The document summarizes Akamai's State of the Internet / Security Q3 2015 report. Some key findings include:
- DDoS attacks reached a record high in Q3 2015, up 180% from Q3 2014 and 23% from Q2 2015. However, average attack duration, bandwidth and volume decreased.
- Infrastructure layer attacks increased while application layer attacks decreased from Q2 2015.
- The UK surpassed China as the top source of DDoS attacks. Gaming was the most targeted industry.
- Web application attacks increased 96% over Q2 2015 and were mostly over HTTP. SQLi and LFI attacks were most common.
Symantec Intelligence Report September 2014Symantec
Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.
The average number of spear-phishing attacks rose to 53 per day in September, after a 12-month low in August. Spear phishing activity has returned to levels seen earlier in the summer, but is still down from the 12-month average of 85 attacks per day.
The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. At 4.8 percent, last month’s top attachment, .exe file types, dropped to fourth.
There were only four publically disclosed data breaches that took place within the month September, resulting in the exposure of 2.5 million identities. However, there were 14 additional data breaches reported in September that took place earlier in the year. The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities.
Ransomware continues to decline as 2014 progresses. However, crypto-style ransomware remains high, making up 38 percent of all ransomware detected in September.
There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second highest in last 12 months.
One in 2,041 emails was identified as a phishing attempt, compared with one in 1,587 for August. While at first glance this looks like a big drop, it results in only a 0.01 percentage point decrease in the overall phishing rate.
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...Black Duck by Synopsys
This week’s news is dominated by fall-out and reaction from last week’s WannaCrypt/WannaCry attacks, of course, but other open source and cybersecurity stories you won’t want to miss, including an important open source ruling that confirms the enforceability of dual licensing, what New York’s new cybersecurity regulations mean for Financial Services and
the PATCH Act and the creation of a vulnerabilities equities process
Key Elements of a Security Delivery PlatformJohn Pollack
You can't secure what you can't see. See how a security delivery platform enables visibility, optimize existing security tool deployments, and allow for a more flexible security tool architecture.
The second quarter (April – June) 2013 saw significant increases in – and the highest quarterly averages ever recorded by Prolexic – for Distributed Denial of Service (DDoS) attack bandwidth and packet-per-second (pps) rates.
Qrator and Wallarm 2016 State of Network Security report is dedicated to the main events and strong trends in the network security industry. Particular attention is payed to the DDoS, Internet infrastructure, hacks and vulnerabilities in software and hardware, like connected devices.
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSIJNSA Journal
DOS ATTACKS ARE ONE OF THE TOP SECURITY PROBLEMS AFFECTING NETWORKS AND DISRUPTING SERVICES TO
LEGITIMATE USERS. THE VITAL STEP IN DEALING WITH THIS PROBLEM IS THE NETWORK'S ABILITY TO DETECT SUCH
ATTACKS. APPLICATION DDOS ATTACK, WHICH AIMS AT DISRUPTING APPLICATION SERVICE RATHER THAN
DEPLETING THE NETWORK RESOURCE. UP TO NOW ALL THE RESEARCHES MADE ON THIS DDOS ATTACKS ONLY
CONCENTRATES EITHER ON NETWORK RESOURCES OR ON APPLICATION SERVERS BUT NOT ON BOTH. IN THIS PAPER
WE PROPOSED A SOLUTION FOR BOTH THESE PROBLEMS BY AUTHENTICATION METHODS AND GROUP TESTING.
As cybercriminals increasingly profit from brazen attacks, your cyber-risk strategy is under the microscope. With the Cisco 2016 Annual Security Report, which analyzes advances by security industry and criminals, see how your peers assess security preparedness in their organizations and gain insights into where to strengthen your defenses.
Symantec Intelligence Report September 2014Symantec
Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.
The average number of spear-phishing attacks rose to 53 per day in September, after a 12-month low in August. Spear phishing activity has returned to levels seen earlier in the summer, but is still down from the 12-month average of 85 attacks per day.
The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. At 4.8 percent, last month’s top attachment, .exe file types, dropped to fourth.
There were only four publically disclosed data breaches that took place within the month September, resulting in the exposure of 2.5 million identities. However, there were 14 additional data breaches reported in September that took place earlier in the year. The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities.
Ransomware continues to decline as 2014 progresses. However, crypto-style ransomware remains high, making up 38 percent of all ransomware detected in September.
There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second highest in last 12 months.
One in 2,041 emails was identified as a phishing attempt, compared with one in 1,587 for August. While at first glance this looks like a big drop, it results in only a 0.01 percentage point decrease in the overall phishing rate.
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...Black Duck by Synopsys
This week’s news is dominated by fall-out and reaction from last week’s WannaCrypt/WannaCry attacks, of course, but other open source and cybersecurity stories you won’t want to miss, including an important open source ruling that confirms the enforceability of dual licensing, what New York’s new cybersecurity regulations mean for Financial Services and
the PATCH Act and the creation of a vulnerabilities equities process
Key Elements of a Security Delivery PlatformJohn Pollack
You can't secure what you can't see. See how a security delivery platform enables visibility, optimize existing security tool deployments, and allow for a more flexible security tool architecture.
The second quarter (April – June) 2013 saw significant increases in – and the highest quarterly averages ever recorded by Prolexic – for Distributed Denial of Service (DDoS) attack bandwidth and packet-per-second (pps) rates.
Qrator and Wallarm 2016 State of Network Security report is dedicated to the main events and strong trends in the network security industry. Particular attention is payed to the DDoS, Internet infrastructure, hacks and vulnerabilities in software and hardware, like connected devices.
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSIJNSA Journal
DOS ATTACKS ARE ONE OF THE TOP SECURITY PROBLEMS AFFECTING NETWORKS AND DISRUPTING SERVICES TO
LEGITIMATE USERS. THE VITAL STEP IN DEALING WITH THIS PROBLEM IS THE NETWORK'S ABILITY TO DETECT SUCH
ATTACKS. APPLICATION DDOS ATTACK, WHICH AIMS AT DISRUPTING APPLICATION SERVICE RATHER THAN
DEPLETING THE NETWORK RESOURCE. UP TO NOW ALL THE RESEARCHES MADE ON THIS DDOS ATTACKS ONLY
CONCENTRATES EITHER ON NETWORK RESOURCES OR ON APPLICATION SERVERS BUT NOT ON BOTH. IN THIS PAPER
WE PROPOSED A SOLUTION FOR BOTH THESE PROBLEMS BY AUTHENTICATION METHODS AND GROUP TESTING.
As cybercriminals increasingly profit from brazen attacks, your cyber-risk strategy is under the microscope. With the Cisco 2016 Annual Security Report, which analyzes advances by security industry and criminals, see how your peers assess security preparedness in their organizations and gain insights into where to strengthen your defenses.
¿Has realizado ya un certificado de profesionalidad en la modalidad de teleformación con Dependentias Asociación Estatal? ¿Estás realizándolo y quieres ya tramitar la exención de tu módulo de prácticas / formación práctica en el puesto de trabajo? Descarga este documento que se revisó el día 16 de octubre de 2015
Organizations need to acquire the latest option accessible to them when it comes to managing the considerable growth of cloud-based solutions such as applications, data and cloud market. Cloud Application Control has proven its worth and organizations need to come and take a closer look at the application control solutions to streamline the security process.
DDoS Attacks in 2020 & Best Practices in DefenseNETSCOUT
Experts from NETSCOUT’s ATLAS Security Engineering & Response Team (ASERT) will cover:
• Worldwide, DDoS attack trends during the 1st half of 2020
• DDoS attacks designed to restrict remote workforce access to corporate resources
• Some common misconceptions about DDoS attacks
• And best practices in DDoS defense
Russian and Worldwide Internet Security Trends 2015Qrator Labs
This report contains the main corporate site availability and security trends and issues of 2015 related to DDoS and “hacking” threats. It is prepared by Qrator Labs and Wallarm specialists and based on industry situation monitoring (in Russia and worldwide), and on statistics collected from their customers in 2015. In addition, this report includes data from independent company research conducted on behalf of Qrator Labs.
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
Join this webinar with guest speaker Romain Fouchereau, Manager of the Security Appliance Program, European Systems and Infrastructure Solutions at IDC and Cloudflare, recently named a Leader in the IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Vendor Assessment (Doc #US43699318, March 2019).
In this webinar, you will learn:
- Why defending against only volumetric layer 3 and 4 attacks will leave you vulnerable to other emerging DDoS attack vectors
- What economic and technological shifts are making DDoS more harmful and more evasive
- Why bot management should be considered in every DDoS mitigation strategy
- Which types of companies in EMEA are highly targeted and why
Distributed reflection denial of service attack: A critical review IJECEIAES
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
Network and Application Security 2017. Prediction 2017Wallarm
rator and Wallarm 2016 State of Network Security report is dedicated to the main events and strong trends in the network security industry.
Particular attention is paid to the DDoS, internet infrastructure, hacks and vulnerabilities in software and hardware, like connected devices.
The report for Q1 2018 includes:
- WatchGuard Firebox Feed Trends. In this regular section, we analyze threat intelligence shared by tens of thousands of WatchGuard security appliances. This analysis includes details about the top malware and network attacks we saw globally throughout the quarter. Using that data, we identify the top attack trends, and how you might defend against them.
- Top Story: GitHub DDoS Attack In Q1 2018, attackers launched a record-breaking distributed denial of service (DDoS) attack against GitHub using a technique called UDP amplification. In this section we analyze this attack and describe how the lesser-known Memcached service allowed this huge amplification.
- Announcing The 443 Podcast Rather than our normal threat research section, this quarter we announce a new podcast from the WatchGuard Threat Labs team, and the authors of this report. Learn what this new podcast contains and come subscribe wherever podcasts are found.
- The Latest Defense Tips As usual, this report isn’t just meant to inform you of the latest threats, but to help you update your defenses based on the latest attacks. Throughout the report, we share defensive learnings and tips, with a summary of the most important defenses at the end.
The State of the Internet, 2nd Quarter, 2013 Executive SummaryAkamai Technologies
This quarter’s report includes data gathered from across the Akamai Intelligent Platform in the second quarter of 2013 about attack traffic, broadband adoption, and mobile connectivity, as well as trends seen in this data over time. In addition, this edition
of the report includes insight into attacks for which a group known as the Syrian Electronic Army has claimed responsibility, the states of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter and observations from Akamai partner Ericsson on data and voice traffic growth on mobile networks.
The frequency and impact of cyber attacks have escalated cybersecurity to the top of Board agendas. Institutions are no longer asking if they are vulnerable to cyber attacks. Instead, the focus has shifted to how the attack might be executed, risks and impact. Most importantly, their organisational readiness and resilience to such threats.
6 Key Findings Security Findings for Service ProvidersNETSCOUT
While DDoS attacks evolve in size, volume, frequency, and complexity each year, attackers never stray from one bedrock principle: If it’s important to network operators and enterprises, it’s important to them.
