet’s command and control (C&C, C2) server
[Download the Q4 2014 Global DDoS Attack Report for supporting data and
analysis]
= botnet profiling technique
2 / [The State of the Internet] / Security (Q4 2014)
= Remote File Inclusion (RFI) attacks
3 / [The State of the Internet] / Security (Q4 2014)
• Used to exploit dynamic file include mechanisms
in web applications
• Web application can be tricked into including
remote files with malicious code
• RFI vulnerabilities are easily found and exploited
by attackers
$dir = $_GET['module_name'];
include($dir . "/function.php");
Figure 1: Code vulnerable to a Remote File Inclusion attack
= OS Command Injection
4 / [The State of the Internet] / Security (Q4 2014)
• Used to execute unauthorized operating system
commands
• The result of mixing trusted code with untrusted data
• Commands executed by the attacker will run with the
same privileges of the commanding component
• Attackers can leverage this ability to gain access
and damage parts that are not reachable
= common payloads in botnets
5 / [The State of the Internet] / Security (Q4 2014)
• RFI and OS Command Injection are among the most
prevalent of vulnerabilities reported
• Attacker can take full control over the victim server
• The most favorable attack vector
• In recent months, Akamai has observed massively
orchestrated attempts to find such vulnerabilities
• Botnet machines, even geographically disparate machines belonging to
different organizations, try to inject the same remote piece of malicious
code
• Code correlations enabled Akamai to map multiple Internet botnets
operating at the time of the comparison
• RFI and OS Command Injection botnets targeted more
than 850 web applications across several top-level
domains over a seven-day period
• All of the botnet traffic appeared to originate from
compromised servers, most from popular Software-as-
a-Service (SaaS) and cloud hosting providers
• The botnet Akamai analyzed included a dedicated
Python script that performed web crawling disguised as
a Microsoft Bing bot
• In one instance, an observed botnet propagated
through two WordPress TimThumb vulnerabilities
= botnet findings
6 / [The State of the Internet] / Security (Q4 2014)
= analysis of botnet capabilities
Figure 2: Code for remote file upload
7 / [The State of the Internet] / Security (Q4 2014)
Both RFI and OS Command Injection attacks used the same
malicious code involving:
• Remote shell command execution
• Remote file upload (see figure)
• SMS sending, controlled by IRC commands
• Local FTP server credentials brute force attack
• IRC-controlled UDP/TCP denial of service flood
• Novel approach to understanding web application-layer
botnets
• Used attack payload as the common denominator to
aggregate data and map botnet information
• Does not require the researcher to be a part of the botnet or
to take over the botnet’s C2 server
• Can be used for mapping other types of malicious activities
that use a distinct payload
= conclusion
8 / [The State of the Internet] / Security (Q4 2014)
• Download the Q4 2014 State of the Internet Security Report
• The Q4 2014 report covers:
/ Analysis of DDoS attack trends
/ Breakdown of average Gbps/Mbps statistics
/ Year-over-year and quarter-by-quarter analysis
/ Types and frequency of application-layer attacks
/ Types and frequency of infrastructure attacks
/ Trends in attack frequency, size and sources
/ Where and when DDoSers launch attacks
/ Case study and analysis
= Q4 2014 global attack report
9 / [The State of the Internet] / Security (Q4 2014)
• StateoftheInternet.com, brought to you by Akamai,
serves as the home for content and information intended to
provide an informed view into online connectivity and
cybersecurity trends as well as related metrics, including
Internet connection speeds, broadband adoption, mobile
usage, outages, and cyber-attacks and threats.
• Visitors to www.stateoftheinternet.com can find current and
archived versions of Akamai’s State of the Internet
(Connectivity and Security) reports, the company’s data
visualizations, and other resources designed to put context
around the ever-changing Internet landscape.
= about Prolexic
10 / [The State of the Internet] / Security (Q4 2014)

More Related Content

Viewers also liked

Viewers also liked (12)

17.5
17.517.5
17.5
 
Effective parenting
Effective parentingEffective parenting
Effective parenting
 
8.1 копия
8.1   копия8.1   копия
8.1 копия
 
Final Paper_Product Life Cycle Plan_Bus 504 Post Graduate
Final Paper_Product Life Cycle Plan_Bus 504 Post GraduateFinal Paper_Product Life Cycle Plan_Bus 504 Post Graduate
Final Paper_Product Life Cycle Plan_Bus 504 Post Graduate
 
