SlideShare a Scribd company logo
© AKAMAI - EDGE 2016
Barbarians at the Gate(way)
Dave Lewis, Global Security Advocate
© AKAMAI - EDGE 2016
Text
#whoami
Dave Lewis
@gattaca
dave@akamai.com
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
We Found Him!
© AKAMAI - EDGE 2016
Text
å
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
It left me wanting…
© AKAMAI - EDGE 2016
Text
Game Plan
• Actors
• Attacks
• Tools
• Trends
• Data
• Now what?
© AKAMAI - EDGE 2016
Text
Actors: For Hire
© AKAMAI - EDGE 2016
Text
Current(ish) prices on the Russian underground
• Hacking corporate mailbox: $500
• Winlocker ransomware: $10-20
• Intelligent exploit bundle: $10-$3,000
• Hiring a DDoS attack: $30-$70/day, $1,200/month
• Botnet: $200 for 2,000 bots
• DDoS botnet: $700
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Actors: Bored Kids
© AKAMAI - EDGE 2016
Text
Bored Teens
https://www.flickr.com/photos/ardinhasaphotography/8484164608/sizes/l
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Hacktivists
https://www.flickr.com/photos/sklathill/2255718951/sizes/l
© AKAMAI - EDGE 2016
Text
Actors: Nation States
© AKAMAI - EDGE 2016
Text
Standard Villains
There are
© AKAMAI - EDGE 2016
Text
Arch Villains
And there are…
© AKAMAI - EDGE 2016
Text
Attacks
© AKAMAI - EDGE 2016
Text
Attack Vectors Over HTTP
© AKAMAI - EDGE 2016
Text
Attack Vectors Over HTTPS
© AKAMAI - EDGE 2016
Text
Types of Attacks
SYN Floods
UDP Floods
ICMP Floods
NTP Amplification
HTTP Flood
© AKAMAI - EDGE 2016
Text
Attacks: Volumetric
© AKAMAI - EDGE 2016
Text
Your website can be overwhelmed…
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Attacks: Application Layer
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Application Layer DDoS
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Attacks: Extortion
© AKAMAI - EDGE 2016
Text
DD4BC
Began by targeting sites with ransom demands
Failure to pay lead to increased $$$ to stop the attack
Earlier attacks focused on businesses that would avoid
reporting the attacks to law enforcement.
Once research published they relocated their campaigns to
APAC
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
More recently…
• DD4BC continues to inform victims that they will
launch a DDoS attack of 400-500 Gbps against
them.
• To date, DD4BC attack campaigns mitigated by
Akamai have not exceeded 50 Gbps in size.
• That’s up from the high of 15-20 Gbps observed
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Attacks: Amplification
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Tools
© AKAMAI - EDGE 2016
Text
Tools: Havij
© AKAMAI - EDGE 2016
Text
Tools: Donut
© AKAMAI - EDGE 2016
Text
Tools: Donut (con’t)
GET / HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg,
application/x-shockwave-flash, application/msword,
application/vnd.ms-powerpoint, application/vnd.ms-excel, */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
5.1; .NET CLR 1.0.3705)
Host: www.foo.bar
Connection: Close
© AKAMAI - EDGE 2016
Text
Tools: HULK
© AKAMAI - EDGE 2016
Text
Tools: HULK (con’t)
GET /?NJB=VURZQ HTTP/1.1
Accept-Encoding: identity
Host: www.foo.bar
Keep-Alive: 112
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3)
Gecko/20090913 Firefox/3.5.3
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Connection: close
