This document summarizes trends in web application attacks from August 2011 to March 2012 based on data from DreamHost's web application firewall. It finds that most attacks originate from compromised hosting providers and datacenters and are automated. The motivations for attackers are financial gain through installing backdoors and monetizing traffic through techniques like phishing, spam, and traffic theft. It also provides examples of various types of backdoors found on websites and recommendations for auditing systems to detect backdoors through file monitoring and log analysis.