Join        Login             Stock Quote

Cross-Site Scripting Attacks Up 160 Percent in Final Quarter of 2012, Reveals FireHost

Tuesday, January 29, 2013 8:08 AM

http://media.marketwire.com/attachments/201301/TN-56488_Superfecta_Chart_Q3-Q4.jpgTrends among the Superfecta attack techniques are demonstrated between Q4 and Q3 2012http://media.marketwire.com/attachments/201301/TN-56487_Superfecta_Chart_all2012.jpgTotal percentage of the four attacks in the Superfectahttp://media.marketwire.com/attachments/201301/56481_firehostresized.gifhttp://at.marketwire.com/accesstracking/AccessTrackingLogServlet?PrId=979248&ProfileId=051205&sourceType=1

LONDON -- (Marketwire) -- 01/29/13 -- Secure cloud hosting company, FireHost, has today announced its Q4 2012 Web application attack statistics, detailing the type and number of cyberattacks blocked by its servers in the U.S. and Europe between October and December 2012. Throughout 2012, FireHost has blocked over 64 million malicious cyberattacks of all types, with Cross-Site Scripting being the most prolific 'Superfecta' attack type overall.

Each quarter, FireHost reports on the Superfecta -- a group of four cyberattacks that are the most dangerous -- and warns that both Cross-Site Scripting and SQL Injection attacks have become even more prevalent since the third quarter of 2012. The four attack types which make up the Superfecta, and which pose the most serious threat to the private information hosted in your database are Cross-site Scripting (XSS), Directory Traversal, SQL Injection, and Cross-site Request Forgery (CSRF).

Three out of the four Superfecta attack types rose in total count between Q3 and Q4 2012 -- only Cross-site Request Forgery attacks saw a drop in volume. However, the large increase in Cross-Site Scripting attacks, which rose from just over one million in Q3 2012 to 2.6 million in Q4, -- an increase of more than 160 percent -- seemingly dwarfs the other three attack types with 57 percent of the Superfecta. Cross-site scripting involves the insertion of malicious code into webpages in order to manipulate website visitors. It is used by attackers for a range of reasons, from simply interfering with websites to launching phishing attacks against web users.

"The change in frequency of the types of attack between quarters gives you an idea of how cybercriminals are constantly working to identify the path of least resistance," said Chris Hinkley, CISSP -- a senior security engineer at FireHost. "During Q4, ecommerce sites in particular would have been very busy with Christmas sales. Hackers will rapidly go after these high value targets with attacks that are highly automated and, if they are not yielding useful payloads, the attackers are equipped to quickly try a different type of attack. This is why it is important to have an understanding of the kind of traffic that is accessing your hosted infrastructure, so that you can make sure that malicious traffic is diverted and that there is less risk to sensitive data."

Throughout the whole year, FireHost blocked over 64 million malicious cyberattacks of all types, with Cross-Site Scripting being the most prolific Superfecta attack type overall, clocking in at 5.4 million blocked attacks.

As in Q3 2012, Europe is still the second most likely origin point for malicious traffic blocked by FireHost after North America, being the source of 13 percent of attacks. However, other regions have seen marked increases in the amount of attacks that are emanating from them, including Africa, Australia, and the Middle East. South and Central America were both the source of less malicious traffic between the most recent quarters.

Kevin Mitnick, a world renowned public speaker, author, and consultant on computer security issues has relied on FireHost to protect his own website since 2009. In the last year alone, FireHost has mitigated 108,000 malicious attempts against the hosting environment, a significant number of which fall into the Superfecta categories.

"It's good to know that FireHost is staying on top of these security threats and it's clear that their team is working very hard to protect customers against these attack vectors which are threatening them every minute," said Mitnick. "The escalating increase of XSS attacks in Q4 does not surprise me -- any teenager with a web application scanner can initiate these attacks in their free time. This increase does show, however, that when your servers are plugged in they are going to be probed -- likely within several minutes or so -- and that it's really important to work with a hosting provider like FireHost who can exercise due diligence on your behalf and keep you from being compromised."

The risks to businesses from the Superfecta varies and depends upon the kind of data that could be stolen in the event of a successful attack, according to Todd Gleason, director of technology at FireHost. "It's fairly obvious that, if you are a retailer or service provider dealing with private customer data or payment card details, your business will present an attractive target for hackers. That being said, we also see attacks that have the potential to simply deface or interfere with and disrupt websites and applications. Even though no data is lost, the reputation of a company can still be seriously damaged."

For more information about secure cloud hosting, please visit: http://www.firehost.com

About FireHost
FireHost is a secure cloud hosting company focused on protecting companies' sensitive data and brand reputations with an infrastructure built for security, scalability and performance. Customers with specific compliance or performance needs subscribe to FireHost's PCI, HIPAA or high traffic solutions, including some of the largest companies in the world as well as many fast growing eCommerce, SaaS and healthcare IT providers. FireHost provides services from Dallas, Phoenix, London and Amsterdam. http://www.firehost.com.

Follow FireHost on Twitter and the FireHost blog:

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2213414
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2213412

Media Contact:
Sarah Hawley
Ubiquity Public Relations
Email Contact

(Source: Market Wire )
(Source: Quotemedia)


Fundamental data is provided by Zacks Investment Research, and Commentary, news and Press Releases provided by YellowBrix and Quotemedia.
All information provided "as is" for informational purposes only, not intended for trading purposes or advice. iStockAnalyst.com is not an investment adviser and does not provide, endorse or review any information or data contained herein.
The blog articles are opinions by respective blogger. By using this site you are agreeing to terms and conditions posted on respective bloggers' website.
The postings/comments on the site may or may not be from reliable sources. Neither iStockAnalyst nor any of its independent providers is liable for any informational errors, incompleteness, or delays, or for any actions taken in reliance on information contained herein. You are solely responsible for the investment decisions made by you and the consequences resulting therefrom. By accessing the iStockAnalyst.com site, you agree not to redistribute the information found therein.
The sector scan is based on 15-30 minutes delayed data. The Pattern scan is based on EOD data.