Referer: http://www.foo.bar
Cache-Control: no-cache
© AKAMAI - EDGE 2016
Text
Tools: LOIC
© AKAMAI - EDGE 2016
Text
Tools: HOIC
© AKAMAI - EDGE 2016
Text
Tools: Brobot
Brobot is a PHP trojan that allows an attacker
to take control of a victim's compromised hosted
Web server and use it to launch DDOS attacks.
© AKAMAI - EDGE 2016
Text
Tools: SSHowDown
CVE-2004-1653
© AKAMAI - EDGE 2016
Text
Tools: Mirai
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Tools: WGET
© AKAMAI - EDGE 2016
Text
Trends
© AKAMAI - EDGE 2016
Text
Media Grandstanding
© AKAMAI - EDGE 2016
Text
Commoditization of DDoS
https://www.flickr.com/photos/trophygeek/7309935684/sizes/l
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
What’s your fancy?
© AKAMAI - EDGE 2016
Text
What’s a Booter?
https://www.flickr.com/photos/chicagobart/4480217217/sizes/l
© AKAMAI - EDGE 2016
Text
OK, What’s a Stresser?
Image Credit: Honda
© AKAMAI - EDGE 2016
Text
Stressers or Booters
• xBOOT
• Flash Stresser
• Hyper Stresser
• Grim Booter
• Anonymous Stresser
• Titanium Stresser / Lizards
• Big Bang Booter…and so on.
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Some other highlights
• DDoS agents targeting Joomla and other SaaS apps
• A heap-based buffer overflow vulnerability in Linux systems
• Attackers using new MS SQL reflection techniques
• Data breaches fueling login attacks
© AKAMAI - EDGE 2016
Text
OK so, attribution?
https://www.flickr.com/photos/45909111@N00/8519280338/sizes/l
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
MEGA MEGA MEGA
These large attacks all contained SYN floods
12:34:04.270528 IP X.X.X.X.54202 > Y.Y.Y.Y.80: Flags
[S], seq 1801649395:1801650365, win 64755, length 970
....E.....@...}.6.....6....Pkb......P...c.........................................
..........................<snip>..................................................
© AKAMAI - EDGE 2016
Text
DDoS: Function of Time
© AKAMAI - EDGE 2016
Text
Other Observations
• SQLi
• Local/Remote File Inclusion
• IoT botnets coming to the forefront
• PHP Injection
• Malicious File upload
• JAVA …best remote access platform ever!
© AKAMAI - EDGE 2016
Text
SQL Injection…still
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Why this is a problem
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Passwords
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
File Inclusions
© AKAMAI - EDGE 2016
Text
Malicious Uploads
• KCFinder file upload vulnerability
• Open Flash Chart file upload vulnerability (CVE-2009-4140)
• appRain CMF (uploadify.php) unrestricted file upload exploit (CVE-2012-
1153)
• FCKeditor file upload vulnerability (CVE-2008-6178)
© AKAMAI - EDGE 2016
Text
Undead Army
https://www.flickr.com/photos/scabeater/3272684874/sizes/o/
© AKAMAI - EDGE 2016
Text
So, what to do?
• I might know a vendor that could help :-)
• SQL INJECTION IS A SOLVABLE PROBLEM
• Harden systems
• Work with your ISP on mitigation strategies
• Use ACL lists to deal with known bad IPs
• IP Rate limiting
• PATCH PATCH PATCH
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
STATEOFTHEINTERNET.COM
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Thanks!
© AKAMAI - EDGE 2016
Text
Thanks for listening!
© AKAMAI - EDGE 2016
Text
Questions?
Thanks
Dave Lewis
@gattaca
dave@akamai.com