Case Study: Q2 2014 Global DDoS Attack Report | Akamai DocumentProlexic
The Brobot botnet that devastated banks with DDoS floods in 2013 may be back. And the techniques that built it – exploiting vulnerabilities in the software that powers websites and cloud companies – is all too alive. Get the full details about this cybercrime threat in the Akamai/Prolexic Q1 2014 DDoS attack report, available for a free download at http://bit.ly/1meTkfu
Q-learning based distributed denial of service detectionIJECEIAES
Distributed denial of service (DDoS) attacks the target service providers by sending a huge amount of traffic to prevent legitimate users from getting the service. These attacks become more challenging in the software-defined network paradigm, due to the separation of the control plane from the data plane. Centralized software defined networks are more vulnerable to DDoS attacks that may cause the failure of all networks. In this work, a new approach is proposed based on q-learning to enhance the detection of DDoS attacks and reduce false positives and false negatives. The results of this work are compared with entropy detection in terms of the number of received packets to detect the attack and also the continuity of service for legitimate users. Moreover, these results indicate that the proposed system detects the DDoS attack from flash crowds and redirects the traffic to the edge of the data center. A second controller is used to redirect traffic to a honeypot server that works as a mirror server. This guarantees the continuity of service for both normal and suspected traffic until further analysis is done. The results indicate an increase of up to 50% in the throughput compared to other approaches.
Similar to akamai's [state of internet] / security (20)
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
By Design, not by Accident - Agile Venture Bolzano 2024
akamai's [state of internet] / security
1. akamai’s [state of the internet] / security
Q3 2015 report
[Volume2/Number3]
2. [state of the internet] / security / Q2 2015
FA S T E R F O R W A R D T O T H E L AT E S T
G L O B A L B R O A D B A N D T R E N D S
Join us at stateoftheinternet.com for a glimpse into the future of connectivity
Download Akamai’s latest
[state of the internet] report
TAP
HERE
3. [LETTER FROM THE EDITOR]
letter from the editor / The q3 2015 State of the Internet — Security
Report continues to build on the enhancements we made to the report
earlier this year.
Each of our technology platforms collects a distinct data set that
reveals a unique view of the Internet. This breadth allows Akamai to
compare and contrast the different indicators of attack activity.
We explore which industries among our customer base suffered the
highest volume of attacks, which attack techniques and vectors were
most common, and where the attack traffic originated.
This report is the first since Akamai launched its Security Intelligence
Response Team (Akamai SIRT). Combining the teams responsible
for intelligence, research, and customer security incident response
on the Akamai platforms brings together a cohesive group that sees a
large part of the Internet’s traffic. The new team’s efforts add a greater
breadth and depth to the report you are about to read.
We hope you find it valuable.
As always, if you have comments, questions, or suggestions regarding
the State of the Internet — Security Report, the website, or the mobile
applications, connect with us via email at stateoftheinternet-security@
akamai.com or on Twitter at @State_Internet.
You can also interact with us in the State of the Internet subspace
on the Akamai Community at https://community.akamai.com.
— Akamai Technologies
4. 4
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[TABLE OF CONTENTS]
5 [AT A GLANCE]
6 [SECTION]1
= ANALYSIS + EMERGING TRENDS
10 [SECTION]2
= DDoS ACTIVITY
12 2.1 / Mega Attacks
14 2.2 / DDoS Attack Spotlight: A 222 Mpps Attack
16 2.3 / DDoS Attack Vectors
21 2.4 / Top 10 Source Countries for DDoS Attacks
23 2.5 / DDoS Attacks by Industry
25 2.6 / DDoS Attacks — A Two-Year Look Back
28 2.7 / Reflection DDoS Attacks, Q3 2014 – Q3 2015
31 [SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
32 3.1 / Web Application Attack Vectors
33 3.2 / Web Application Attacks over HTTP vs. HTTPS
36 3.3 / Top 10 Source and Target Countries for
Web Application Attacks
38 3.4 / Web Application Attacks by Industry
40 3.5 / SQLi and LFI Attacks by Target Industry
42 3.6 / Web Application Spotlight: Scrapers
45 3.7 / Methodology
47 [SECTION]4
= AKAMAI EDGE FIREWALL ACTIVITY
51 [SECTION]5
= CLOUD SECURITY RESOURCES
51 5.1 / New DDoS Reflection Techniques
52 5.2 / XOR DDoS
54 5.3 / More Attack Activity from DD4BC and the Rise of Armada Collective
56 5.4 / Cloudpiercer Discovery Tool
56 5.5 / CDN Vulnerability Unveiled at Black Hat USA 2015
57 5.6 / Another OpenSSL Vulnerability
58 [SECTION]6
= LOOKING FORWARD
60 [DATA SOURCES]
5. 5
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
AT A GLANCE DDoS attacks compared with Q3 2014
179.66% increase in total DDoS attacks
25.74% increase in application layer
(Layer 7) DDoS attacks
198.1% increase in infrastructure layer
(Layer 3 4) DDoS attacks
15.65% decrease in average attack duration:
18.86 vs. 22.36 hours
52.94% decrease in attacks 100 Gbps: 8 vs. 17
65.58% decrease in average peak attack bandwidth
88.72% decrease in average peak attack volume
462.44% increase in reflection attacks
DDoS attacks compared with Q2 2015
22.79% increase in total DDoS attacks
42.27% decrease in application layer (Layer 7) DDoS attacks
30.21% increase in infrastructure layer (Layer 3 4) DDoS attacks
8.87% decrease in average attack duration: 18.86 vs. 20.64 hours
33.33% decrease in attacks 100 Gbps: 8 vs. 12
25.13% decrease in average peak attack bandwidth
42.67% decrease in average peak attack volume
40.14% increase in reflection attacks
Web application attacks compared with Q2 2015
96.36% increase in HTTP web application attacks
79.02% decrease in HTTPS web application attacks
21.64% increase in SQLi attacks
204.73% increase in LFI attacks
57.55% increase in RFI attacks
238.98% increase in PHPi attacks
6. [SECTION]1
ANALYSIS +
EMERGING TRENDS
6
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
T
he third quarter of 2015 set a record for the number of distributed denial
of service (DDoS) attacks recorded on Akamai’s routed network. All
told there were 1,510 DDoS attacks — an increase of 180% over what was
reported in q3 2014 and a 23% increase over q2 2015.
Though the number of DDoS attacks increased, the percentage of attacks that
targeted the application layer (Layer 7) dropped 42% in the last quarter. In contrast,
application layer DDoS attacks were up 26% compared to q3 2014.
7. 7
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Infrastructure layerDDoS attacks increased 30% from last quarter and were up
198% over q3 2014.
While the number of DDoS attacks rose in the last quarter and in the last year,
we observed a decrease in average attack duration, as well as average peak
bandwidth and volume.
The decreases can be attributed to a few factors. The largest factor is the increasing
use of booter-stresser tools. Sites offering booter-stresser tools are purportedly set
up to allow administrators to load test their own sites. However, in many cases that
is a cover story shrouded in a legal artifact. Many of the sites are simply DDoS-for-
hire tools in disguise, relying on the use of reflection attacks to generate their traffic.
Because the vast majority of these sites are subscription-based and usually only
allow attacks to last 1,200 – 3,600 seconds (20 – 60 minutes), their use is decreasing
the mean length of attacks. In the past, most DDoS attacks were based on infected
bots and would last until the attack was mitigated, the malicious actor gave up,
or the botnet was taken down. Instead of spending time and effort to build and
maintain DDoS botnets, it is far easier for attackers to use booter-stresser tools to
exploit network devices and unsecured service protocols.
A review of the data indicates that booter-stresser tools are less capable of the big
attacks that infection-based botnets produce. The user login and configuration
pages of these tools are almost always hosted behind the protection of a low-cost
content delivery network (cdn). This arrangement provides attackers with a layer
of perceived anonymity and the ability to launch their attacks, at least for a time,
without divulging their point of origin.
In a departure from the last several quarters, q3 data shows the uk as the top source
country for DDoS attacks, responsible for 26% of attacks. China was the second-
most prolific source country at 21%, the us came in third (17%), and India and
Spain tied for fourth at 7%. Akamai uses application layer traffic as the primary
[SECTION]1
= ANALYSIS + EMERGING TRENDS
8. 8
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
measurement for the source of DDoS attacks because udp and other network layer
traffic is easily spoofed, disguising the source. Application layer traffic represented
a significantly smaller percentage of all DDoS traffic in q3 than in the past.
Mega DDoS attacks — those measuring 100 Gigabits per second (Gbps) or
more — also dropped from 12 last quarter to 8 this quarter. Compared to the q3 last
year, 100+ Gbps-sized attacks have decreased 53%. This is down from the record-
setting 17 mega attacks of q3 2014.
Additionally, in q3 2015, the largest DDoS attack measured 149 Gbps, a decrease in
size from the largest (250 Gbps) last quarter. Of the eight mega attacks, the media
and entertainment sector was targeted most frequently, with three attacks.
The online gaming sector was hit particularly hard in q3 2015, accounting for 50%
of the recorded DDoS attacks. Gaming was followed by software and technology,
which suffered 25% of all attacks. Internet and telecom was hit by 5% of attacks, a
drop from 13% last quarter.
This quarter, the vast majority of web application attacks — 88% — came over
http. The remaining 12% came over https. This drop is dramatic in percentage
of https-based attacks compared to q2, when Shellshock was used prolifically.
Although https-based web application attacks represent only a small portion of
all the web application attacks we observe, they still account for millions of attack
alerts each quarter.
This quarter, local file inclusion (lfi) and sql injection (SQLi) attacks were by far the
most prevalent web application attack vectors. The retail industry was hit hardest,
receiving 55% of web application attacks, with the financial services industry a
distant second, receiving 15% of attacks.
[SECTION]1
= ANALYSIS + EMERGING TRENDS
9. 9
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
While DDoS attacks frequently relied on booter-stresser sites, web application
attacks were more likely to be based on botnets that take advantage of unsecured
home-based routers and devices.
For the first time, the security report also includes attack activity observed across the
Akamai Edge Firewall, our global platform perimeter. For this report we analyzed
the frequency udp reflection attacks, as well as the corresponding top source ASNs
for DDoS reflectors.
In q3 2015, Akamai tracked several new attack techniques, vulnerabilities and
criminal operation campaigns that warranted the release of threat advisories and
case studies. These are profiled in more detail in Section 5 and include:
• New DDoS reflection techniques
• xor DDoS, a Trojan malware that attackers are using to hijack Linux machines
• More attack activity from DD4BC and the rise of the Armada Collective
• Cloudpiercer, a tool designed to locate the ip addresses of origin servers
• A cdn vulnerability unveiled at Black Hat usa 2015
• A vulnerability addressed in OpenSSL versions 1.0.2d and 1.0.1p
[SECTION]1
= ANALYSIS + EMERGING TRENDS
10. [SECTION]2
DDoS ACTIVITY
D
espite setting a new record for the number of DDoS attacks in q3 2015 —
a 180% increase over q3 2014 and a 23% increase over q2 2015 — we saw
decreases in average peak bandwidth and volume, as well as in average
attack duration.
10
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
11. 11
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[SECTION]2
= DDoS ACTIVITY
The average duration of attacks this quarter was 18.86 hours, a slight drop from
20.64 hours last quarter and a further drop from 22.36 hours in q3 2014. Average
peak bandwidth was 5.15 Gbps, down 25% from last quarter, and average peak
volume was 1.57 million packets per second (Mpps), down 43%. Compared to the
same period a year ago, peak bandwidth dropped 66% and volume dropped 89%.
