Press Release: Q2 2012 FireHost Web Application Attack Report Shows Sharp Rise In SQL Injections

17 million cyber-attacks blocked between April and June by secure cloud hosting provider

London, UK – July 24, 2012 – Secure cloud hosting company, FireHost, has today revealed the latest statistical analysis of attacks successfully blocked by its servers located at data centers in the US and Europe.  During the period of April to June 2012, the web applications, databases and websites of FireHost’s customers – spread across 33 countries worldwide – were protected from a total of 17 million cyber attacks, of which more than two million were categorized as the most serious kind of attack, and among FireHost’s ‘Superfecta’.

The Superfecta is a group of four attack types considered by FireHost as being the most malicious and dangerous – they are Cross-site Scripting (XSS), Directory Traversals, SQL Injections, and Cross-site Request Forgery (CSRF).  One of the most significant changes in attack traffic seen by FireHost between Q1 and Q2 2012 was a 69% increase in SQL Injection attacks.  Rising from 277,770 blocked attacks in the first quarter, to 469,983 between April and June, this type of attack is frequently cited as an attack vector of choice for data thieves.

In simple terms, SQL Injection involves the entering of malicious commands into URLs and text fields on websites that happen to be vulnerable, usually in an attempt to steal the contents of databases storing valuable data such as credit card details or usernames and passwords.  The attack vector has been associated with many high profile data breaches, most famously Sony in 2011 and, more recently, it is suspected to be the method used by hackers to steal passwords from LinkedIn, eHarmony and Yahoo!.

“Many, many sites have lost customer data in this way,” said Chris Hinkley, CISSP – a Senior Security Engineer at FireHost.  “SQL Injection attacks are often automated and many website owners may be blissfully unaware that their data could actively be at risk.  These attacks can be detected and businesses should be taking basic and blanket steps to block attempted SQL Injection, as well as the other types of attacks we frequently see.”

The Superfecta attack traffic for Q2 2012 can be broken down as follows:

Similarly to Q1 2012, the majority of attacks FireHost blocked during the second calendar quarter of 2012 originated in the United States (14 million / 83%).  Southern Asia came in second with 8%, while Europe was in third, as the origin of 6% of malicious attack traffic seen by FireHost.

Varied trends among the Superfecta attack techniques from quarter to quarter are demonstrated between Q1 2012 and Q2:

As a result of the recent and high profile data breach incidents, more businesses are now familiar with the malice of cyber-attacks. FireHost warns them not to underestimate the scale at which automated attacks are launched by hackers on the poorly protected web pages of businesses of all sizes.

“One thing we can always expect is for the security threat landscape to change quickly and be very fluid. With so many moving parts, hosters and service providers need to ensure that transparency is a core element of their security strategy,” said Philbert Shih, managing director of Structure Research. “Companies that are able to provide real time customer data that can speak to market threats not only do right by their customers but contribute to the research community’s knowledge and understanding. Spotting a rise in SQL Injection hack attempts, for instance, is not something to overlook and should be seen as a warning to all who monitor this space.”

“Some of the data theft incidents that are reported in the media are precisely targeted, but a more substantial risk to most comes from an abundance of automated, malicious bots that attack websites in a more random fashion,” said Todd Gleason, Director of Technology at FireHost.  “Businesses should take readily available and basic steps to block any kind of unwanted traffic from accessing their sites.  Mitigating Denial of Service attacks and ensuring web applications are secure can go a long way toward fighting off these random attacks.”

For more information, please visit: http://www.firehost.co.uk

About FireHost

FireHost is a secure cloud hosting company focused on protecting sensitive data and companies’ brand reputations with infrastructure built for security, scalability and performance. Customers with specific compliance or performance needs subscribe to FireHost’s PCI, HIPAA or high traffic solutions, including some of the largest companies in the world, as well as many fast growing eCommerce, SaaS and healthcare IT providers. FireHost provides services from Dallas, Phoenix, London and Amsterdam.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

The Education Revolution: Cloud In The Classroom

The Education Revolution: Cloud In The Classroom

The Education Revolution: Cloud In The Classroom With the back-to-school season now upon us, parents, students and teachers everywhere are once again struggling with the perpetual challenge of making kids job-ready in a high-speed and fast-changing environment. There is little doubt in anyone’s mind that information technology plays a central role in all areas of life…

Monetization of the Internet of Things – Q&A With Brendan O’Brien

Monetization of the Internet of Things – Q&A With Brendan O’Brien

Q&A With Brendan O’Brien, Co-Founder of Aria Systems (Part 1) Monetization of the internet of things (IoT) is one of the most exciting and challenging issues facing the industry today, so we spoke with Brendan O’Brien to learn more. Brendan is the Co-Founder of Aria Systems, who are one of the leading innovators in recurring…

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About Latest Posts Follow Us!CloudTweaksEstablished in 2009,…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic –  The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the…

Featured Sponsors

The Internet of Everything Opens Up The World

The Internet of Everything Opens Up The World

Shaping The World With New Technologies As a connected collection of intelligent objects, the Internet of Everything promises to open up those areas of the world hardest hit by economic, political and agricultural blights. Relatively inexpensive devices, paired with revolutionary energy sources and unprecedented access to information offer great promise to farmers and workers in…

Salesforce Service Cloud: Air Traffic Control For Your Customer

Salesforce Service Cloud: Air Traffic Control For Your Customer

Salesforce Service Cloud One of the greatest benefits of the increasingly reliable and ubiquitous state of cloud technology is the removal of business silos and the consolidation of information flow, both in-house and on the road. This is of particular importance to the many different types of professionals whose work involves customer relationship management (CRM).…

Sponsors

Built For The Cloud vs. Adapting To The Cloud

Built For The Cloud vs. Adapting To The Cloud

Built For The Cloud vs. Adapting To The Cloud It may just sound like semantics, but there is a real difference between something that was “built for” versus “adapted to.” Would you rather buy a house that was “designed for” energy efficiency or one that was “adapted to” be energy efficient? “Built for” describes a…

Placement Opportunities - Find Out!

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter