SlideShare a Scribd company logo
1 of 10
Download to read offline
akamai.com
[Q1 2015] Website Defacement & Domain Hijacking
Many attacks observed in Q1 2015 revolved around
defacement and hijacking – controlling the content a user sees
when accessing a website
• Attacks can be carried out for notoriety, or to spread a
message, or to phish for user information
• Threats are not new but the tactics remain popular
= emerging threat: website defacement
2 / [The State of the Internet] / Security (Q1 2015)
= mass web defacement
3 / [The State of the Internet] / Security (Q1 2015)
• In Q1 2015, a group of malicious actors claimed to have
hacked hundreds or thousands of websites in a single night
• Many of these websites had the same IP address
• The attackers had exploited automation to attack many sites
hosted on the same servers
= mass web defacement: methods
4 / [The State of the Internet] / Security (Q1 2015)
• Hosting services may host hundreds of websites on a single
server
• Mass defacement attacks exploit improper security settings
to access files outside assigned directories
• A single vulnerable website can allow attackers to view files
elsewhere on the server
• Attackers then search for user account names and
passwords to gain write access to those accounts
• Using a script, these credentials are used to automatically
login to each account and replace the valid files with the
attacker’s desired content
= website defacement: protection and mitigation
If you have been attacked:
• Move to a new hosting provider with better security
To prevent attacks and judge risk:
• Check if other websites on the same IP show hallmarks of
compromise
• If your provider allows, test if your server is vulnerable by
attempting to view the web space of other accounts hosted
by the provider
= domain hijacking
5 / [The State of the Internet] / Security (Q1 2015)
Domain hijacking attacks alter a domain’s DNS records to
redirect web and mail traffic to an IP of the attacker’s choice
• Bypasses even the best server security if registrar level is not
properly controlled
• Requires attackers to gain access to a domain registrar
account
• Name server changes can take 24 to 48 hours to go through,
allowing the malicious changes to remain for a long period
• Targeted spear-phishing of personnel likely to have registrar
access
• Email credentials often obtained from domain administrator
• Email can be used to request a password reset, getting full credentials
• Registrar account used to make changes to name server
records, redirecting web traffic to attacker’s IP
• Entire zone file, including mail exchange, may be changed
• Intercepted mail can be used to obtain credentials for other accounts and to
intercept password reset attempts
• Attackers could maintain control over all administrative accounts for a
domain name
= domain hijacking: methods
6 / [The State of the Internet] / Security (Q1 2015)
= domain hijacking: protection and mitigation
7 / [The State of the Internet] / Security (Q1 2015)
Protection against domain hijacking attacks takes two forms:
• Prevent access to domain registrar credentials
• Use two-factor authentication for email services to protect against phishing
• Do not reuse the password on a site’s registrar account
• Use registrar locks to prevent unauthorized changes
• Confirms changes with previously agreed-upon contact
• Response may be slow, so keep in mind if you may need rush changes
Download the Q1 2015 State of the Internet Security Report
• The Q1 2015 report covers:
⁄ Analysis of DDoS and web application attack trends
⁄ Bandwidth (Gbps) and volume (Mpps) statistics
⁄ Year-over-year and quarter-by-quarter analysis
⁄ Attack frequency, size, types and sources
⁄ Security implications of the transition to IPv6
⁄ Mitigating the risk of website defacement and domain hijacking
⁄ DDoS techniques that maximize bandwidth, including booter/stresser
sites
⁄ Analysis of SQL injection attacks as a persistent and emerging threat
= Q1 2015 State of the Internet –Security Report
9 / [The State of the Internet] / Security (Q1 2015)
• StateoftheInternet.com, brought to you by Akamai,
serves as the home for content and information intended to
provide an informed view into online connectivity and
cybersecurity trends as well as related metrics, including
Internet connection speeds, broadband adoption, mobile
usage, outages, and cyber-attacks and threats.
• Visitors to www.stateoftheinternet.com can find current and
archived versions of Akamai’s State of the Internet
(Connectivity and Security) reports, the company’s data
visualizations, and other resources designed to put context
around the ever-changing Internet landscape.
= about stateoftheinternet.com
10 / [The State of the Internet] / Security (Q1 2015)

More Related Content

Viewers also liked (6)

13.1
13.113.1
13.1
 
Bleach
BleachBleach
Bleach
 
8.1
8.18.1
8.1
 
Jowel Bodden Professional Persona Project
Jowel Bodden Professional Persona ProjectJowel Bodden Professional Persona Project
Jowel Bodden Professional Persona Project
 