The decrease in bandwidth, volume and duration can be attributed to a few factors.
One is that the booter-stresser tools used to launch attacks cost money and limit
the attacker to a set length of time. In the past, more attacks were based on botnets
developed through infection, and attacks could last until they were mitigated,
attackers gave up, or the botnet was taken down. Additionally, the booter-stresser
tools, which use reflection attack techniques instead of directly generating their
own payloads, seem to be less capable of big attacks than botnets.
While the number of application layer (Layer 7) DDoS attacks dropped 42% over last
quarter, they were up 26% compared to q3 2014. Infrastructure layer (layers 3 and 4)
DDoS attacks increased 30% from last quarter and were up 198% over q3 2014.
Attacks measuring 100 Gbps in size or greater also dropped from 12 mega attacks
last quarter to 8 mega attacks this quarter. Compared to the same quarter last year,
DDoS attacks peaking at 100 Gbps or more decreased 53%.
12. 12
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
2.1 / Mega Attacks / In q3 2015, 8 DDoS attacks registered more than 100 Gbps,
as shown in Figure 2-1. This number is down from q2 2015, when there were 12 mega
attacks, and still more of a drop from the record-setting 17 mega attacks of q3 2014.
In q3 2015, the largest DDoS attack measured 149 Gbps, a decrease in size from
the largest (250 Gbps) last quarter. Of the eight mega attacks, the media and
entertainment sector received the largest share, followed by financial services and
software and technology.
The smaller number of large DDoS attacks, along with the lack of any attacks greater
than 150 Gbps, is a large part of why the average attack peak bandwidth fell so
drastically (25%) in the third quarter. We also saw a large reduction in the number
of packets in the larger attacks.
[SECTION]2
= DDoS ACTIVITY
160
140
120
100
80
60
40
20
0
July 7 July 17 July 23 Aug. 6 Aug. 8 Aug. 22 Aug. 23 Aug. 25
146 149
117
106
127
109
145
134
Financial Services
Software Technology
Media Entertainment
Gaming
Attack Date
Gbps
Q3 2015 DDoS Attacks 100 Gbps
Figure 2-1: Eight DDoS attacks registered more than 100 Gbps in Q3 2015, with the
largest registering 149 Gbps
13. 13
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[SECTION]2
= DDoS ACTIVITY
There were five DDoS attacks in q3 that delivered more than 30 Mpps and only one
attack peaked at more than 50 Mpps, although that attack registered an extremely
large 222 Mpps, as shown in Figure 2-2. In contrast, there were 18 attacks of 30+ Mpps
in q2 2015. The rate of packets received affects some routers and networks more
than the number of bytes because packets require more memory to track, tying up
valuable resources.
250
200
150
100
50
0
Aug. 23July 22
31
July 17
36
July 26
37
July 8
33
222
127
222
Software TechnologyMedia EntertainmentGaming
Attack Date
Q3 2015 DDoS Attacks 30 Mpps
Figure 2-2: Five DDoS attacks delivered more than 30 Mpps in Q3 2015, with one attack
much larger than the rest: 222 Mpps
14. 14
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[SECTION]2
= DDoS ACTIVITY
2.2 / DDoS Attack Spotlight: A 222 Mpps Attack / When it comes to DDoS
attacks, high bandwidth is usually the most notable metric, but a high packet per
second rate can be just as devastating. The attack featured in this spotlight would
require at least 145 Gbps of available bandwidth just to withstand the brunt of the
attack. Further, the attack generated a record-setting 222 Mpps. The Gbps and
Mpps of the malicious traffic were measured at each of six Akamai DDoS scrubbing
centers, as shown in Figure 2-3.
HKG
17
12
DCA
22
SJC
24
FRA
62
66
LON
31
TYO
12
17
44
40
20
Mpps Gbps
Attack Bandwidth (Gbps) and Volume (Mpps) Distribution
Figure 2-3: Bandwidth (Gbps) and volume (Mpps) of a DDoS attack as measured from
Akamai DDoS scrubbing centers in Hong Kong, Washington DC, San Jose, Frankfurt,
London and Tokyo
15. 15
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[SECTION]2
= DDoS ACTIVITY
When an attack this large targets a web server, multiple devices are usually
traversed before the traffic reaches the target server. The question then becomes,
can devices in the path — the edge router, a DDoS mitigation device, a proxy, and
any other devices — handle 222 Mpps of malicious traffic and still deliver the load
of legitimate traffic?
This DDoS attack generated a high peak traffic using only a single attack vector, a
syn flood. Attacks this large usually employ a combination of at least two attack
vectors. Generating such a large load using a single vector may provide a clue as to
the size of the botnet.
Payloads / The signatures in Figure 2-4 show the two payload variations observed
in this syn flood attack. One payload has a length of zero, and the other payload has
an extra 8 bytes of data.
Initial packet analysis / Although the malware used in this attack has yet to be
analyzed by Akamai sirt, some initial observations can be made based on packet
analysis. For one, there seems to be an anomaly occurring during the creation of
these tcp packets. Specifically, some of the tcp options are applied outside of the
tcp header and fall into the data portion. In a recent analysis of the xor DDoS
malware, errors were also found in the creation of the tcp packet related to the
calculation of header size.
Figure 2-4: Two payload variations used in the SYN flood DDoS attack
21:28:09.101512 IP X.X.X.X.3478 X.X.X.X.80: Flags [S], seq 8420, win 21012, options
[mss 729,nop,wscale 8,nop,nop,sackOK], length 0
21:28:09.101517 IP X.X.X.X.4041 X.X.X.X.80: Flags [S], seq 1612447744:1612447752, win
59258, options [mss 19970,nop,eol], length 8
16. 16
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[SECTION]2
= DDoS ACTIVITY
As shown in Figure 2-5, the first packet contains additional options — the two no
operations (NOPs) and the selective acknowledgment (sack) permitted options.
The hex values for those options appear in the data portion of the second packet.
Whether the errors in the packets are intentional or not does not diminish the effect
of a 222 Mpps flood. This attack does not match what we have previously observed
from booter-stresser sites or syn flood attack scripts. Akamai sirt will continue to
monitor these attacks and provide additional information as it becomes available.
2.3 / DDoS Attack Vectors / As shown in Figure 2-6, network layer attacks
continued to account for roughly 95% of all DDoS attack activity.
More than 17% of DDoS attacks utilized the udp fragment attack vector in q3 2015,
which is a change from last quarter, when syn floods represented the most popular
infrastructure-based attack, as shown in Figure 2-7. Attackers’ use of ssdp floods
represented 15% of all DDoS activity in q3, nearly the same as last quarter, when it
Figure 2-5: Errors were made in the packet creation: options are found outside the
TCP header
SYN flood packet with options applied within header
17:32:00.586714 IP (tos 0x0, ttl 142, id 13523, offset 0, flags [DF], pro-
to TCP (6), length 52)
x.x.x.x.22103 y.y.y.y.80: Flags [S], cksum 0xa8a4 (correct), seq
4079091712, win 27963, options [mss 1460,nop,wscale 8,nop,nop,sackOK],
length 0
0x0000: 4500 0034 34d3 4000 8e06 a88a XXXX XXXX E..44.@.........
0x0010: XXXX XXXX 5657 0050 f322 0000 0000 0000 .......P.”......
0x0020: 8002 6d3b a8a4 0000 0204 05b4 0103 0308 ..m;............
0x0030: 0101 0402 ....
SYN flood packet with some options outside of the header(NOP NOP 0101 and
SACKok 0402)
17:32:00.586770 IP (tos 0x0, ttl 112, id 24940, offset 0, flags [DF], pro-
to TCP (6), length 60)
x.x.x.x.9309 y.y.y.y.80: Flags [S], cksum 0x4e52 (correct), seq
4178903040:4178903048, win 4183, options [mss 19202,nop,eol], length 8
0x0000: 4500 003c 616c 4000 7006 03fa XXXX XXXX E..al@.p.......
0x0010: XXXX XXXX 245d 0050 f915 0000 0000 0000 .......P........
0x0020: 8002 1057 4e52 0000 0204 4b02 0100 0000 ...WNR....K.....
0x0030: 0303 0800 0101 0000 0402 0000 ............
17. 17
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
represented just under 16% of all DDoS attacks. By comparison, ssdp was the top
DDoS attack vector in q1 2015 and q4 2014. ntp attacks accounted for 13% of all
activity in q3 and syn floods decreased to only 12%.
udp fragments are at least partially a byproduct of other DDoS traffic, such as
chargen, dns, rpc, snmp and some udp floods. So while udp fragments are the
largest portion of network layer attack traffic, it is difficult to associate the fragments
with their originating type. As a result, the fact that ssdp traffic had previously been
the leader for DDoS attack traffic is all the more remarkable.
[SECTION]2
= DDoS ACTIVITY
18. Percentage
InfrastructureLayerDDoSApplicationLayerDDoS
0 5 10 15 20
PUSH
HTTP POST
HTTP GET
Other
UDP
FRAGMENT
UDP
FLOODS
NTP
SYN
SSDP
RIP
ICMP
DNS
CHARGEN
ACK 2.99%
8.48%
9.66%
2.77%
0.98%
14.58%
11.77%
12.73%
10.91%
17.23%
3.06%
3.60%
0.42%
0.81%
FIN FLOODS (0.38%)
FIN PUSH (0.23%)
RESET (0.64%)
XMAS (0.61%)
RP (0.11%)
SNMP (0.27%)
SYN PUSH (0.15%)
NetBIOS (0.15%)
RPC (0.11%)
Sentinel (0.11%)
TCP Anomaly (0.30%)
Application
Layer DDoS
4.83%
Infrastructure
Layer DDoS
95.17%
Figure 2-6: Application-layer DDoS attacks were less than 5% of all attacks. UDP
fragment floods, SSDP, NTP SYN, UDP floods, DNS, and CHARGEN DDoS attacks all
occurred regularly
DDoS Attack Vector Frequency, Q3 2015
18
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
19. 19
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Although we tracked two dozen attack vectors in q3 2014, the top 10 vectors were
responsible for 95% of the attacks. To better understand the cyclical nature of
attacks, we analyzed this subset of attack vectors over the past five quarters. Figure
2-7 shows the frequency of these attack vectors within that subset.
For example, the reduction of ssdp attack traffic and the re-emergence of udp
fragment attacks as the primary tool reflects the cyclical nature of attack tools
and methods in the DDoS world. We saw a rapid increase in tools that used ssdp
reflection over the last year, as understanding spread of how easily the protocol
could be abused. Similarly we saw an increase in ntp attacks in 2014, which will
likely recur at the end of 2015 and the beginning of 2016 as new vulnerabilities have
been recently disclosed in the venerable (and vulnerable) Network Time Protocol.
That said, not all ntp vulnerabilities produce results that can be used for denial of
service attacks. So far the only method being abused is the monlist get method in
ntp queries and few ntp servers appear to still have this vulnerability.
This trend of mostly infrastructure attacks has continued for more than a year,
as attackers have relied more and more on reflection attack vectors. Not only do
reflection attacks obscure the true ip addresses of the attacker, they also require
fewer resources relative to the size of the attack.
That said, DDoS attack scripts for application layer DDoS attacks have been shifting
towards the use of non-botnet based resources, such as open proxies on the Internet.
