SlideShare a Scribd company logo
1 of 10
Download to read offline
akamai.com
[Q4 2014]
• New analysis technique using data from the Akamai
Intelligent PlatformTM
• Automate discovery of web application vulnerabilities for
Remote File Inclusion (RFI) and OS Command Injection
attacks
• Botnets profiled by identifying malicious code resource
URLs and seemingly identical payloads
• Analysis does not require inclusion in the botnet or taking
over the botnet’s command and control (C&C, C2) server
[Download the Q4 2014 Global DDoS Attack Report for supporting data and
analysis]
= botnet profiling technique
2 / [The State of the Internet] / Security (Q4 2014)
= Remote File Inclusion (RFI) attacks
3 / [The State of the Internet] / Security (Q4 2014)
• Used to exploit dynamic file include mechanisms
in web applications
• Web application can be tricked into including
remote files with malicious code
• RFI vulnerabilities are easily found and exploited
by attackers
$dir = $_GET['module_name'];
include($dir . "/function.php");
Figure 1: Code vulnerable to a Remote File Inclusion attack
= OS Command Injection
4 / [The State of the Internet] / Security (Q4 2014)
• Used to execute unauthorized operating system
commands
• The result of mixing trusted code with untrusted data
• Commands executed by the attacker will run with the
same privileges of the commanding component
• Attackers can leverage this ability to gain access
and damage parts that are not reachable
= common payloads in botnets
5 / [The State of the Internet] / Security (Q4 2014)
• RFI and OS Command Injection are among the most
prevalent of vulnerabilities reported
• Attacker can take full control over the victim server
• The most favorable attack vector
• In recent months, Akamai has observed massively
orchestrated attempts to find such vulnerabilities
• Botnet machines, even geographically disparate machines belonging to
different organizations, try to inject the same remote piece of malicious
code
• Code correlations enabled Akamai to map multiple Internet botnets
operating at the time of the comparison
• RFI and OS Command Injection botnets targeted more
than 850 web applications across several top-level
domains over a seven-day period
• All of the botnet traffic appeared to originate from
compromised servers, most from popular Software-as-
a-Service (SaaS) and cloud hosting providers
• The botnet Akamai analyzed included a dedicated
Python script that performed web crawling disguised as
a Microsoft Bing bot
• In one instance, an observed botnet propagated
through two WordPress TimThumb vulnerabilities
= botnet findings
6 / [The State of the Internet] / Security (Q4 2014)
= analysis of botnet capabilities
Figure 2: Code for remote file upload
7 / [The State of the Internet] / Security (Q4 2014)
Both RFI and OS Command Injection attacks used the same
malicious code involving:
• Remote shell command execution
• Remote file upload (see figure)
• SMS sending, controlled by IRC commands
• Local FTP server credentials brute force attack
• IRC-controlled UDP/TCP denial of service flood
• Novel approach to understanding web application-layer
botnets
• Used attack payload as the common denominator to
aggregate data and map botnet information
• Does not require the researcher to be a part of the botnet or
to take over the botnet’s C2 server
• Can be used for mapping other types of malicious activities
that use a distinct payload
= conclusion
8 / [The State of the Internet] / Security (Q4 2014)
• Download the Q4 2014 State of the Internet Security Report
• The Q4 2014 report covers:
/ Analysis of DDoS attack trends
/ Breakdown of average Gbps/Mbps statistics
/ Year-over-year and quarter-by-quarter analysis
/ Types and frequency of application-layer attacks
/ Types and frequency of infrastructure attacks
/ Trends in attack frequency, size and sources
/ Where and when DDoSers launch attacks
/ Case study and analysis
= Q4 2014 global attack report
9 / [The State of the Internet] / Security (Q4 2014)
• StateoftheInternet.com, brought to you by Akamai,
serves as the home for content and information intended to
provide an informed view into online connectivity and
cybersecurity trends as well as related metrics, including
Internet connection speeds, broadband adoption, mobile
usage, outages, and cyber-attacks and threats.
• Visitors to www.stateoftheinternet.com can find current and
archived versions of Akamai’s State of the Internet
(Connectivity and Security) reports, the company’s data
visualizations, and other resources designed to put context
around the ever-changing Internet landscape.
= about Prolexic
10 / [The State of the Internet] / Security (Q4 2014)

More Related Content

Viewers also liked

Viewers also liked (12)

17.5
17.517.5
17.5
 
Effective parenting
Effective parentingEffective parenting
Effective parenting
 
8.1 копия
8.1   копия8.1   копия
8.1 копия
 
Final Paper_Product Life Cycle Plan_Bus 504 Post Graduate
Final Paper_Product Life Cycle Plan_Bus 504 Post GraduateFinal Paper_Product Life Cycle Plan_Bus 504 Post Graduate
Final Paper_Product Life Cycle Plan_Bus 504 Post Graduate
 
Slam dunk
Slam dunkSlam dunk
Slam dunk
 
14.1
14.114.1
14.1
 
13.1
13.113.1
13.1
 
Mesheuressup
MesheuressupMesheuressup
Mesheuressup
 
2.3
2.32.3
2.3
 
8.4
8.48.4
8.4
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
12.1
12.112.1
12.1
 

Recently uploaded

FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...Khaled Al Awadi
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxmy Pandit
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)linciy03
 
New Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9loNew Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9logalbokkahewagenitash
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridHolger Mueller
 
How to Maintain Healthy Life style.pptx
How to Maintain  Healthy Life style.pptxHow to Maintain  Healthy Life style.pptx
How to Maintain Healthy Life style.pptxrdishurana
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?Alejandro Cremades
 
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Björn Rohles
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Alejandro Cremades
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsAlejandro Cremades
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdfzukhrafshabbir
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesAlejandro Cremades
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfomnme1
 
Hyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings releaseHyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings releaseirhcs
 
Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideCharleston Alexander
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowMiriam Robeson
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future worldChris Skinner
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastInstBlast Marketing
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfMont Surfaces
 

Recently uploaded (20)

FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service Lightning
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)
 
New Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9loNew Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9lo
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybrid
 
How to Maintain Healthy Life style.pptx
How to Maintain  Healthy Life style.pptxHow to Maintain  Healthy Life style.pptx
How to Maintain Healthy Life style.pptx
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?
 
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for Startups
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE Ventures
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
 
Hyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings releaseHyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings release
 
Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed Guide
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdf
 

Q4 2014 security report botnet profiling technique presentation

  • 2. • New analysis technique using data from the Akamai Intelligent PlatformTM • Automate discovery of web application vulnerabilities for Remote File Inclusion (RFI) and OS Command Injection attacks • Botnets profiled by identifying malicious code resource URLs and seemingly identical payloads • Analysis does not require inclusion in the botnet or taking over the botnet’s command and control (C&C, C2) server [Download the Q4 2014 Global DDoS Attack Report for supporting data and analysis] = botnet profiling technique 2 / [The State of the Internet] / Security (Q4 2014)
  • 3. = Remote File Inclusion (RFI) attacks 3 / [The State of the Internet] / Security (Q4 2014) • Used to exploit dynamic file include mechanisms in web applications • Web application can be tricked into including remote files with malicious code • RFI vulnerabilities are easily found and exploited by attackers $dir = $_GET['module_name']; include($dir . "/function.php"); Figure 1: Code vulnerable to a Remote File Inclusion attack
  • 4. = OS Command Injection 4 / [The State of the Internet] / Security (Q4 2014) • Used to execute unauthorized operating system commands • The result of mixing trusted code with untrusted data • Commands executed by the attacker will run with the same privileges of the commanding component • Attackers can leverage this ability to gain access and damage parts that are not reachable
  • 5. = common payloads in botnets 5 / [The State of the Internet] / Security (Q4 2014) • RFI and OS Command Injection are among the most prevalent of vulnerabilities reported • Attacker can take full control over the victim server • The most favorable attack vector • In recent months, Akamai has observed massively orchestrated attempts to find such vulnerabilities • Botnet machines, even geographically disparate machines belonging to different organizations, try to inject the same remote piece of malicious code • Code correlations enabled Akamai to map multiple Internet botnets operating at the time of the comparison
  • 6. • RFI and OS Command Injection botnets targeted more than 850 web applications across several top-level domains over a seven-day period • All of the botnet traffic appeared to originate from compromised servers, most from popular Software-as- a-Service (SaaS) and cloud hosting providers • The botnet Akamai analyzed included a dedicated Python script that performed web crawling disguised as a Microsoft Bing bot • In one instance, an observed botnet propagated through two WordPress TimThumb vulnerabilities = botnet findings 6 / [The State of the Internet] / Security (Q4 2014)
  • 7. = analysis of botnet capabilities Figure 2: Code for remote file upload 7 / [The State of the Internet] / Security (Q4 2014) Both RFI and OS Command Injection attacks used the same malicious code involving: • Remote shell command execution • Remote file upload (see figure) • SMS sending, controlled by IRC commands • Local FTP server credentials brute force attack • IRC-controlled UDP/TCP denial of service flood
  • 8. • Novel approach to understanding web application-layer botnets • Used attack payload as the common denominator to aggregate data and map botnet information • Does not require the researcher to be a part of the botnet or to take over the botnet’s C2 server • Can be used for mapping other types of malicious activities that use a distinct payload = conclusion 8 / [The State of the Internet] / Security (Q4 2014)
  • 9. • Download the Q4 2014 State of the Internet Security Report • The Q4 2014 report covers: / Analysis of DDoS attack trends / Breakdown of average Gbps/Mbps statistics / Year-over-year and quarter-by-quarter analysis / Types and frequency of application-layer attacks / Types and frequency of infrastructure attacks / Trends in attack frequency, size and sources / Where and when DDoSers launch attacks / Case study and analysis = Q4 2014 global attack report 9 / [The State of the Internet] / Security (Q4 2014)
  • 10. • StateoftheInternet.com, brought to you by Akamai, serves as the home for content and information intended to provide an informed view into online connectivity and cybersecurity trends as well as related metrics, including Internet connection speeds, broadband adoption, mobile usage, outages, and cyber-attacks and threats. • Visitors to www.stateoftheinternet.com can find current and archived versions of Akamai’s State of the Internet (Connectivity and Security) reports, the company’s data visualizations, and other resources designed to put context around the ever-changing Internet landscape. = about Prolexic 10 / [The State of the Internet] / Security (Q4 2014)