Google Hacks: The Internet 'Storms'

Share it on Twitter  
Share it on Facebook  
Share it on Google+
Share it on Linked in  
Windows, Linux or Mac -- does operating system or platform matter to hackers? Not necessarily, according to research from Fortify Software, an application security provider.

In a new report, the firm said hackers aren't necessarily targeting operating systems but rather applications themselves, a scenario that Fortify describes as bot "storms" in which applications are targeted.

Over a six-month period, Fortify analyzed nearly three million requests for sites that use its Application Defense product. Fortify's analysis identified two key tools used by hackers: bots and Google hacks. They represented the majority of attacks they recorded.

Fortify found that, on average 50 to 70 percent of attacks came from bots. Bots and Botnets are large groupings of compromised computers that attack targets at the command of the botnets leader. The bots were apparently searching for known vulnerabilities.

Vulnerabilities were also found by hackers via search engines such as Google. Google Hacking is a term used to describe hackers using sophisticated search queries to locate vulnerable sites and applications. According to Fortify, 20 to 30 percent of the attacks it recorded as part of its six-month study came as a result of some form of search engine hacking.

Fortify's study did not find that any particular operating system was more targeted than any other.

"With respect to platforms, it's not necessarily an operating system game," Brian Chess, chief scientist at Fortify Software, told internetnews.com. "We most frequently saw attempts to attack known PHP vulnerabilities. We certainly also observed our fair share of attempts to stuff dll's onto Web servers with the anticipation that they were Windows machines, but the 'application layer' was more of the target."

Chess noted that Fortify found many buffer overflow, SQL injection and command injection techniques used by hackers; the study didn't focus on the vulnerability so much as the attack techniques.

This article was first published on InternetNews.com. To read the full article, click here.

Submit a Comment

Loading Comments...