This trend, along with the continued abuse of WordPress and Joomla-based websites
as get flood sources, may pave the way to an increase in application-based reflection
DDoS attacks that abuse web application frameworks.
[SECTION]2
= DDoS ACTIVITY
20. Figure 2-7: Frequency of the 10 most common DDoS attack vectors over the past
five quarters
ACK
3.16%
8.96%
6.75%
6.18%
5.45%
4.07%
10.20%
9.20%
6.34%
11.03%
7.71%
3.80%
9.20%
8.00%
8.84%
9.25%
2.92%
2.69%
3.84%
4.38%
8.37%
13.43%
15.39%
9.94%
7.36%
8.56%
4.74%
16.69%
22.23%
15.35%
7.60%
12.44%
16.84%
16.90%
17.75%
24.01%
11.52%
12.09%
14.18%
11.10%
15.86%
18.19%
14.34%
12.85%
14.64%
14.43%
2.25%
2.13%
2.90%
3.96%
CHARGEN
DNS
HTTP GET
ICMP
NTP
SSDP
SYN
UDP
FLOODS
UDP
FRAGMENT
0 5 10 15 20 25 30
Q3 2015 Q2 2015 Q1 2015 Q4 2014 Q3 2014
10 Most Frequent Attack Vectors by Quarter
20
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
21. 21
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
2.4 / Top 10 Source Countries for DDoS Attacks / In a departure from the
last several quarters, the uk was the top source country for DDoS attacks in q3 2015,
at 26%, as shown in Figure 2-8. China was the second most prolific source country
at 21%, while the us came in third (17%), and India and Spain tied for fourth at 7%.
Figure 2-9 shows the source country results from last quarter and from the prior
year. Last quarter China topped the list at 37%, followed by the us (18%), uk (10%)
and India (7%). In q3 2014, the us was the top source country at 24%, followed by
China (20%), Brazil (17.5%), and Mexico (14%).
It is important to note that source country is based primarily on application traffic
that requires a complete connection. Infrastructure traffic, such as udp, is easily
spoofed, and therefore is not used in this metric. Application layer DDoS attacks,
which represent non-spoofed ip addresses, are less prevalent than in the past. In q2,
they represented 10.23% of all DDoS attacks, but in q3 they only represented 4.83%
of all DDoS attacks recorded across the routed platform.
Egypt 3%
Taiwan 4%
Australia 5%
Russian Federation 5%
South Korea 5%
China
21%
UK
26%
US
17%
India
7%
Spain
7%
Figure 2-8: The 10 countries sourcing the most DDoS attack traffic in Q3 2015
Top 10 Source Countries for DDoS Attacks, Q3 2015
[SECTION]2
= DDoS ACTIVITY
22. 22
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Since there were fewer non-spoofed attack sources this quarter, the UK’s climb to
first place is mostly an indication of fewer confirmed attack sources from the other
countries, as well as the increase in the number of attacks overall. In fact, the total
increase in sources from this quarter to last for the uk is 46.55%, while China and
the us dropped 67.32% and 44.31% respectively in total non-spoofed attack sources.
Egypt
Taiwan
Australia
Russian Fed.
South Korea
Spain
India
US
China
UK
Q3
2015
0 10% 20% 30% 40%
Q2
2015
3.30%
3.77%
5.19%
5.21%
5.38%
6.87%
6.95%
17.04%
20.70%
25.60%
Taiwan
Australia
Germany
Russia
South Korea
Spain
India
UK
US
China
0 10% 20% 30% 40%
4.00%
4.18%
4.29%
4.45%
4.53%
6.03%
7.43%
10.21%
17.88%
37.01%
Thailand
India
Russian Fed.
Japan
Germany
South Korea
Mexico
Brazil
China
US
Q3
2014
0 10% 20% 30% 40%
2.42%
2.81%
2.98%
4.10%
5.78%
6.13%
14.16%
17.60%
20.01%
23.95%
Figure 2-9: The US and China typically are among the top three non-spoofed sources
for attacking IP addresses
Top 10 Source Countries for DDoS Attacks by Quarter
22
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[SECTION]2
= DDoS ACTIVITY
23. 23
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
2.5 / DDoS Attacks by Industry / The online gaming sector was hit particularly
hard in q3 2015, accounting for 50% of all DDoS attacks, as shown in Figure 2-10.
Gaming was followed by software and technology, which suffered 25% of all attacks
in q3. They were followed by financial services (8%), media and entertainment (5%),
Internet and telecom (5%), retail and consumer goods (3%), education (3%) and the
public sector (1%).
Online gaming / Online gaming has remained the most targeted industry since
q2 2014. In q4 2014, attacks were fueled by malicious actors seeking to gain media
attention or notoriety from peer groups, to damage reputations and to cause
disruptions in gaming services. Some of the largest console gaming networks were
openly and extensively attacked in December 2014, when more players were likely
to be affected due to the new networked games launched for the holiday season.
At the end of 2015, it is likely we’ll see a similar pattern emerge again.
Software Technology
Retail Consumer Goods
Public Sector
Media Entertainment
Internet Telecom
Hotel Travel
Gaming
Financial Services
Education
Business Services
0% 5% 10% 15% 20% 25% 30% 35% 50% 55%45%40%
Q3 2015Q2 2015
27.74%
25.33%
2.60%
9.41%
12.90%
4.72%
0.41%
0.40%
35.20%
50.00%
2.50%
2.66%
8.19%
7.78%
0.07%
0.07%
4.99%
1.05%
1.06%
2.99%
DDoS Attack Frequency by Industry
Figure 2-10: Together, online gaming and software and technology were hit by 75% of
DDoS attacks in Q3 2015
[SECTION]2
= DDoS ACTIVITY
24. 24
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Online gaming as a target industry also followed the trend of more reflection
DDoS attacks and fewer botnet-based DDoS attacks. This trend was fueled by the
availability of booter-stresser sites using reflection attacks and a population of
frustrated online gamers, which increases the DDoS risk for this industry.
Software and technology / The software and technology industry includes
companies that provide solutions such as Software-as-a-Service (SaaS) and cloud-
based technologies. Although this industry saw a slight drop (down from 28% to
25%), relative to other industries last quarter, it actually experienced a slight increase
in the number of attacks. The most commonly targeted sub-verticals were chat
service providers and non-gaming application developers.
Internet and telecom / The Internet and telecom industry includes companies that
offer Internet-related services such as ISPs and dns providers. It was the target of
5% of attacks in q3, compared with 13% in the previous quarter. Attackers don’t
usually target an isp directly. Instead, the attacks target sites hosted by a provider.
The more sites hosted by a provider, the higher the probability that one or more of
the sites will be a target for a DDoS attack. The sites can range from personal blogs
to commercial sites, and the attackers’ motives can vary from politics to extortion.
Financial services / The financial industry includes major financial institutions
such as banks, insurance companies, payment providers and trading platforms.
The financial industry experienced about the same percentage of all attacks as in
q2 — 8%. Recently, the financial industry has been the focus of various extortion
attempts, and the group DD4BC led the way with multiple extortion and DDoS
attacks against financial services. As is the case with software and technology, this
industry actually saw a slight increase in number of attacks compared to last quarter.
[SECTION]2
= DDoS ACTIVITY
25. 25
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Media and entertainment / The media and entertainment industry had a slight
drop in its percentage of attacks, from 9% in q2 2015 to 5% in q3 2015. However, a
firm in this industry was the target of the largest Mpps DDoS attack recorded to
date at 222 Mpps. DDoS attacks on media are usually politically motivated, and
attacks can be launched by powerful adversaries, as we saw this quarter.
2.6 / DDoS Attacks — A Two-Year Look Back / When reading about DDoS
attacks, most users look at the big attacks and think, “ok, but what should I expect if
they’re coming after me?” That’s the question the graphics below attempt to answer.
We’re using an interquartile range (iqr) to best represent the data.
Figure 2-11 is a combination of box-and-whiskers chart and a scatter plot of all the
DDoS attacks observed by Akamai on the routed platform. We used a logarithmic
scale; each interval shows a 10-fold increase in attack size. The scale makes the
chart more readable and downplays the outliers — attacks that are exceptionally
large or small.
Each dot represents an individual DDoS attack, while the boxes show where the
median, the 25th
and the 75th
percentile fall. For those of us who aren’t statisticians,
the median is the middle, where 50% of all attacks are larger and 50% are smaller.
While average attack size is highly influenced by the very large and very small
attacks, the median hasn’t changed much in a year. The median attack size was just
under 1.6 Gbps in the third quarter of 2014, just over 1.5 Gbps in q2, and just under
1.6 Gbps again in q3 2015. The lower end of the range is slowly increasing as the 25
percentile attacks become larger — 300 megabits per second (Mbps) last year and
425 Mbps in q3.
Last year at this time, the top of the band was 10 Gbps, while this quarter it was
5.4 Gbps. While the average can be pulled up by a few big attacks, it takes a large
number of attacks to change the interquartile range numbers. Attack numbers have
increased dramatically over the year with reflection-based attacks leading the way.
[SECTION]2
= DDoS ACTIVITY
26. 26
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
These attacks don’t typically produce the high bandwidth observed in the past from
botnet-based attacks. The finite number of reflection sources are likely being used
by multiple attackers simultaneously, further reducing the size of each attack.
All of this is a fancy way of saying that if you were to come under DDoS attack,
there’s an even chance that the DDoS attack size would be somewhere between
400 Mbps and 5 Gbps. This estimate gives you a range to use as you plan your
DDoS defenses. Also note that while the attacks falling below 400 Mbps are widely
distributed and gradually fall off, there is a large cluster of attacks above 5 Gbps that
drops off dramatically above 50 Gbps.
Why we use interquartile range / We’re using the iqr to show the median (middle)
attack size, as opposed to the mean (average) attack size, because iqr shows the
information in a slightly more stable manner, especially as the size of the population
of attacks grows.
DDoS Size as a Function of Time
0.100
10.000
0.001
Q3
2013
Q4
2013
Q1
2014
Q2
2014
Q3
2014
Q4
2014
Q1
2015
Q2
2015
Q3
2015
Figure 2-11: DDoS attacks from Q3 2013 to Q3 2015. Each dot represents a DDoS
attack, and each interval covers a 10-fold increase in attack size
Gbps
[SECTION]2
= DDoS ACTIVITY
27. 27
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Before we dive into the shape of the data, here are a few points to know:
• We made a conscious choice to use the median to describe an average attack,
rather than the mean. The median is much more resilient to the presence of
outliers because it represents the point where half of all attacks are larger and
half are smaller.
• The set of observed DDoS attacks include an enormous number of small attacks
and a few large ones. For legibility, we chose to use a logarithmic scale, with each
interval representing a 10-fold increase.
• There is a notch in each of the boxes centered on the median. The notches show
confidence intervals for the median. If the notches for two consecutive boxes
overlap, then there is not a statistically significant difference in the median attack
size, as is exemplified by q4 2014 to q3 2015.
With iqr, population growth tends to create a tighter range in the data. The space
between the 75 percentile and 25 percentile marks in the first quarter of 2013 and the
same marks in the latest quarter has shrunk considerably. As a result, we start to see
the emergence of more statistically significant trends that are less likely to be swayed
by a few outliers. This is good; it better showcases the changes in DDoS trends.