More Related Content

What's hot

Edge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is nowEdge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is now
akamaidevrel
 
Edge 2016 acme - lets encrypt your origin
Edge 2016 acme - lets encrypt your originEdge 2016 acme - lets encrypt your origin
Edge 2016 acme - lets encrypt your origin
akamaidevrel
 
Edge 2016 keeping tls secure
Edge 2016 keeping tls secureEdge 2016 keeping tls secure
Edge 2016 keeping tls secure
akamaidevrel
 
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
Taisuke Yamada
 
Measuring What Matters - Fluent Conf 2018
Measuring What Matters - Fluent Conf 2018Measuring What Matters - Fluent Conf 2018
Measuring What Matters - Fluent Conf 2018
Cliff Crocker
 
Velocity spa faster_092116
Velocity spa faster_092116Velocity spa faster_092116
Velocity spa faster_092116
Manuel Alvarez
 
Measuring what matters
Measuring what mattersMeasuring what matters
Measuring what matters
Cliff Crocker
 
Progressive Web Apps. What, why and how
Progressive Web Apps. What, why and howProgressive Web Apps. What, why and how
Progressive Web Apps. What, why and how
Riza Fahmi
 
Hacking Web Performance
Hacking Web Performance Hacking Web Performance
Hacking Web Performance
Maximiliano Firtman
 
A Modern Approach to Performance Monitoring
A Modern Approach to Performance MonitoringA Modern Approach to Performance Monitoring
A Modern Approach to Performance Monitoring
Cliff Crocker
 
Fluent 2018: Measuring What Matters
Fluent 2018: Measuring What MattersFluent 2018: Measuring What Matters
Fluent 2018: Measuring What Matters
Akamai Developers & Admins
 
MVVM for the Web
MVVM for the WebMVVM for the Web
MVVM for the Web
Excella
 
Third party-performance (Airbnb Nerds, Nov 2013)
Third party-performance (Airbnb Nerds, Nov 2013)Third party-performance (Airbnb Nerds, Nov 2013)
Third party-performance (Airbnb Nerds, Nov 2013)
Guy Podjarny
 
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
Tae Young Kim
 
[DevDay2018] Introduction to Cloud Computing and AWS platform - By: Bach Huy...
[DevDay2018] Introduction to Cloud Computing and AWS platform  - By: Bach Huy...[DevDay2018] Introduction to Cloud Computing and AWS platform  - By: Bach Huy...
[DevDay2018] Introduction to Cloud Computing and AWS platform - By: Bach Huy...
DevDay Da Nang
 
DIY Website Performance - Akamai Toronto Tech Day 2015
DIY Website Performance - Akamai Toronto Tech Day 2015DIY Website Performance - Akamai Toronto Tech Day 2015
DIY Website Performance - Akamai Toronto Tech Day 2015
Desmond Tam
 
2nd AMIMOTO: WordPress + Amazon Web Services Singapore
2nd AMIMOTO: WordPress + Amazon Web Services Singapore2nd AMIMOTO: WordPress + Amazon Web Services Singapore
2nd AMIMOTO: WordPress + Amazon Web Services Singapore
Kel
 
Vered Flis: Because performance matters! Architecture Next 20
Vered Flis: Because performance matters! Architecture Next 20Vered Flis: Because performance matters! Architecture Next 20
Vered Flis: Because performance matters! Architecture Next 20
CodeValue
 
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
Alexandra Anghel
 
Node @ flipkart
Node @ flipkartNode @ flipkart
Node @ flipkart
Abhinav Rastogi
 

What's hot (20)

Edge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is nowEdge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is now
 
Edge 2016 acme - lets encrypt your origin
Edge 2016 acme - lets encrypt your originEdge 2016 acme - lets encrypt your origin
Edge 2016 acme - lets encrypt your origin
 
Edge 2016 keeping tls secure
Edge 2016 keeping tls secureEdge 2016 keeping tls secure
Edge 2016 keeping tls secure
 
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
 
Measuring What Matters - Fluent Conf 2018
Measuring What Matters - Fluent Conf 2018Measuring What Matters - Fluent Conf 2018
Measuring What Matters - Fluent Conf 2018
 
Velocity spa faster_092116
Velocity spa faster_092116Velocity spa faster_092116
Velocity spa faster_092116
 
Measuring what matters
Measuring what mattersMeasuring what matters
Measuring what matters
 
Progressive Web Apps. What, why and how
Progressive Web Apps. What, why and howProgressive Web Apps. What, why and how
Progressive Web Apps. What, why and how
 
Hacking Web Performance
Hacking Web Performance Hacking Web Performance
Hacking Web Performance
 
A Modern Approach to Performance Monitoring
A Modern Approach to Performance MonitoringA Modern Approach to Performance Monitoring
A Modern Approach to Performance Monitoring
 
Fluent 2018: Measuring What Matters
Fluent 2018: Measuring What MattersFluent 2018: Measuring What Matters
Fluent 2018: Measuring What Matters
 
MVVM for the Web
MVVM for the WebMVVM for the Web
MVVM for the Web
 
Third party-performance (Airbnb Nerds, Nov 2013)
Third party-performance (Airbnb Nerds, Nov 2013)Third party-performance (Airbnb Nerds, Nov 2013)
Third party-performance (Airbnb Nerds, Nov 2013)
 
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
 
[DevDay2018] Introduction to Cloud Computing and AWS platform - By: Bach Huy...
[DevDay2018] Introduction to Cloud Computing and AWS platform  - By: Bach Huy...[DevDay2018] Introduction to Cloud Computing and AWS platform  - By: Bach Huy...
[DevDay2018] Introduction to Cloud Computing and AWS platform - By: Bach Huy...
 
