Imperva: Companies should secure their websites before worrying about DDoS attacks from Anonymous

An Imperva report shows that Anonymous hacktivists will first try to break into the website before overwhelming it with traffic

Organizations that look to protect themselves against attacks launched by the Anonymous hacktivist collective should make sure that their Web applications are secure before deploying anti-DDoS (distributed denial-of-service) solutions, says security firm Imperva in a new report.

The report analyzes a 2011 Anonymous attack against an organization that Imperva declined to name, but claims is well-known. "This is the first time we're aware of someone chronicling, from cradle to grave, a full Anonymous attack," said Rob Rachwald, director of security strategy at Imperva, in a blog post on Friday.

The entire Anonymous operation lasted 25 days, but 18 of those were dedicated to the recruitment of supporters through various social media websites like Facebook, Twitter or YouTube.

Given the decentralized nature of Anonymous, anyone can start an action in the group's name. However, for it to have any real effect, it needs to be promoted and eventually supported by a considerable number of individuals.

Following the recruitment phase, 10 to 15 skilled hackers began performing reconnaissance by scanning the targeted organization's websites for vulnerabilities like SQL injection, cross-site scripting (XSS) and directory traversal.

"There was an extensive usage of various automated tools for web application vulnerability scanning," Imperva said in its report. "These scanners are general 'off-the-shelf' products and weren't coded specifically for this attack."

Anonymous members have learned from previous operations that data breaches have a bigger impact on companies than DDoS attacks, so they will first try to hack into their websites, Imperva said. "Possible attack victims should make it their priority to mitigate application vulnerabilities, even before mitigating DDoS attacks."

One thing that distinguishes hacktivists from financially motivated attackers is that hacktivists generally announce their plans publicly, which gives targeted organizations time to prepare, said Amichai Shulman, Imperva's CTO, in a phone interview. Companies should therefore monitor websites like Facebook, Twitter, Pastebin or YouTube in order to learn of potential attacks against their infrastructures.

Analyzing the server logs while the attackers are performing reconnaissance is also very important because it gives organizations an idea of what kind of attacks to expect and how to block them, Imperva said in its report.

Anonymous was viewed as little more than a nuisance a couple of years ago, but has since grown to be considered a real threat. Experts from various cybersecurity companies, including Imperva, are expected to speak about Anonymous and hacktivism at the RSA Conference 2012 in San Francisco this week.

In the overall picture they are still a nuisance because their attacks are pretty basic and are temporary, Shulman said, adding that Imperva detects more sophisticated and persistent attacks from financially motivated hackers every day. However, Shulman agreed that Anonymous is a lot louder and its actions get more publicity.

Recommended

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?