Observable patterns / Looking at the time series, a few patterns stand out. First,
a significant increase in DDoS attack size occurred in q1 2014. Prior to that, the
first four quarters we tracked (q1 – q4 2013) look similar to one another. The
upper boundary of the iqr is roughly the same, and three of the four medians are
statistically similar.
However, the DDoS trend changed between q4 2013 and q1 2014. The upper bound
of the iqr increased dramatically (recall, this is a logarithmic scale), as did the
median attack size. In q4 2014, we see another change — a statistically significant
drop in the upper bound of the iqr, but the median attack size remained the same.
The size of the large DDoS attacks appears to be clumping closer to the median.
[SECTION]2
= DDoS ACTIVITY
28. 28
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
2.7 / Reflection DDoS Attacks, Q3 2014 – Q3 2015 / Starting this quarter, we’re
introducing what is known as a Sankey graphic. Sankey diagrams help to visualize
energy, material or cost transfers between processes. This type of diagram was
created by Irish Captain Matthew Henry Phineas Riall Sankey, who used such a
diagram in 1898 to show the energy efficiency of a steam engine.
The Sankey visualization in Figure 2-12 shows how
DDoS reflection attacks have trended in the last calendar
year. Through the routed network, we tracked nine
infrastructure layer reflection DDoS vectors of which
the three newest (and smallest) are NetBIOS, Sentinel
and rpc. Sentinel and rpc were first observed by
Akamai this quarter. Every attack vector displayed
was involved in a DDoS attack in q3 2015. The most
used vectors correlate with the number of Internet
devices that use these specific service protocols for
legitimate purposes.
On the left, as indicated by the height of the label, we
see that ssdp, ntp, dns, and chargen were the most
used reflection DDoS vectors. As the top vector, ssdp
shows a steady increase from q3 2014 to q3 2015. The
use of the attack peaked in q1 2015, paused, and then
continued an upward trend in q3 2015.
On the right, we see a steady increase in the use of
reflection DDoS as an attack method. The number of
reflection DDoS attacks overall has increased dramatically over the last year, and
the diagram shows that reflection attacks are a big part of the current landscape.
In a reflection DDoS
attack, a malicious actor
begins by sending a
query to a victim IP
address. The victim is
an unwitting accomplice
in the attack. The victim
could be any device on
the Internet that exposes
a reflectable UDP
service. The attacker’s
query is spoofed to
appear to originate from
the attacker’s target.
The attacker uses an
automated attack tool
to send malicious
queries at high rates to
a large list of victims,
who will in turn respond
to the target.
[SECTION]2
= DDoS ACTIVITY
29. 29
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
The percentage of all DDoS attacks that use a reflection attack method is indeed
growing. Figure 2-13 shows the percentage of mitigated DDoS attacks that used
reflection. In q3 2014 only 5.90% of all attack campaigns included reflection, but
33% used reflection in the most recent quarter. Keep in mind that in many DDoS
attack campaigns multiple attack vectors are utilized simultaneously; one third used
at least one reflection vector in q3.
A big takeaway from the Sankey graph is that malicious actors are finding it more
profitable to choose reflection over infection. Instead of spending time and effort
to build and maintain DDoS botnets, it is far easier for attackers to exploit network
devices and unsecured service protocols. This methodology has been applied to the
DDoS-for-hire ecosystem.
Reflection DDoS Attacks, Q3 2014 – Q3 2015
Figure 2-12: This Sankey visualization shows the trends in the types of DDoS reflection
attacks used over the five quarters
[SECTION]2
= DDoS ACTIVITY
30. 30
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Reflection attacks are further
facilitatedbytheconnectionless
nature of udp. Unlike tcp,
which by virtue of the three-
way handshake verifies the
source of a request, udp will
always reply to the source ip of
a crafted request. This behavior
allows for the sending of
malicious queries with spoofed
source ip addresses. As a result,
a flood of replies ends up in the
hands of an unfortunate target.
[SECTION]2
= DDoS ACTIVITY
Quarterly Percentage of
Reflection-Based DDoS Attacks,
Q3 2014 – Q3 2015
Quarter Percentage
Q3 2015 33.19 %
Q2 2015 23.68 %
Q1 2015 21.71 %
Q4 2014 15.51 %
Q3 2014 5.90 %
Figure 2-13: The percentage of DDoS attacks that
were based on reflection vectors has increased in
each of the past five quarters
31. [SECTION]3
WEB APPLICATION
FIREWALL ACTIVITY
A
kamai’s research teams concentrated their analysis on nine common web
application attack vectors — a cross section of many of the most common
categories on industry vulnerability lists. Akamai’s goal was not to validate
a vulnerability list but to look at some of the characteristics of the attacks as they
transit our large network.
As with all sensors, the data sources we use have varying levels of confidence. For
this report, we aimed for the lowest rate of false positives and focused on the most
highly-used web application attack vectors identified within our threat landscape.
31
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
32. 32
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
3.1 / Web Application Attack
Vectors / Last quarter, we added two
data points to the web application attacks
on which we are reporting: xss and
Shellshock. Including events based on
Shellshock nearly doubled the number
of attack events we analyzed in q2, with
173 million Shellshock attacks against
Akamai customers in that one quarter.
Shellshock also significantly shifted the
balance of attacks over http vs. https,
in large part because these attacks were
mostly carried out over https in q2 2015.
The Shellshock bug was first announced
in September 2014 and received heavy
media attention. As a result, this bug is
likely to be patched on most systems. The
number of attempts to exploit it should
continue to drop.
The proliferation of botnets built from
homerouterdevicesiscausinganincrease
in Shellshock attempts over https as
criminalsattempttocompromiserouters
by exploiting default login credentials
and unpatched firmware still vulnerable
to Shellshock.
WEB APPLICATION ATTACK TYPES
SQLi / SQL injection is an attack where
adversary-supplied content is inserted
directly into a SQL statement before
parsing, rather than being safely conveyed
post-parse via a parameterized query.
RFI / Remote file inclusion is an attack
where a malicious user abuses the
dynamic file include mechanism, which is
available in many web frameworks, and
loads remote malicious code into the
victim web application.
PHPi / PHP injection is an attack where a
malicious user is able to inject PHP code
from the request itself into a data stream,
which gets executed by the PHP interpreter,
such as by use of the eval() function.
MFU / Malicious file upload (or unrestricted
file upload) is a type of attack where a
malicious user uploads unauthorized files
to the target application. These potentially
malicious files can later be used to gain full
control over the system.
CMDi / Command injection is an attack
that leverages application vulnerabilities to
allow a malicious user to execute arbitrary
shell commands on the target system.
(Continued on next page)
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
33. 33
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
While botnets are fueling Shellshock
attacks, SQLi and lfi attacks remain
the dominant attack vectors due to tool
availability — attackers frequently use
free and open-source tools for SQLi
and lfi attacks to find and exploit
vulnerabilities in sites.
The third quarter was also notable for
an increase in WordPress plugin attack
attempts,notonlyforpopularpluginsbut
also for less-known vulnerable plugins.
3.2 / Web Application Attacks
Over HTTP vs. HTTPS / This quarter
the majority of attacks — 88% — came
over http. The remaining 12% came over
https. In the big picture, https-based
attacks represent only a small portion of
the attacks we see, yet they account for
millions of attack alerts each quarter.
Given that a large percentage of websites
either do not use https for all of their
web traffic, or use it only for safeguarding
certain sensitive transactions (such as
login requests), the comparison between
http and https should be used only to
understand attack trends across the two
communication channels.
LFI / Local file inclusion is an attack
where a malicious user is able to gain
unauthorized read access to local files on
the web server.
JAVAi / Java injection is an attack where
a malicious user injects Java code,
such as by abusing the Object Graph
Navigation Language (OGNL), a Java
expression language. This kind of attack
became very popular due to recent flaws
in the Java-based Struts framework,
which uses OGNL extensively in cookie
and query parameter processing.
XSS / Cross-site scripting is an attack
that allows a malicious actor to inject
client-side code into web pages viewed
by others. When an attacker gets a user’s
browser to execute the code, it will run
within the security context (or zone) of
the hosting web site. With this level of
privilege, the code has the ability to read,
modify and transmit any sensitive data
accessible by the browser.
Shellshock / Disclosed in September
2014, Shellshock (CVE-2014-6271) is
a vulnerability in the Bash shell (the
default shell for Linux and Mac OS X) that
allows for arbitrary command execution
by a remote attacker. The vulnerability
had existed in Bash since 1989, and the
ubiquitous presence of Bash makes the
vulnerability a tempting target.
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
34. 34
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Encrypted connections (over https
do not provide any additional attack
protection for web applications.
Attackers will likely shift to https to
follow vulnerable applications.
Looking at the q3 data, we see three
possible web application attack trends.
First, attacks are coinciding with more
sites adopting Transport Layer Security
(tls) https, as opposed to ssl. Second,
attackers are attempting more stealthy
attacks over https, possibly to evade
simple intrusion detection systems.
And finally, attackers may have fully
encryptedconnectionsandaredefaulting
to https attacks.
With more Internet sites adopting tls-enabled traffic as a standard security layer,
attackers may follow suit. Or, it could be that attackers aren’t looking solely to penetrate
a site but to target a back-end database, which is most likely accessed via https.
Figure 3-2 shows a week-by-week view of the most-used web application attack
vectors over https in q3 2015. lfi was exploited most often, followed by SQLi. Only
in week 30 was SQLi more prevalent.
Figure 3-3 provides a similar view over http. Again lfi and SQLi are exploited most
often. SQLi attacks exceeded lfi in three weeks: 25, 26, and 32.
88%
12%
HTTP HTTPS
Figure 3-1: Although the vast majority of
attacks (88%) came over HTTP in Q3 2015,
12% came over HTTPS
Total Attacks,
HTTP vs. HTTPS, Q3 2015
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
35. Week 25
Week 26
Week 27
Week 28
Week 29
Week 30
Week 31
Week 32
Week 33
Week 34
Week 35
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
SQLi LFI RFI PHPi CMDi JAVAi MFU XSS Shellshock
Web Application Attack Vectors (HTTPS), Q3 2015
Figure 3-2: The web application attack vectors for attacks over encrypted HTTPS
mitigated by Akamai for each week in Q3 2015. LFI was exploited most of the time,
followed by SQLi
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
SQLi LFI RFI PHPi CMDi JAVAi MFU XSS Shellshock
Week 25
Week 26
Week 27
Week 28
Week 29
Week 30
Week 31
Week 32
Week 33
Week 34
Week 35
Web Application Attack Vectors (HTTP), Q3 2015
Figure 3-3: The web application attack vectors for attacks over HTTP (not encrypted)
mitigated by Akamai for each week in Q3 2015. LFI and SQLi were exploited most of
the time
35
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
36. 36
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
3.3/Top10SourceandTargetCountriesforWebApplicationAttacks/
In q3 2015, the us was the main source of web application attacks, accounting for
59% of attack origin traffic, as shown in Figure 3-4. China was the second largest
source country at 11%, followed by Brazil (7%), Russia (7%), Bulgaria (4%), Ukraine
and the uk (3% each), and the Netherlands, Turkey and Moldova (2% each). Due
to the use of tools to mask the actual location, the attacker may not have been
located in the country detected. These countries represent the ip addresses for
the last hop observed.
