Connect with us

Hi, what are you looking for?

HEADLINES

Security report shows botnets shift focus to credential abuse

Credit: The Digital Artist | Pixabay

Credit: The Digital Artist | Pixabay

Newly released data that analyzed more than 7.3 trillion bot requests per month found a sharp increase in the threat of credential abuse, with more than 40 percent of login attempts being malicious, according to the Fourth Quarter, 2017 State of the Internet / Security Report released by Akamai Technologies, Inc. 

According to the Ponemon Institute, credential stuffing attacks can cost businesses as much as $2.7 million on an annual basis. In addition, Akamai’s data further indicates that DDoS attacks remain a consistent threat and the Mirai botnet is still capable of strong bursts of activity.

Akamai researchers have seen recent hacker activity turning to exploit remote code execution vulnerabilities in enterprise-level software to make enterprise systems part of the botnet threat. For example, hackers have been exploiting vulnerabilities in the GoAhead embedded HTTP server—which has 700,000 potential targets—and Oracle WebLogic Server. Aided by the disclosure of Spectre and Meltdown earlier this year, both vulnerabilities open the door to a new wave of attacks, including the surreptitious installation of crypto mining programs that tie up computing resources.

“A key motive of attackers has always been financial profit. In the past few years, we have seen adversaries move to more direct methods to achieve that goal such as ransomware,” said Martin McKeay, senior security advocate and senior editor, State of the Internet / Security Report. “Crypto mining offers attackers the most direct avenue to monetize efforts by putting money immediately into their cryptowallets.”

Akamai’s findings also confirmed that the total number of DDoS attacks last quarter (Q4 2017) increased 14 percent from the same time last year (Q4 2016). While previous reports from this year showed the intensity of the Mirai botnet fading, Akamai saw a spike of nearly 1 million unique IP addresses from the botnet scanning the Internet in late November, showing that it is still capable of explosive growth.

Hospitality industry is biggest target of fraudulent credential attacks

Advertisement. Scroll to continue reading.

The hospitality industry suffered as the biggest target of fraudulent credential attacks, with 82 percent of their login attempts being from malicious botnets.

The financial industry saw a sharp increase in the number of DDoS attacks, experiencing 298 DDoS attacks against 37 distinct organizations last quarter.

Application layer DDoS attacks such as GET, PUSH and POST floods increased in volume in Q4 by 115 percent since Q3.

There was a 31 percent increase in DDoS attacks sourcing from the U.S. last quarter (Q4 2017) compared to the same timeframe last year (Q4 2016).

Akamai saw 146 Petabytes of traffic in November and 145 Petabytes in December of bot traffic alone, which translates to approximately 550 Mbps.

Advertisement. Scroll to continue reading.

Akamai mitigated 4,364 attack events on the routed platform in the fourth quarter of 2017. In total, Akamai experienced 15,965 attack events throughout 2017.

Bot Activity Drives Rising Threat of Credential Stuffing

On a typical day, Akamai monitors more than 2,750 bot requests per second, which accounts for more than 30 percent of all pure web traffic (excluding video streaming) across its platform. While much of that bot activity is legitimate, cybercriminals are increasingly leveraging bot activity for malicious use. For example, many of the botnets traditionally responsible for DDoS attacks are being used to abuse stolen login credentials. Of the 17 billion login requests tracked through the Akamai platform in November and December, almost half (43 percent) were used for credential abuse.

“Increased automation and data mining have caused a massive flood of bot traffic to impact websites and Internet services. Although most of that traffic is useful for Internet businesses, cybercriminals are looking to manipulate the powerful volume of bots for nefarious gains,” said McKeay. “Enterprises need to watch who is accessing their sites to differentiate actual humans from both legitimate and malicious bots. Not all web traffic and not all bots are created equal.”

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

For Gen Z, sharing life moments online is second nature. Social media platforms like Instagram, TikTok and Snapchat are filled with geotagged selfies, daily...

HEADLINES

The NTSC is an industry-wide alliance of corporate security professionals representing the country’s major telecommunications companies, including PLDT Inc., Smart Communications, Inc., Globe Telecom,...

HEADLINES

Globally, almost one in four report losses exceeding $5,000,000, and for some, it surpasses $10,000,000. These findings were revealed in a joint study conducted...

HEADLINES

In a new report covering Q2 2024 – Q1 2025, Kaspersky has found over 250,000 cyberattacks disguised as popular anime among other shows and streaming platforms...

HEADLINES

From January to December 2024, Kaspersky solutions used by businesses here detected and blocked more than 53 million bruteforce attacks. 

HEADLINES

According to Kaspersky experts, 2024 saw over 3 billion malware attacks globally, with a daily average of 467,000 malicious files detected. Windows systems were...

HEADLINES

Cybercriminals target SMBs, schools, and other smaller organizations because they often have less robust security compared to large corporations and other institutions. 

HEADLINES

Sophos Counter Threat Unit revealed the NICKEL TAPESTRY threat group’s scheme involving fraudulent workers operating on behalf of North Korea (formally known as the...

Advertisement