Threat of DDoS and web application attacks more real than ever
FYI, this story is more than a year old
The threat from DDoS and web application attacks isn’t going away - in fact, repeat attacks are becoming the norm, according to Akamai Technologies’ Q4 2015 State of the Internet Security Report.
The quarterly report provides analysis and insight into malicious activity observed across the Akamai Intelligent Platform and provides a view of the global cloud security threat landscape.
"Each quarter, the number of attacks against Akamai customers continues to surge. This quarter, the number of web application attacks jumped 28% while DDoS attacks increased 40% compared with Q3," says Stuart Scholly, Akamai Security Business Unit senior vice president and general manager.
"And malicious actors aren't backing down. They're hammering away at the same targets over and over again, looking for a moment when defences may be down,” he says.
During Q4, repeat DDoS attacks were the norm, with an average of 24 attacks per targeted customer in Q4. Three targets were subject to more than 100 attacks each and one customer suffered 188 attacks - an average of more than two per day.
DDoS attack activity at a glance
During Q4, Akamai mitigated more than 3,600 DDoS attacks across the routed solution, more than twice the number of attacks seen a year ago. The vast majority of these attacks were based on stresser/booter-based botnets.
These DDoS-for-hire attacks rely heavily upon reflection techniques to fuel their traffic, and aren't as capable of generating large attacks. As a result, Akamai says it saw fewer of the mega-attacks than it did a year ago. Also, stresser/booter sites typically have time limits on their use, which contributed to a decrease in the average attack duration to just less than 15 hours.
Infrastructure layer attacks have dominated for several quarters, accounting for 97% of the attacks observed during Q4. Furthermore, 21% of DDoS attacks contained UDP fragments in Q4 2015. Some of this was a direct result of the amplification factor included in reflection-based attacks, primarily from the abuse of CHARGEN, DNS, and SNMP protocols, all of which have potentially large payloads, Akamai says.
The number of NTP and DNS attacks have increased dramatically compared to Q3. DNS reflection attacks increased 92% as malicious actors sought to abuse domains with built-in security (DNSSEC), since these usually offer larger response data. NTP, with an almost 57% increase, gained popularity over the previous quarter despite the fact that NTP reflection resources have been depleted over time.
Another trend is the increased use of multi-vector attacks. In Q2 2014, only 42% of DDoS attacks were multi-vector; in Q4 2015, 56% of the DDoS attacks were multi-vector. While most multi-vector attacks only used two vectors (35% of all attacks), 3% of the attacks observed in Q4 used five to eight vectors, Akamai says.
The largest attack of Q4 peaked at 309 Gigabits per second (Gbps) and 202 Million packets per second (Mpps). This attack targeted a customer in the software and technology industry and used an unusual combination of SYN, UDP and NTP attacks originating from the XOR and BillGates botnets. The attack was part of a sustained campaign in which the victim was targeted 19 times over an eight-day period, with additional attacks following in early January.
More than half of the Q4 attacks (54%) targeted gaming companies, with another 23% targeting the software and technology industry, the study found.
Web application attack activity
While the number of web application attacks increased by 28% over the last quarter, the percentage of web application attacks sent over HTTP vs. HTTPS has remained relatively consistent for two quarters - 89% via HTTP in Q4 vs. 88% via HTTP in Q3.
The most frequently observed attack vectors for the quarter were LFI (41%), SQLi (28%) and PHPi (22%), followed by XSS (5%) and Shellshock (2%). RFI, MFU, CMDi, and JAVAi attacks comprised the remaining 2%. The relative distribution of the attack vectors over HTTP vs. HTTPS was similar, with the exception of PHPi; PHPi was seen in just 1% of the attacks over HTTPS.
In fact, 59% of the Q4 web application attacks targeted retailers, vs. 55% in Q3. The media and entertainment, and hotel and travel industries were the next most frequently targeted, with 10% of the attacks each. This represents a change from Q3, when the financial services industry was the second most-targeted industry (15% of attacks), compared with just 7% of the attacks this quarter, Akamai finds.
Scanning and probing activity
Malicious actors rely on scanners and probing to perform reconnaissance on their targets before launching attacks. Using firewall data from the perimeter of the Akamai Intelligent Platform, the analysis showed the most popular ports for reconnaissance were Telnet (24%), NetBIOS (5%), MS-DS (7%), SSH (6%), and SIP (4%).
The top three sources of scanning activity were all located in Asia, as determined by ASN. The report also saw active scanning for reflectors to abuse, including NTP, SNMP, and SSDP.
By looking at the top reflection sources by ASN, Akamai saw that the most heavily-abused network reflectors were Asian countries. While most SSDP attacks tend to be from home connections, NTP, CHARGEN, and QOTD are generally from cloud hosting providers where those services run, the report finds. SSDP and NTP reflectors were the most often abused reflectors at 41% each, followed by CHARGEN (6%) and RPC (5%). SENTINEL and QOTD followed at 4% each.