The web application attacks
we analyzed occurred
after a tcp session was
established. Therefore, the
geographic origins of the
attack traffic can be stated
with high confidence.
Countries with a higher
population and higher
Internet connectivity are
often observed as the
source of web application
attack traffic.
We can generate significant insight from an analysis of traffic based on the Autonomous
System Number (asn) assigned to traffic in association with Border Gateway Protocol
(bgp) routing. The asn uniquely identifies each network on the Internet with a high
degree of reliability. Although an ip address can be spoofed easily, the asn of the
originating traffic is almost always beyond the power of the attacker to change.
Republic of Moldova 2%
Turkey 2%
Netherlands 2%
United Kingdom 3%
Ukraine 3%
Bulgaria 4%
Russian Federation 7%
China
11%
US
59%Brazil
7%
Figure 3-4: Top 10 source countries for web application
attacks. The US was the main source, accounting for
59% of attack origin traffic
Top 10 Source Countries for
Web Application Attacks, Q3 2015
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
37. 37
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
In q3, ASNs also show the us was the top source of malicious web traffic recorded
withintheAkamaiKonaSiteDefenderinfrastructure,followedbyChinaandRussia,
as shown in Figure 3-5.
The top three attacking ASNs were associated with a virtual private system (vps)
owned by a well-known cloud provider. While it is easy to set up a system in the
cloud, it is hard to secure it. As a result, many of the systems that are set up each day
are compromised easily and used in a botnet or other attack platform.
There are three reasons why it is hard to secure a cloud platform. First, anyone can
establish a vps, but it takes a large base of knowledge and motivation to properly
configure a system securely. And just like a physical system, one misconfiguration
or forgotten patch can make a system insecure. Second, it is easier, cheaper and less
traceable to set up malicious servers in the cloud than on owned hardware. Bringing
up a system that can be created and torn down in seconds with a few commands
is a powerful incentive for legitimate users and attackers alike. Third, while many
vps providers have extensive tools to identify fraud and the theft of system keys,
identifying a command and control (cc, c2) structure for a botnet is much more
difficult and might be indistinguishable from normal web traffic.
Country Type Total Web Attacks
US VPS Provider 7,938,425
US VPS and Colocation Provider 4,121,605
US VPS Provider 3,882,181
CN N/A 11,031,342
CN N/A 8,079,761
CN N/A 5,989,781
RU ISP 5,749,782
RU ISP 4,647,300
RU ISP 3,730,969
Figure 3-5: Highest sourcing malicious traffic of the top three source countries identified
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
38. 38
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Thisquarter,theushadthe
unpleasant distinction of
being both the top source
of web application attacks
and their top target. Given
that many companies
have their headquarters
and it infrastructure in
the us, this makes sense.
Seventy-five percent of
web application attacks
targeted the us, while
only 7% targeted the uk,
6% targeted Brazil and
4% targeted India. Germany and China only found themselves on the receiving
end of 2% of all web application attacks, and Australia, Canada, Japan, and Singapore
were hit by 1% apiece.
3.4 / Web Application Attacks by Industry / This quarter, retail suffered the
vast majority of web application attacks — 55% as shown in Figure 3-7. Financial
services suffered 15% of attacks, followed by media and entertainment (8%),
public sector and hotel and travel (7% each), technology (3%), consumer goods
and gaming (2% each), and business services (less than a percent).
Retailers are targeted for DDoS attacks, but they are also targeted for web application
layer attacks for significant reasons. Retailers have large amounts of valuable
information in their databases, and if an adversary is able to find an sql injection
vulnerability, the attacker can access the retailer’s information. Retailers also have a
large number of visitors to their websites. As a result, attackers will find and exploit
cross-site scripting vulnerabilities to deface retailers’ websites, causing a loss of
Singapore 1%
Australia 1%
Canada 1%
Japan 1%
China 2%
Germany 2%
India 4%
US
75%
UK
7%
Brazil
6%
Figure 3-6: The US was targeted by 75% of web
application attacks in Q3 2015
Top 10 Target Countries for
Web Application Attacks, Q3 2015
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
39. 39
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
trust among customers. Alternately, the attacker may use a compromised site for
a watering hole attack, loading malware on site visitors’ computers. Retailers may
also be a target for unvalidated requests. For example, if an attacker can control the
price of the item being purchased, items may be sold for an amount much different
than the retailer intended. Merchants need to be cognizant of all possible vectors
through which their web applications may be compromised.
In contrast, network layer DDoS attacks are more prevalent in the gaming sector,
primarily because they are an attempt to disrupt the service. Additionally, the
gaming industry often has a smaller attack surface for web application attacks than
industries such as online retailers.
16
14
12
10
8
6
4
2
0
Percentage
RetailPercentage
60
50
40
30
20
10
0
Financial
Services
14.70
Media
Entertainment
7.99
Public
Sector
7.24
Hotel
Travel
7.16
High
Technology
Consumer
Goods
Gaming Other
1.49
2.69
1.59
Retail
54.52
2.62
Web Application Attacks by Industry, Q3 2015
Figure 3-7: Retail suffered the vast majority of web application attacks in Q3 2015 — 55%
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
40. 40
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
3.5 / SQLi and LFI Attacks by Target Industry / Much like last quarter, in
q3 2015 the industries subjected to the greatest number of malicious SQLi and lfi
requests were the retail and financial services verticals, as shown in Figure 3-8.
The most common attack vector, SQLi, takes advantage of improper coding of
web applications that allows attackers to inject sql statements, or fragments of
sql statements, into predefined back-end sql statements such as those used by a
login form. This may in turn allow the attacker to gain access to data held within a
database or to perform other malicious actions. SQLi and lfi attacks were attempted
against Akamai customers more than any other web application attack vector, and
the targets of those attackers were most often financial services and retail firms.
Retail
18
16
14
12
10
8
6
4
2
0
70
60
50
40
30
20
10
0
SQLi Attacks LFI Attacks Retail SQLi Attacks Retail LFI Attacks
Financial
Services
Media
Entertainment
Public
Sector
Hotel
Travel
High
Technology
Consumer
Goods
Gaming
Non-retailAttacks(millions)
RetailAttacks(millions)
Figure 3-8: Financial services and retail were the industries most targeted by SQLi
and LFI attacks
SQLi and LFI Attacks by Target Industry, Q3 2015
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
41. 41
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
lfi attack attempts can be seen in server logs by examining them for indicators
of directory traversal attempts. These attempts appear as repeated strings of ../
ending with a filename on a unix-based server, or a .. on a Windows-based
server. The lfi attack will attempt to read sensitive files on the server that were not
intended to be available publicly, such as password or configuration information.
lfi attacks were the second most common attack vector in q3 2015, most frequently
targeting retail and financial services sites.
SQLiandlfiattacksaredrivenbythereadyavailabilityoffreeandopen-sourcetools
to find vulnerabilities in sites. Such tools include sqlmap (open-source), Acunetix
(closed source) and Havij (freeware), as well as a multitude of other tools. The tools
are generally meant to be used by legitimate administrators testing their own sites,
but are often abused by attackers. Most of these tools can be easily identified by
their user agent strings, which most attackers don’t bother to change.
These two types of attacks require a very noisy reconnaissance approach. Tools for
finding sql injection vulnerabilities can easily make thousands of requests against
a site, testing and probing for an entry point. Blind sql injection, which amounts to
asking a site a series of yes or no questions, can require even more requests.
We have also observed a prevalence of web application scanners. These point-and-
shoot tools are easy to obtain and easy to use against any website. They make a high
number of requests when looking for SQLi and lfi vulnerabilities. Figure 3-9 shows
an example of an lfi attempt as listed in a log.
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
Figure 3-9: An example of what an LFI attempt will look like in a log
URL: / /download.php?f=../../../configuration.php
42. 42
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
The f parameter is input to display a specific file on the server in an attempt to
force the configuration.php file to potentially show server and application
configuration settings, which may include usernames and passwords to other
systems in the network. To find evidence of lfi attempts in logs, look for the ../
indicator or a changing number of that indicator.
3.6 / Web Application Spotlight: Scrapers / A scraper is a specific type of
bot whose purpose is to take data from targeted websites, store and analyze it, and
make the data available. One example of a scraper is a search engine bot. Other
examples are rate aggregators, resellers and seo analytics services.
For example, Akamai has observed a scraper requesting thousands of articles from
newssites.Thearticlesarerepurposedforothersitesoranalyzedtoofferseoservices
back to the site that was scraped. We have observed other scrapers acquiring store
locations, stock prices, and online store inventory. The owners of these scrapers
have been traced back to site competitors and companies who advertise services in
the business of data analytics.
During q3, Akamai observed scraping campaigns across multiple industries, but
mostly retail. Figure 3-10 shows metrics from a campaign we observed in the retail
industry that involved more than 480,000 web scraping attempts to a single site
from September 21 through October 20.
Figure 3-10: Akamai observed more than 480,000 web scraping attempts to a single site
during a one-month period, September 21 to October 20, 2015
Sep 27
480,461 0 480,461
Oct 04 Oct 11 Oct 18
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
43. An easy way to identify a scraper is by the request’s user agent string. In addition
to seeing Googlebot or Bingbot, we see names such as MJ12bot, XoviBot, DotBot,
Ahrefsbot, and UptimeRobot. The last one, UptimeRobot, appears to only make
head requests to the index page, indicating it is only checking to see if the site is up.
Figure 3-11 shows UptimeRobot in action.
Many requests are made to the robots.txt and the index.html files, and another
example we see in the logs is a scraper attempting to find store locations. Figure 3-12
shows a bot using zip codes to brute force a site into giving the desired data.
An Akamai customer in the automotive sales business received scraping activity
using vehicle identification numbers (VINs) to gather data, as shown in Figure 3-13.
The site owner received more than 200 million requests in a one-month period.
Figure 3-11: UptimeRobot makes a HEAD request to check to see if a site is up
10/10/2015 07:04... HEAD /index.html Mozilla/5.0+(compatible; UptimeRobot/...
Figure 3-12: A robot uses zip codes to brute force a site into giving the desired data
10/10/2015 05:58:0... GET failover-www.abcdefghi.com /order/storesSearch searchType=Allzipcode=43716
10/10/2015 05:58:1... GET failover-www.abcdefghi.com /order/storesSearch searchType=Allzipcode=43717
10/10/2015 05:58:5... GET failover-www.abcdefghi.com /order/storesSearch searchType=Allzipcode=43718
10/10/2015 05:59:1... GET failover-www.abcdefghi.com /order/storesSearch searchType=Allzipcode=43719
10/10/2015 05:59:4... GET failover-www.abcdefghi.com /order/storesSearch searchType=Allzipcode=43720
Figure 3-13: Logs show a sample of more than 200 million scraping requests in a
one-month period. This example uses a vehicle identification number to gather data
10/10/2015 11:27:24:000 GET /members/powersearch/vehicleDetails.do vin=2G1165S31F9107542 Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.
10/10/2015 11:27:24:000 GET /members/powersearch/vehicleDetails.do vin=1GCVKREH4FZ251319 Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.
10/10/2015 11:27:24:000 GET /members/powersearch/vehicleDetails.do vin=2G1165S39F9104307 Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.
