Imperva Launches Hacker Intelligence Initiative
Two New Hacking Schemes Uncovered Using Surveillance & Hack-Back Techniques(PresseBox) ( London, )
"Today, security research focuses heavily on vulnerabilities and problems. But to truly protect an organization, security professionals must have a deep understanding of their enemy," said Amichai Shulman, Imperva's CTO, referencing Sun Tzu's observation, 'If ignorant both of your enemy and yourself, you are certain to be in peril.'
Imperva's HII researchers will conduct and release research on attacks as they are uncovered. To date, the HII has released research on four significant cybercrime activities, among others:
- Pyramid-Scam Phishing Scheme: Employing simple hackback techniques, Imperva uncovered a pyramid scamstyle phishing scheme where a sophisticated hacker siphons data from individual phishing attacks through a backdoor in a phishing kit; the attack also capitalizes on a second dropserver to store stolen data.
- Startto-Finish Execution of a Cross-Site Scripting Attack: By observing the hacker's own vulnerable code, Imperva was able to witness a XSS attack impacting 3000 individuals; Imperva found that XSS attacks require little expertise and less than an hour to carryout when using readily available tutorials and free hosting sites.
- New Type of DDoS Attack: By monitoring a TOR, Imperva traced DDOS attacks to find that, unlike traditional botnets made up of infected PCs, the attacks were leveraging a botnet of infected servers, creating a stronger, more effective and lessdiscoverable attack.
- The publication of 32 million passwords: By monitoring hacker forums, Imperva uncovered a list of user passwords for the popular site RockYou and provided analysis of the most commonly used words and phrases.
"Cybercrime is a business like any other," continued Shulman. "Hackers are becoming more automated and their techniques are sophisticated and industrialized. Modern cyber defenses need to keep pace with this growing industry and our intelligence initiative will help uncover the trends, techniques and tactics utilized by today's cybercriminals."