DIY Website Performance - Akamai Toronto Tech Day 2015
DIY Website Performance - Akamai Toronto Tech Day 2015DIY Website Performance - Akamai Toronto Tech Day 2015
DIY Website Performance - Akamai Toronto Tech Day 2015
 
2nd AMIMOTO: WordPress + Amazon Web Services Singapore
2nd AMIMOTO: WordPress + Amazon Web Services Singapore2nd AMIMOTO: WordPress + Amazon Web Services Singapore
2nd AMIMOTO: WordPress + Amazon Web Services Singapore
 
Vered Flis: Because performance matters! Architecture Next 20
Vered Flis: Because performance matters! Architecture Next 20Vered Flis: Because performance matters! Architecture Next 20
Vered Flis: Because performance matters! Architecture Next 20
 
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
 
Node @ flipkart
Node @ flipkartNode @ flipkart
Node @ flipkart
 

Viewers also liked

C++ Programming Club-Lecture 3
C++ Programming Club-Lecture 3C++ Programming Club-Lecture 3
C++ Programming Club-Lecture 3
Ammara Javed
 
C++ Programming Club-Lecture 2
C++ Programming Club-Lecture 2C++ Programming Club-Lecture 2
C++ Programming Club-Lecture 2
Ammara Javed
 
Flip flops
Flip flopsFlip flops
Flip flops
Ammara Javed
 
Registers
RegistersRegisters
Registers
Ammara Javed
 
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
Ontico
 
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
Ontico
 
Counters
CountersCounters
Counters
Ammara Javed
 
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
Codemotion
 
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
Ontico
 
Edge 2016 measuring what matters
Edge 2016 measuring what mattersEdge 2016 measuring what matters
Edge 2016 measuring what matters
akamaidevrel
 
App Dev in the Cloud: Not my circus, not my monkeys...
App Dev in the Cloud: Not my circus, not my monkeys...App Dev in the Cloud: Not my circus, not my monkeys...
App Dev in the Cloud: Not my circus, not my monkeys...
Eric D. Schabell
 
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
Ontico
 
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
Ontico
 

Viewers also liked (13)

C++ Programming Club-Lecture 3
C++ Programming Club-Lecture 3C++ Programming Club-Lecture 3
C++ Programming Club-Lecture 3
 
C++ Programming Club-Lecture 2
C++ Programming Club-Lecture 2C++ Programming Club-Lecture 2
C++ Programming Club-Lecture 2
 
Flip flops
Flip flopsFlip flops
Flip flops
 
Registers
RegistersRegisters
Registers
 
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
 
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
 
Counters
CountersCounters
Counters
 
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
 
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
 
Edge 2016 measuring what matters
Edge 2016 measuring what mattersEdge 2016 measuring what matters
Edge 2016 measuring what matters
 
App Dev in the Cloud: Not my circus, not my monkeys...
App Dev in the Cloud: Not my circus, not my monkeys...App Dev in the Cloud: Not my circus, not my monkeys...
App Dev in the Cloud: Not my circus, not my monkeys...
 