10/10/2015 11:27:24:000 GET /members/powersearch/vehicleDetails.do vin=1G11A5SL5FF323982 Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.
10/10/2015 11:27:24:000 GET /members/powersearch/vehicleDetails.do vin=1GCRCREC7FZ165246 Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.
10/10/2015 11:27:24:000 GET /members/powersearch/vehicleDetails.do vin=1GCVKREH7FZ250374 Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.
10/10/2015 11:27:24:000 POST /members/powersearch/searchResults.do WT.svl=m_ps_srp_pgnum Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.
10/10/2015 11:27:25:000 GET /members/powersearch/vehicleDetails.do vin=1G11B5SL5FF155760 Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.
10/10/2015 11:27:25:000 GET /members/powersearch/vehicleDetails.do vin=5UXKR0C51F0P01546 Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.
10/10/2015 11:27:25:000 GET /members/powersearch/vehicleDetails.do vin=1G11B5SL4FF152798 Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.
43
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
44. 44
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
In the requests above, the user agent string is a valid browser. When we look a
little further, though, we see the requests are coming from an inexpensive hosting
service — this is an indicator that the requests may not be legitimate and are
from a scraper.
Our final example is a scraper against the same automotive sales website. The
requests shown in Figure 3-14 are from the analytics company Proximic, which is
gathering information about automotive inventory.
In many instances we see data analytics companies scraping a website, gathering
the information — prices or inventory — and offering the results as an analysis
product to companies. Sometimes the analysis is sold back to the companies whose
data was scraped.
Figure 3 -14: Automated requests from the analytics company Proximic gathering
information about automotive inventory
10/12/2015 09:00:37:000 GET /cars-for-sale/research.xhtml listingid=41103154zip=95608endYear=2010pageLA... Mozilla/5.0 (compatible; proximic; +http://www.proximic...
10/12/2015 09:00:40:000 GET /cars-for-sale/searchresults.xhtml priceLabel=2000-12000zip=73119endYear=2016pag... Mozilla/5.0 (compatible; proximic; +http://www.proximic...
10/12/2015 09:00:51:000 GET /cars-for-sale/searchresults.xhtml priceLabel=28500+or+lesszip=53221endYear=2016p... Mozilla/5.0 (compatible; proximic; +http://www.proximic...
10/12/2015 09:00:52:000 GET /cars-for-sale/searchresults.xhtml featureCodes=1033,1126,1132zip=04106endYear=2... Mozilla/5.0 (compatible; proximic; +http://www.proximic...
10/12/2015 09:00:53:000 GET /cars-for-sale/searchresults.xhtml priceLabel=25000+or+lesszip=98383endYear=2016p... Mozilla/5.0 (compatible; proximic; +http://www.proximic...
10/12/2015 09:00:59:000 GET /cars-for-sale/searchresults.xhtml priceLabel=3500+or+lesszip=97862endYear=2016pa... Mozilla/5.0 (compatible; proximic; +http://www.proximic...
10/12/2015 09:01:06:000 GET /cars-for-sale/searchresults.xhtml priceLabel=50000+or+lessendYear=2016zip=77833p... Mozilla/5.0 (compatible; proximic; +http://www.proximic...
10/12/2015 09:01:21:000 GET /cars-for-sale/searchresults.xhtml priceLabel=9000+or+lesszip=94928endYear=2016pa... Mozilla/5.0 (compatible; proximic; +http://www.proximic...
10/12/2015 09:01:34:000 GET /cars-for-sale/searchresults.xhtml priceLabel=AnyendYear=2016pageLayout=liststartY... Mozilla/5.0 (compatible; proximic; +http://www.proximic...
10/12/2015 09:01:35:000 GET /cars-for-sale/searchresults.xhtml priceLabel=9000+or+lesszip=03071endYear=2010pa... Mozilla/5.0 (compatible; proximic; +http://www.proximic...
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
45. 45
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
3.7 / Methodology / For a long time Akamai has tracked metrics for DDoS
attacks; they are typically the most commented on, reprinted, and discussed
stats that we produce. Over the years, however, our customers have asked for
a similar view into the stealthy web application attacks that plague enterprises,
governments and others — the attacks that organizations such as the Open Web
Application Security Project (owasp) have tracked and ranked according to
prevalence and danger.
Figuring out how to give our customers a view of what we see has been a long
and arduous challenge. Although Akamai has visibility into 15 – 30% of the world’s
web traffic, the challenge in meeting this goal has been threefold: how to store the
data we see, how to query it, and finally, how to report on it meaningfully.
In the past two years, we’ve tackled the first two challenges. Akamai’s Cloud
Security Intelligence (csi) platform now stores more than 2 petabytes (pb) of
threat intelligence data (2,000 terabytes) — 10 tb of application layer attack data
a day for a rolling 30 – 45 days.
Querying the data has taken quite a bit of finesse. To do it, we hired a number
of data scientists, analysts and researchers. Today, those researchers make up
Akamai’s company-wide research team, which has set up dozens of heuristics to
automatically query the stored data every hour. The insight they extract from the
data feeds improvements to Kona Site Defender and our Client Reputation engine.
The final challenge was reporting on the data. Our reporting methodology is
based on some assumptions. First, we divided all Akamai customers into eight
verticals. Then, for each of the customers in these eight verticals, we tracked the
number of malicious requests across the nine categories of attacks featured in this
report during a 12-week period. Next, the frequency of the attack vectors and the
accuracy of the signatures used to detect each of the attack categories were given
weight in the selection of categories.
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
46. 46
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
As the csi platform and the capabilities of our team and its resources grow, we
look forward to continuing to report on data such as is provided in this report,
in addition to exploring new trends as they develop. Please engage us and let us
know which types of data you’d like to see in the next report. As long as we can
guarantee the anonymity of our customers, we’ll continue to share as much as we
can in the most useful way possible.
[SECTION]3
= WEB APPLICATION FIREWALL ACTIVITY
47. [SECTION]4
AKAMAI EDGE
FIREWALL ACTIVITY
T
his quarter marks the first time Akamai Edge Firewall data is in our security
report. Edge Firewall data sets provide a broad look at attack activity at
the global platform perimeter — with information on attack traffic coming
from 200,000 machines outfitted with Akamai technology.
47
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
48. 48
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[SECTION]4
= AKAMAI EDGE FIREWALL DATA
At the platform perimeter, two dropped packets per second are analyzed, giving us
a more accurate, broader look at affected hosts and attack tactics. This data creates
a bigger magnifying glass to show what types of non-layer 7 attacks are being
attempted against Akamai customers. This report focused on udp-reflected DDoS
attacks, including ssdp, ntp, chargen and Quote of the Day (qotd).
Amongourfindingsisthatthemostheavily-abusednetworksareinChinaandother
Asian countries. While most ssdp attacks tend to be from home connections, ntp,
chargen and qotd are generally from cloud and hosting providers where those
services run. We see more repetitive use of the same ntp and chargen reflectors
and less reuse of individual ssdp reflectors.
Figure 4-1 is a geographical heat map designed to show the most prevalent areas
for the ssdp, chargen, ntp and qotd attack activity identified in q3 2015. It is
populated by logs identifying more than 1.5 million reflectors. The map shows that
the us and Europe are most heavily abused for use as DDoS reflectors.
DDoS Reflector Heatmap, Q3 2015
Figure 4-1: A geographical heat map of victim SSDP, CHARGEN, NTP and QOTD
reflectors in Q3 2015
49. 49
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
As expected, we found ssdp reflectors were used most frequently. This correlates
with the earlier data about DDoS attacks and helps explain why ssdp reflection has
been a heavily favored vector. Figure 4-2 shows the percentage for each of the four
collected reflector types within this platform.
*While ntp accounted
for 23% of the reflection
sources, only a limited
number of these responded
in a manner that makes
the monlist query a viable
amplification source. The
number of ntp reflectors
thatmetthatcriteriawasless
than the total for chargen.
The next illustration,
Figure 4-3, shows the Top
10 source ASNs for ssdp,
chargen, ntp and qotd
reflectors. This further
breaks out the data from the geographical heatmap by diving to the origin of the
attack traffic. Leading the pack was asn4837 (CNCGroup China169 Backbone) at
28% of originating traffic, followed by asn4134 (chinanet-Backbone) at 25%, and
in third place was asn17676 (Japan Network Information Center) at 15%. The other
asn and associated Internet providers sourced 3 – 6%.
SSDP NTP CHARGEN QOTD
72.19%23.01%
2.08%
2.73%
Prevalence of DDoS Reflection Sources,
Q3 2015
Figure 4-2: The percentage of DDoS reflection sources
identified by the Akamai Edge Firewall
[SECTION]4
= AKAMAI EDGE FIREWALL DATA
50. 50
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
ASN4837 (CNCGROUP China169 Backbone)
ASN4134 (CHINANET-BACKBONE)
ASN17676 (Japan Network Information Center)
ASN3462 (Chunghwa Telecom Co)
ASN8048 (CANTV Servicios, Venezuela)
ASN20115 (Charter Communications)
ASN9299 (Philippine Internet Exchange)
ASN12874 (Fastweb SpA)
ASN28573 (Grupo de Seguranca Vírtua)
ASN8151 (SEGURIDAD DE RED UNINET)
28%
25%15%
6%
5%
5%
5%
4%
4%
3%
Top 10 DDoS Reflection Source ASNs, Q3 2015
Figure 4-3: The top origins of attacks that use DDoS reflection methods are two
Chinese networks and one Japanese network
[SECTION]4
= AKAMAI EDGE FIREWALL DATA
51. [SECTION]5
CLOUD SECURITY
RESOURCES
A
kamai released five threat advisories and attack case studies in q3 2015, as
summarized here.
5.1 / New DDoS Reflection Techniques / For malicious actors
looking to bring a website or service offline, distributed reflection denial of service
attacks have been a popular weapon of choice. Going into q3 2015, the reflection-
based attack trend continued.
51
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
52. 52
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
In a reflection DDoS attack, a malicious actor begins by sending a query to a victim
ip address. The victim is an unwitting accomplice in the attack. The victim could
be any device on the Internet that exposes a reflectable udp service. The attacker’s
query is spoofed to appear to originate from the attacker’s target. The attacker uses
an automated attack tool to send malicious queries at high rates to a large list of
victims, who will in turn respond to the target.
In a case study released in October, Akamai outlined three new reflected DDoS
attacks: NetBIOS name server (nbns) reflection, rpc portmap reflection, and
Sentinel reflection, which reflects off of licensing servers. Akamai has mitigated each
of these reflection attack methods multiple times while protecting our customers
from DDoS attacks.
One of the 10 reflection attack campaigns was especially large. The rpc reflection
attack vector was used in a mega DDoS attack that generated more than 100 Gbps.
NetBIOS reflection DDoS attacks were observed by Akamai as occurring sporadically
from March to July 2015. Although legitimate and malicious nbns queries to udp
port 137 are a common occurrence, a response flood was first detected in March
2015 during a mitigated DDoS attack.
