Do you have a site? read the survey for your visitors

There are many who say that their websites are safe. Why; "Who will bother attacking my site?" or "Our business is too small to be attacked."

There is perhaps this myth that cyber attackers always target specific pages. They do not. Yes, there are some who do, but most attacks are made by bots who know nothing about you, your business or your page.

According to security company Imperva, half of the visitors to a website are bots. Of these, about 29% of all your "visitors" come to attack your site, according to ZDNet's Steven J. Vaughan-Nichols.website

Contrary to those who believe that their site is too small, the security company Imperva tried to examine sites with the least traffic. According to the company, the less traffic a page has, the more likely it is to be attacked.

"In the less common domains - those frequented by ten visitors (people) a day or less - the 'bad' bots accounted for 47,7% of the visits, while the total bot traffic was 93,3%."

Indeed, "bad bots will try to hack [your site] no matter how popular it is, and bots will continue to visit a domain even if there is no human traffic."

Sounds crazy to you? For humans they may be, but bots are not humans. They are constantly scanning the web for attacks over and over again.

Let's look at the data from Honeynet, an international research firm μη κερδοσκοπικού χαρακτήρα, που με τη βοήθεια φοιτητών από το Holberton , recently created a honeypot to monitor security attacks on a web server in the cloud (PDF).

The server was running Amazon Web Services (AWS), and there was no service that would be useful to someone else. It did not even have a domain name.

Shortly after starting the server, they started capturing network packets for a 24-hour period with the best network traffic analysis tool that is today, the Wireshark.

They then analyzed the package commitment file with Wireshark. the Computer Incident Response Center (CIRCL), the Border Gateway Protocol (BGP) ranking API and p0f, a passive TCP / IP traffic fingerprinting application.
In one day, in just 24 hours, this anonymous and almost invisible received more than 250.000 attacks. Think about it and start locking your page.

Of these attacks, the vast majority, 255.796 attempts to connect, were made through Secure Shell (SSH).

The researchers immediately created a honeypot on the server designed to look like a real site to collect attack data. To keep the project operational, they chose to open HTTP (Hypertext Transfer Protocol), SSH and the Telecommunications Network (Telnet) for attacks.

Telnet; Who Uses Telnet Anymore? Thanks to the poorly designed devices of the Internet of (IoT), το telenet ζει και βασιλεύει. Μερικά gadgets του IoT χρησιμοποιούν το Telnet για διαχείριση και το Telnet δεν ήταν ποτέ ασφαλές.

Most of the HTTP attacks took place on PHPMyadmin, a popular MySQL and MariaDB management system. Many web content management systems, such as WordPress, use these databases. Vulnerable WordPress plug-ins also offer a good gateway to malicious bots.

Many of the attack attempts use old malware, known configuration problems, and common combinations of usernames and passwords from previously known attacks. For example, the attackers attempted to hack the server with Shellshock, although it was patched in 2014 and the Apache Struts vulnerability, which was fixed in March 2017. attack.

"99,99% of security incidents are from vulnerabilities that have been resolved."

As for SSH, most of the attacks were brute-force attacks, which used lists of commonly used usernames and passwords on TCP ports.

Is it a coincidence that Imperva found that one in three visitors to a website is from an attacking bot?

These attacks are not sophisticated. They are made by bots and botnets and hit as many pages as they can find. These automated hackers target weak, unprotected sites.

The lesson of this story is that if you have an internet presence you should follow basic safety rules. Using a firewall, instant updates, and disabling services you do not use should become a habit, as each website receives thousands of attacks on a daily basis.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).