Slam dunk
Slam dunkSlam dunk
Slam dunk
 
14.1
14.114.1
14.1
 
13.1
13.113.1
13.1
 
Mesheuressup
MesheuressupMesheuressup
Mesheuressup
 
2.3
2.32.3
2.3
 
8.4
8.48.4
8.4
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
12.1
12.112.1
12.1
 

Recently uploaded

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 

Recently uploaded (20)

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 

Q4 2014 security report botnet profiling technique presentation

  • 2. • New analysis technique using data from the Akamai Intelligent PlatformTM • Automate discovery of web application vulnerabilities for Remote File Inclusion (RFI) and OS Command Injection attacks • Botnets profiled by identifying malicious code resource URLs and seemingly identical payloads • Analysis does not require inclusion in the botnet or taking over the botnet’s command and control (C&C, C2) server [Download the Q4 2014 Global DDoS Attack Report for supporting data and analysis] = botnet profiling technique 2 / [The State of the Internet] / Security (Q4 2014)
  • 3. = Remote File Inclusion (RFI) attacks 3 / [The State of the Internet] / Security (Q4 2014) • Used to exploit dynamic file include mechanisms in web applications • Web application can be tricked into including remote files with malicious code • RFI vulnerabilities are easily found and exploited by attackers $dir = $_GET['module_name']; include($dir . "/function.php"); Figure 1: Code vulnerable to a Remote File Inclusion attack
  • 4. = OS Command Injection 4 / [The State of the Internet] / Security (Q4 2014) • Used to execute unauthorized operating system commands • The result of mixing trusted code with untrusted data • Commands executed by the attacker will run with the same privileges of the commanding component • Attackers can leverage this ability to gain access and damage parts that are not reachable
  • 5. = common payloads in botnets 5 / [The State of the Internet] / Security (Q4 2014) • RFI and OS Command Injection are among the most prevalent of vulnerabilities reported • Attacker can take full control over the victim server • The most favorable attack vector • In recent months, Akamai has observed massively orchestrated attempts to find such vulnerabilities • Botnet machines, even geographically disparate machines belonging to different organizations, try to inject the same remote piece of malicious code • Code correlations enabled Akamai to map multiple Internet botnets operating at the time of the comparison
  • 6. • RFI and OS Command Injection botnets targeted more than 850 web applications across several top-level domains over a seven-day period • All of the botnet traffic appeared to originate from compromised servers, most from popular Software-as- a-Service (SaaS) and cloud hosting providers • The botnet Akamai analyzed included a dedicated Python script that performed web crawling disguised as a Microsoft Bing bot • In one instance, an observed botnet propagated through two WordPress TimThumb vulnerabilities = botnet findings 6 / [The State of the Internet] / Security (Q4 2014)
  • 7. = analysis of botnet capabilities Figure 2: Code for remote file upload 7 / [The State of the Internet] / Security (Q4 2014) Both RFI and OS Command Injection attacks used the same malicious code involving: • Remote shell command execution • Remote file upload (see figure) • SMS sending, controlled by IRC commands • Local FTP server credentials brute force attack • IRC-controlled UDP/TCP denial of service flood
  • 8. • Novel approach to understanding web application-layer botnets • Used attack payload as the common denominator to aggregate data and map botnet information • Does not require the researcher to be a part of the botnet or to take over the botnet’s C2 server • Can be used for mapping other types of malicious activities that use a distinct payload = conclusion 8 / [The State of the Internet] / Security (Q4 2014)
  • 9. • Download the Q4 2014 State of the Internet Security Report • The Q4 2014 report covers: / Analysis of DDoS attack trends / Breakdown of average Gbps/Mbps statistics / Year-over-year and quarter-by-quarter analysis / Types and frequency of application-layer attacks / Types and frequency of infrastructure attacks / Trends in attack frequency, size and sources / Where and when DDoSers launch attacks / Case study and analysis = Q4 2014 global attack report 9 / [The State of the Internet] / Security (Q4 2014)
  • 10. • StateoftheInternet.com, brought to you by Akamai, serves as the home for content and information intended to provide an informed view into online connectivity and cybersecurity trends as well as related metrics, including Internet connection speeds, broadband adoption, mobile usage, outages, and cyber-attacks and threats. • Visitors to www.stateoftheinternet.com can find current and archived versions of Akamai’s State of the Internet (Connectivity and Security) reports, the company’s data visualizations, and other resources designed to put context around the ever-changing Internet landscape. = about Prolexic 10 / [The State of the Internet] / Security (Q4 2014)