Cybercriminals using automated tools to launch attacks: Report

Cybercriminals targeting web applications have grown more reliant on automated tools, a report said on Wednesday

Sebi embraces new-age tools for information to prevent insider trading
Representational image
IANS New Delhi
2 min read Last Updated : Feb 17 2021 | 2:54 PM IST

Cybercriminals targeting web applications have grown more reliant on automated tools as nearly 20 per cent of the attacks detected were fuzzing attacks, trying to find the points at which applications break to exploit, a report said on Wednesday.

Fuzzing is the usually automated process of finding hackable software bugs by randomly feeding different permutations of data into a target programme until one of those permutations reveals a vulnerability.

The cloud-enabled security solutions provider Barracuda Networks that analyzed a sample of two months of blocked data on web application attacks in the month of November and December, found that the top five attacks using automated tools were fuzzing attacks, injection attacks, fake bots, App DDoS and blocked bots.

"While analyzing the current state of encryption, our researchers identified that even though it can prevent a variety of attacks like man-in-the-middle, and provides one layer of protection for users visiting websites, attacks can still occur within the stream," Murali Urs, Country Manager-India, Barracuda Networks, said in a statement,

After fuzzing attacks, injection attacks were the next at about 12 per cent, and most of the attackers were using automated tools like sqlmap to try getting into the applications.

Automated attacks use bots to try to exploit vulnerabilities in web applications. These attacks can range from fake bots posing as Google bots to avoid detection to application DDoS trying to crash a site by subtly overloading the application, the report said.

Bots pretending to be a Google bot or similar accounted for just over 12 per cent of the web application attacks. Application DDoS (distributed denial of service) was surprisingly dominant, making up more than 9 per cent of the sample the team analyzed.

 

An overwhelming number of data exfiltration attempts seen in the sample were for credit card numbers and social security numbers, etc.

Visa was the clear focus, accounting for more than three-quarters of these attacks. This was followed distantly by JCB with more than 20 per cent and Mastercard, Diners, and American Express at much smaller volumes, the report said.

--IANS

vc/bg

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

Topics :cybercrimescybersecurityHacking

First Published: Feb 17 2021 | 2:50 PM IST

Next Story