Cybercriminals targeting web applications have grown more reliant on automated tools as nearly 20 percent of the attacks detected were fuzzing attacks, trying to find the points at which applications break to exploit, a report said on Wednesday. Fuzzing is the usually automated process of finding hackable software bugs by randomly feeding different permutations of data into a target program until one of those permutations reveals a vulnerability.
The cloud-enabled security solutions provider Barracuda Networks that analyzed a sample of two months of blocked data on web application attacks in the month of November and December found that the top five attacks using automated tools were fuzzing attacks, injection attacks, fake bots, App DDoS, and blocked bots.
Follow NewsGram on LinkedIn to know what's happening around the world.
"While analyzing the current state of encryption, our researchers identified that even though it can prevent a variety of attacks like man-in-the-middle, and provides one layer of protection for users visiting websites, attacks can still occur within the stream," Murali Urs, Country Manager-India, Barracuda Networks, said in a statement.
The top five attacks using automated tools were fuzzing attacks, injection attacks, fake bots, App DDoS, and blocked bots. MangoMatterMedia/Pixabay
After fuzzing attacks, injection attacks were the next at about 12 percent, and most of the attackers were using automated tools like sqlmap to try getting into the applications. Automated attacks use bots to try to exploit vulnerabilities in web applications. These attacks can range from fake bots posing as Google bots to avoid detection to application DDoS trying to crash a site by subtly overloading the application, the report said.
Bots pretending to be a Google bot or similar accounted for just over 12 percent of the web application attacks. Application DDoS (distributed denial of service) was surprisingly dominant, making up more than 9 percent of the sample the team analyzed.
An overwhelming number of data exfiltration attempts seen in the sample were for credit card numbers and social security numbers, etc. Visa was the clear focus, accounting for more than three-quarters of these attacks. This was followed distantly by JCB with more than 20 percent and Mastercard, Diners, and American Express at much smaller volumes, the report said. (IANS)