5.2 / XOR DDoS / In September, Akamai’s Security Intelligence Response Team
(sirt) tracked xor DDoS, a Trojan malware attackers were using to hijack Linux
machines for participation in a DDoS botnet. The bandwidth of DDoS attacks
Figure 5-1: Sentinel reflection attack signature
16:01:14.572122 IP (tos 0x0, ttl 123, id 24986, offset 0, flags [none], proto UDP (17),
length 1460)
x.x.x.x.5093 x.x.x.x.1351: UDP, length 1432
16:01:14.576212 IP (tos 0x0, ttl 123, id 24988, offset 0, flags [none], proto UDP (17),
length 1460)
x.x.x.x.5093 x.x.x.x.1351: UDP, length 1432
[SECTION]5
= Q3 2015 CLOUD SECURITY RESOURCES
53. 53
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
coming from the xor DDoS botnet had ranged from a few Gbps to 150+ Gbps. The
gaming sector had been the primary target, followed by educational institutions.
Akamai sirt released an XOR DDoS threat advisory in late September.
At the time, the botnet was attacking up to 20 targets per day, 90% of which were
in Asia. Akamai mitigated two DDoS attacks orchestrated by the xor DDoS botnet
on the weekend of August 22. The largest attack of the quarter — which peaked at
149 Gbps — was launched by the xor DDoS botnet. Additional details about that
attack are shown in Figure 5-2.
Late in the quarter, the same botnet was the source of a dns flood against a customer
using Akamai’s FastDNS infrastructure. The attack campaign started with a dns
flood of 30 Mpps and escalated into a syn flood ramping up to 140 Gbps and
more than 75 Mpps.
xor DDoS is an example of attackers building botnets from Linux systems instead
of Windows-based machines. A decade ago, Linux was perceived as a more secure
alternative to Windows systems, which suffered the most attacks at the time. As a
result, companies increasingly adopted Linux as part of their security-hardening
efforts. But Linux offers no guarantees. The malware does not spread via a host
vulnerability. Rather, it populates via Secure Shell (ssh) services that are susceptible
to brute-force attacks due to weak passwords.
Akamai Scrubbing Center Peak Gbps Peak Mpps
Hong Kong 25.66 5.50
Washington 19.70 3.40
San Jose 18.45 3.80
Frankfurt 24.00 3.50
London 11.00 4.30
Tokyo 50.50 15.70
Figure 5-2: Traffic distribution by Akamai DDoS scrubbing center for a SYN flood
orchestrated by the XOR botnet
[SECTION]5
= Q3 2015 CLOUD SECURITY RESOURCES
54. 54
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Other recent examples of Linux-based malware include the Spike DDoS toolkit
(which also targeted Windows machines) and IptabLes and IptabLex malware.
ThereareanincreasingnumberofLinuxvulnerabilitiesformaliciousactorstotarget,
such as the heap-based buffer overflow vulnerability found earlier this year in the
gnu c library. However, xor DDoS itself does not exploit a specific vulnerability.
xor DDoS captured the attention of technology news outlets, including sc
Magazine, which describes attacks that alter installations based on the victim’s
Linux environment. A rootkit is also deployed to cloak the main attack. The Avast
blog has also focused on xor DDoS attacks.
Akamai SIRT’s research indicated the malware was of Asian origin, based on
the command-and-control (c2) ip addresses and source ip addresses of the
attack payloads.
We expect xor DDoS activity to continue as attackers refine their methods. Further,
we anticipate a more diverse selection of DDoS attack types in future versions of the
malware. xor DDoS malware is part of a wider trend of which companies must be
aware: Attackers are targeting poorly configured and unmaintained Linux systems
for use in botnets and DDoS campaigns.
5.3 / More Attack Activity from DD4BC and the Rise of Armada
Collective / In early September, Akamai released a case study about the
DDoS attacks from the bitcoin extortionist group DD4BC, based on Akamai
SIRT’s observation of attack traffic directed at our customers from September
2014 through August 2015. This is shown in Figure 5-3. The team identified 114
DD4BC attacks, including more aggressive measures that target brand reputation
through social media.
[SECTION]5
= Q3 2015 CLOUD SECURITY RESOURCES
55. 55
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
DD4BC has been using the threat of DDoS attacks to secure bitcoin payments
from its victims for protection against future attacks. The latest attacks — focused
primarily on the financial service industry — involved new strategies and tactics
intended to harass, extort and ultimately embarrass the victim publicly.
By the end of q3 2015, Akamai began seeing attacks from a group calling itself the
Armada Collective. The initial thinking was that DD4BC had changed its name,
but on further inspection it appeared more likely that Armada Collective was a
copycat group. Like DD4BC, the Armada Collective threatens a victim with emails
claiming that a DDoS attack is forthcoming against their victim’s unless they pay
a specified amount in bitcoins. In one case, the group demanded that an Akamai
customer pay 30 bitcoins or all their servers would be DDoSed.
60
50
40
30
20
10
0
9/30/2014
11/8/2014
12/23/2014
1/22/2015
2/21/2015
3/30/2015
4/4/2015
4/10/2015
4/28/2015
5/1/2015
5/4/2015
5/16/2015
5/27/2015
5/28/2015
6/1/2015
6/4/2015
6/8/2015
6/17/2015
6/24/2015
6/27/2015
6/29/2015
6/30/2015
7/1/2015
7/3/2015
7/5/2015
7/7/2015
7/9/2015
7/16/2015
7/24/2015
Attack Date
Gbps Mpps
DD4BC Attack Timeline
Figure 5-3: Attack timeline of bandwidth and packets per second for DD4BC events
[SECTION]5
= Q3 2015 CLOUD SECURITY RESOURCES
56. 56
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
Armada Collective claimed that their DDoS attacks were very powerful — that they
had the power to launch an attack of more than 1 Terabit per second (Tbps). At the
time of writing, the largest Armada Collective attack mitigated by Akamai peaked
at 771 Mbps, less than 1 Gbps.
5.4/CloudpiercerDiscoveryTool/Lateinq3,researchersreleaseddetailsofa
tool that allowed users to discover origin servers. The tool was named Cloudpiercer,
and it used a number of techniques to locate the ip addresses of origin servers.
Cloudpiercer bundled several previously known methods with some stated new
ones to simplify reconnaissance against targets. It is a reconnaissance tool, not an
attack tool. A potential attacker may use similar methods to search for a customer’s
datacenter ip addresses or netblock(s), but will have to use other services or
technologies to perform an actual DDoS or web application attack.
Cloudpiercer required verification of ownership of a site before it could be tested,
which limited the ability of attackers to use the tool. However, the methods of
discovery described in the paper might allow an adversary to recreate a tool without
verification steps.
Akamai’s sirt analyzed the methods used by the tool and found no proof of a
large number of documented discovery cases using these types of techniques. The
security community had been aware of these methods for several years.
5.5 / CDN Vulnerability Unveiled at Black Hat USA 2015 / On August 6
at the Black Hat Security Conference in Las Vegas, Bishop Fox, a security research
and penetration testing firm, announced the discovery of a vulnerability that allows
an outside actor to conduct a cross-site request forgery (csrf)/Server-Side Request
Forgery (ssrf) attack using a combination of exploits.
[SECTION]5
= Q3 2015 CLOUD SECURITY RESOURCES
57. 57
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
This vulnerability relied on the Akamai platform in two ways: specially crafted
legacy resource locators (also called v1 ARLs) in combination with specific versions
of Flow Player.
Ahead of the announcement, Akamai closed the vulnerability by disabling the use
of v1 ARLs to go forward to mediapm.edgesuite.net. In addition, Akamai made
changes to protect customers using the related Multi-Domain Config feature and
continues to make security improvements surrounding other uses of v1 ARLs
on our platform.
The researchers who discovered this vulnerability coordinated closely with Akamai
to identify exposed domains prior to public release. Thanks to their cooperation,
Akamai was already communicating with customers it believed had been exposed
to the vulnerability, informing them of remediation plans. To date, there is no
evidence that indicates this csrf was used maliciously.
5.6 / Another OpenSSL Vulnerability / In July, Akamai was made aware of an
OpenSSL vulnerability addressed in OpenSSL versions 1.0.2d and 1.0.1p. Akamai
does not use the vulnerable versions of OpenSSL and was therefore not affected.
The vulnerability was reported to OpenSSL on June 24. The fix was developed by
the BoringSSL project, and released by OpenSSL on July 9.
Though Akamai is unaffected, we recommended that sites running OpenSSL in
their origin infrastructure consult their security advisory team to review the
vulnerability, upgrade software and address the vulnerability as necessary.
[SECTION]5
= Q3 2015 CLOUD SECURITY RESOURCES
58. [SECTION]6
LOOKING FORWARD
I
n the coming months, we expect more records to be set for the number of
DDoS attacks recorded on Akamai’s routed network, though the attack vectors
and methods will continue to vary.
Now that we’re able to provide analysis of traffic based on the asn assigned to
traffic in association with its bgp routing, readers can expect a sharpening focus.
We expect the us to remain a top source of malicious traffic because of the sheer
58
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
59. 59
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com
[SECTION]6
= LOOKING FORWARD
number of devices, vulnerabilities and users in the us, and it is likely that cloud
providers will remain the biggest trouble spot unless they do more to improve their
internal security procedures.
Though activity from DD4BC appears to have quieted, attacks from copycats like
the Armada Collective will probably continue.
Distributed reflection denial of service attacks will remain a popular weapon of
choice for attackers, though it remains to be seen if NetBIOS, rpc portmap and
Sentinel will remain popular reflection DDoS attacks. Surprisingly, despite a
decreasing number of available resources, ntp reflection surged near the end of q3
2015 and continues into q4.
Expect the heavy barrage of DDoS attacks against the gaming industry to continue,
as players keep looking for an edge over competitors, and security vulnerabilities
in gaming platforms continue to attract attackers looking for low-hanging fruit.
Financial services will also remain a top target given the myriad opportunities
malicious actors have to extract and monetize sensitive data.
We will also continue to see malware in ads and third-party service attacks as
attackers continue to find security holes in the many widgets and plugins used
across myriad platforms.
We expect retailers to continue to suffer the vast majority of web application attacks
given the potential financial gains for attackers, and that SQLi and lfi will remain
favorite vectors, because free and open-source tools are plentiful to find these
vulnerabilities in sites.
Collaboration continues to be an imperative for the software and hardware
development industry, application and platform service providers, and the
security industry in order to break the cycle of mass exploitation, botnet building
and monetization.
60. Data Sources / The data in this report is based on attacks observed and identified
by Akamai. The trends are affected in various ways, not all of which are directly
related to increases in attack activity. Example factors include changes in the
distribution of our customer base, the launch of new products, and improvements
to attack sensors.
The Akamai platform consists of more than 200,000 servers in more than 100
countries around the globe and regularly transmits between 15 – 30% of all Internet
traffic. In February 2014, Akamai added the Prolexic routed network to its portfolio,
a resource specifically designed to fight DDoS attacks. This report draws its data
from the two platforms in order to provide information about current attacks and
traffic patterns around the globe.
The Akamai Intelligent Platform protects customers by being massively distributed,
protected by the use of the Kona Site Defender and the ability to absorb attack
traffic closest to where it originates. In contrast, the routed DDoS solution protects
customers by routing traffic to scrubbing centers where experienced incident
responders use a variety of tools to remove malicious traffic before passing clean
traffic to origin servers. The two types of technology are complementary and provide
two lenses through which we can examine traffic on the Internet.
60
akamai’s [state of the internet] / security / Q3 2015 / www.stateoftheinternet.com