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
 
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
 

Similar to Edge 2016 barbarians at the gateway

Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
💻 Javier Garza
 
DESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAIDESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAI
Cristian Garcia G.
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adware
Amit Serper
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
PROIDEA
 
Analyzing the State of the Internet
Analyzing the State of the InternetAnalyzing the State of the Internet
Analyzing the State of the Internet
David Belson
 
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Tanya Denisyuk
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
NowSecure
 
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
IBM France Lab
 
Cloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedCloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to Sophisticated
Akamai Developers & Admins
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
Cyren, Inc
 
Holiday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakHoliday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For Peak
G3 Communications
 
DevOps and Cloud Native
DevOps and Cloud NativeDevOps and Cloud Native
DevOps and Cloud Native
Alistair Israel
 
Edge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live DemonstrationEdge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live Demonstration
Akamai Technologies
 
Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06
Paul Calvano
 
Introduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth ProfileIntroduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth Profile
Nat Sakimura
 
Why care about a CDN?
Why care about a CDN?Why care about a CDN?
Why care about a CDN?
Elaine Greenberg
 
Spoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetSpoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized Internet
APNIC
 
DDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internetDDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internet
Tom Paseka
 
The Slow Death of Passwords
The Slow Death of PasswordsThe Slow Death of Passwords
The Slow Death of Passwords
ForgeRock Identity Tech Talks
 
IoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an HourIoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an Hour
Taisuke Yamada
 

Similar to Edge 2016 barbarians at the gateway (20)

Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
 
DESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAIDESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAI
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adware
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
 
Analyzing the State of the Internet
Analyzing the State of the InternetAnalyzing the State of the Internet
Analyzing the State of the Internet
 
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
 
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
 
Cloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedCloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to Sophisticated
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Holiday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakHoliday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For Peak
 
DevOps and Cloud Native
DevOps and Cloud NativeDevOps and Cloud Native
DevOps and Cloud Native
 
Edge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live DemonstrationEdge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live Demonstration
 
Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06
 
Introduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth ProfileIntroduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth Profile
 
Why care about a CDN?
Why care about a CDN?Why care about a CDN?
Why care about a CDN?
 
Spoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetSpoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized Internet
 
DDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internetDDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internet
 
The Slow Death of Passwords
The Slow Death of PasswordsThe Slow Death of Passwords
The Slow Death of Passwords
 
IoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an HourIoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an Hour
 

Recently uploaded

leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 

Recently uploaded (20)

leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 

Edge 2016 barbarians at the gateway

  • 1. © AKAMAI - EDGE 2016 Barbarians at the Gate(way) Dave Lewis, Global Security Advocate
  • 2. © AKAMAI - EDGE 2016 Text #whoami Dave Lewis @gattaca dave@akamai.com
  • 3. © AKAMAI - EDGE 2016 Text
  • 4. © AKAMAI - EDGE 2016 Text
  • 5. © AKAMAI - EDGE 2016 Text
  • 6. © AKAMAI - EDGE 2016 Text
  • 7. © AKAMAI - EDGE 2016 Text We Found Him!
  • 8. © AKAMAI - EDGE 2016 Text å
  • 9. © AKAMAI - EDGE 2016 Text
  • 10. © AKAMAI - EDGE 2016 Text
  • 11. © AKAMAI - EDGE 2016 Text
  • 12. © AKAMAI - EDGE 2016 Text
  • 13. © AKAMAI - EDGE 2016 Text
  • 14. © AKAMAI - EDGE 2016 Text It left me wanting…
  • 15. © AKAMAI - EDGE 2016 Text Game Plan • Actors • Attacks • Tools • Trends • Data • Now what?
  • 16. © AKAMAI - EDGE 2016 Text Actors: For Hire
  • 17. © AKAMAI - EDGE 2016 Text Current(ish) prices on the Russian underground • Hacking corporate mailbox: $500 • Winlocker ransomware: $10-20 • Intelligent exploit bundle: $10-$3,000 • Hiring a DDoS attack: $30-$70/day, $1,200/month • Botnet: $200 for 2,000 bots • DDoS botnet: $700
  • 18. © AKAMAI - EDGE 2016 Text
  • 19. © AKAMAI - EDGE 2016 Text Actors: Bored Kids
  • 20. © AKAMAI - EDGE 2016 Text Bored Teens https://www.flickr.com/photos/ardinhasaphotography/8484164608/sizes/l
  • 21. © AKAMAI - EDGE 2016 Text
  • 22. © AKAMAI - EDGE 2016 Text Hacktivists https://www.flickr.com/photos/sklathill/2255718951/sizes/l
  • 23. © AKAMAI - EDGE 2016 Text Actors: Nation States
  • 24. © AKAMAI - EDGE 2016 Text Standard Villains There are
  • 25. © AKAMAI - EDGE 2016 Text Arch Villains And there are…
  • 26. © AKAMAI - EDGE 2016 Text Attacks
  • 27. © AKAMAI - EDGE 2016 Text Attack Vectors Over HTTP
  • 28. © AKAMAI - EDGE 2016 Text Attack Vectors Over HTTPS
  • 29. © AKAMAI - EDGE 2016 Text Types of Attacks SYN Floods UDP Floods ICMP Floods NTP Amplification HTTP Flood
  • 30. © AKAMAI - EDGE 2016 Text Attacks: Volumetric
  • 31. © AKAMAI - EDGE 2016 Text Your website can be overwhelmed…
  • 32. © AKAMAI - EDGE 2016 Text
  • 33. © AKAMAI - EDGE 2016 Text
  • 34. © AKAMAI - EDGE 2016 Text
  • 35. © AKAMAI - EDGE 2016 Text Attacks: Application Layer
  • 36. © AKAMAI - EDGE 2016 Text
  • 37. © AKAMAI - EDGE 2016 Text Application Layer DDoS
  • 38. © AKAMAI - EDGE 2016 Text
  • 39. © AKAMAI - EDGE 2016 Text
  • 40. © AKAMAI - EDGE 2016 Text
  • 41. © AKAMAI - EDGE 2016 Text Attacks: Extortion
  • 42. © AKAMAI - EDGE 2016 Text DD4BC Began by targeting sites with ransom demands Failure to pay lead to increased $$$ to stop the attack Earlier attacks focused on businesses that would avoid reporting the attacks to law enforcement. Once research published they relocated their campaigns to APAC
  • 43. © AKAMAI - EDGE 2016 Text
  • 44. © AKAMAI - EDGE 2016 Text More recently… • DD4BC continues to inform victims that they will launch a DDoS attack of 400-500 Gbps against them. • To date, DD4BC attack campaigns mitigated by Akamai have not exceeded 50 Gbps in size. • That’s up from the high of 15-20 Gbps observed
  • 45. © AKAMAI - EDGE 2016 Text
  • 46. © AKAMAI - EDGE 2016 Text
  • 47. © AKAMAI - EDGE 2016 Text Attacks: Amplification
  • 48. © AKAMAI - EDGE 2016 Text
  • 49. © AKAMAI - EDGE 2016 Text
  • 50. © AKAMAI - EDGE 2016 Text Tools
  • 51. © AKAMAI - EDGE 2016 Text Tools: Havij
  • 52. © AKAMAI - EDGE 2016 Text Tools: Donut
  • 53. © AKAMAI - EDGE 2016 Text Tools: Donut (con’t) GET / HTTP/1.1 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/msword, application/vnd.ms-powerpoint, application/vnd.ms-excel, */* Accept-Language: en-us Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.0.3705) Host: www.foo.bar Connection: Close
  • 54. © AKAMAI - EDGE 2016 Text Tools: HULK
  • 55. © AKAMAI - EDGE 2016 Text Tools: HULK (con’t) GET /?NJB=VURZQ HTTP/1.1 Accept-Encoding: identity Host: www.foo.bar Keep-Alive: 112 User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3) Gecko/20090913 Firefox/3.5.3 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Connection: close Referer: http://www.foo.bar Cache-Control: no-cache
  • 56. © AKAMAI - EDGE 2016 Text Tools: LOIC
  • 57. © AKAMAI - EDGE 2016 Text Tools: HOIC
  • 58. © AKAMAI - EDGE 2016 Text Tools: Brobot Brobot is a PHP trojan that allows an attacker to take control of a victim's compromised hosted Web server and use it to launch DDOS attacks.
  • 59. © AKAMAI - EDGE 2016 Text Tools: SSHowDown CVE-2004-1653
  • 60. © AKAMAI - EDGE 2016 Text Tools: Mirai
  • 61. © AKAMAI - EDGE 2016 Text
  • 62. © AKAMAI - EDGE 2016 Text Tools: WGET
  • 63. © AKAMAI - EDGE 2016 Text Trends
  • 64. © AKAMAI - EDGE 2016 Text Media Grandstanding
  • 65. © AKAMAI - EDGE 2016 Text Commoditization of DDoS https://www.flickr.com/photos/trophygeek/7309935684/sizes/l
  • 66. © AKAMAI - EDGE 2016 Text
  • 67. © AKAMAI - EDGE 2016 Text
  • 68. © AKAMAI - EDGE 2016 Text What’s your fancy?
  • 69. © AKAMAI - EDGE 2016 Text What’s a Booter? https://www.flickr.com/photos/chicagobart/4480217217/sizes/l
  • 70. © AKAMAI - EDGE 2016 Text OK, What’s a Stresser? Image Credit: Honda
  • 71. © AKAMAI - EDGE 2016 Text Stressers or Booters • xBOOT • Flash Stresser • Hyper Stresser • Grim Booter • Anonymous Stresser • Titanium Stresser / Lizards • Big Bang Booter…and so on.
  • 72. © AKAMAI - EDGE 2016 Text
  • 73. © AKAMAI - EDGE 2016 Text Some other highlights • DDoS agents targeting Joomla and other SaaS apps • A heap-based buffer overflow vulnerability in Linux systems • Attackers using new MS SQL reflection techniques • Data breaches fueling login attacks
  • 74. © AKAMAI - EDGE 2016 Text OK so, attribution? https://www.flickr.com/photos/45909111@N00/8519280338/sizes/l
  • 75. © AKAMAI - EDGE 2016 Text
  • 76. © AKAMAI - EDGE 2016 Text
  • 77. © AKAMAI - EDGE 2016 Text MEGA MEGA MEGA These large attacks all contained SYN floods 12:34:04.270528 IP X.X.X.X.54202 > Y.Y.Y.Y.80: Flags [S], seq 1801649395:1801650365, win 64755, length 970 ....E.....@...}.6.....6....Pkb......P...c......................................... ..........................<snip>..................................................
  • 78. © AKAMAI - EDGE 2016 Text DDoS: Function of Time
  • 79. © AKAMAI - EDGE 2016 Text Other Observations • SQLi • Local/Remote File Inclusion • IoT botnets coming to the forefront • PHP Injection • Malicious File upload • JAVA …best remote access platform ever!
  • 80. © AKAMAI - EDGE 2016 Text SQL Injection…still
  • 81. © AKAMAI - EDGE 2016 Text
  • 82. © AKAMAI - EDGE 2016 Text Why this is a problem
  • 83. © AKAMAI - EDGE 2016 Text
  • 84. © AKAMAI - EDGE 2016 Text Passwords
  • 85. © AKAMAI - EDGE 2016 Text
  • 86. © AKAMAI - EDGE 2016 Text File Inclusions
  • 87. © AKAMAI - EDGE 2016 Text Malicious Uploads • KCFinder file upload vulnerability • Open Flash Chart file upload vulnerability (CVE-2009-4140) • appRain CMF (uploadify.php) unrestricted file upload exploit (CVE-2012- 1153) • FCKeditor file upload vulnerability (CVE-2008-6178)
  • 88. © AKAMAI - EDGE 2016 Text Undead Army https://www.flickr.com/photos/scabeater/3272684874/sizes/o/
  • 89. © AKAMAI - EDGE 2016 Text So, what to do? • I might know a vendor that could help :-) • SQL INJECTION IS A SOLVABLE PROBLEM • Harden systems • Work with your ISP on mitigation strategies • Use ACL lists to deal with known bad IPs • IP Rate limiting • PATCH PATCH PATCH
  • 90. © AKAMAI - EDGE 2016 Text
  • 91. © AKAMAI - EDGE 2016 Text STATEOFTHEINTERNET.COM
  • 92. © AKAMAI - EDGE 2016 Text
  • 93. © AKAMAI - EDGE 2016 Text Thanks!
  • 94. © AKAMAI - EDGE 2016 Text Thanks for listening!
  • 95. © AKAMAI - EDGE 2016 Text Questions? Thanks Dave Lewis @gattaca dave@akamai.com