8.2
8.28.2
8.2
 
JeffRosenplotResume
JeffRosenplotResumeJeffRosenplotResume
JeffRosenplotResume
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 

Recently uploaded (20)

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 

Website Defacement & Domain Hijacking on the Rise: Cloud Security Threat – State of the Internet

  • 1. akamai.com [Q1 2015] Website Defacement & Domain Hijacking
  • 2. Many attacks observed in Q1 2015 revolved around defacement and hijacking – controlling the content a user sees when accessing a website • Attacks can be carried out for notoriety, or to spread a message, or to phish for user information • Threats are not new but the tactics remain popular = emerging threat: website defacement 2 / [The State of the Internet] / Security (Q1 2015)
  • 3. = mass web defacement 3 / [The State of the Internet] / Security (Q1 2015) • In Q1 2015, a group of malicious actors claimed to have hacked hundreds or thousands of websites in a single night • Many of these websites had the same IP address • The attackers had exploited automation to attack many sites hosted on the same servers
  • 4. = mass web defacement: methods 4 / [The State of the Internet] / Security (Q1 2015) • Hosting services may host hundreds of websites on a single server • Mass defacement attacks exploit improper security settings to access files outside assigned directories • A single vulnerable website can allow attackers to view files elsewhere on the server • Attackers then search for user account names and passwords to gain write access to those accounts • Using a script, these credentials are used to automatically login to each account and replace the valid files with the attacker’s desired content
  • 5. = website defacement: protection and mitigation If you have been attacked: • Move to a new hosting provider with better security To prevent attacks and judge risk: • Check if other websites on the same IP show hallmarks of compromise • If your provider allows, test if your server is vulnerable by attempting to view the web space of other accounts hosted by the provider
  • 6. = domain hijacking 5 / [The State of the Internet] / Security (Q1 2015) Domain hijacking attacks alter a domain’s DNS records to redirect web and mail traffic to an IP of the attacker’s choice • Bypasses even the best server security if registrar level is not properly controlled • Requires attackers to gain access to a domain registrar account • Name server changes can take 24 to 48 hours to go through, allowing the malicious changes to remain for a long period
  • 7. • Targeted spear-phishing of personnel likely to have registrar access • Email credentials often obtained from domain administrator • Email can be used to request a password reset, getting full credentials • Registrar account used to make changes to name server records, redirecting web traffic to attacker’s IP • Entire zone file, including mail exchange, may be changed • Intercepted mail can be used to obtain credentials for other accounts and to intercept password reset attempts • Attackers could maintain control over all administrative accounts for a domain name = domain hijacking: methods 6 / [The State of the Internet] / Security (Q1 2015)
  • 8. = domain hijacking: protection and mitigation 7 / [The State of the Internet] / Security (Q1 2015) Protection against domain hijacking attacks takes two forms: • Prevent access to domain registrar credentials • Use two-factor authentication for email services to protect against phishing • Do not reuse the password on a site’s registrar account • Use registrar locks to prevent unauthorized changes • Confirms changes with previously agreed-upon contact • Response may be slow, so keep in mind if you may need rush changes
  • 9. Download the Q1 2015 State of the Internet Security Report • The Q1 2015 report covers: ⁄ Analysis of DDoS and web application attack trends ⁄ Bandwidth (Gbps) and volume (Mpps) statistics ⁄ Year-over-year and quarter-by-quarter analysis ⁄ Attack frequency, size, types and sources ⁄ Security implications of the transition to IPv6 ⁄ Mitigating the risk of website defacement and domain hijacking ⁄ DDoS techniques that maximize bandwidth, including booter/stresser sites ⁄ Analysis of SQL injection attacks as a persistent and emerging threat = Q1 2015 State of the Internet –Security Report 9 / [The State of the Internet] / Security (Q1 2015)
  • 10. • StateoftheInternet.com, brought to you by Akamai, serves as the home for content and information intended to provide an informed view into online connectivity and cybersecurity trends as well as related metrics, including Internet connection speeds, broadband adoption, mobile usage, outages, and cyber-attacks and threats. • Visitors to www.stateoftheinternet.com can find current and archived versions of Akamai’s State of the Internet (Connectivity and Security) reports, the company’s data visualizations, and other resources designed to put context around the ever-changing Internet landscape. = about stateoftheinternet.com 10 / [The State of the Internet] / Security (Q1 2015)