Akamai Diversity

The Akamai Blog

Q1 2015 SOTI Security Preview: 7 Attack Vectors

We continue to preview sections of the Q1 2015 State of the Internet Security Report (SOTI Security) due out later this month. So far, we've told you about the continuing trend of website defacements and DNS Hijacking, the potential security risks of widespread IPv6 adoption, and the significance of a 100 GBPS attack. We've also given an overview of Q1 DDoS activity.
In this final preview before the report's release, we look at the most-used attack vectors for the quarter.

The following seven attack vectors accounted for the lion's share of web application attacks observed on the Akamai Edge network.

SQLi / SQL injection is an attack where user content is passed to an SQL statement without proper validation.

LFI / Local file inclusion is an attack where a malicious user is able to gain unauthorized read access to local files on the web server.

RFI / Remote file inclusion is an attack where a malicious user abuses the dynamic file include mechanism, which is available in many programming languages, and loads remote malicious code into the victim web application.

PHPi / PHP injection is an attack where a malicious user is able to inject PHP code, which gets executed by the PHP interpreter.

CMDi / Command injection is a vulnerability where a malicious user has the ability to execute arbitrary shell commands on the target system.

JAVAi / OGNL injection is an attack where a malicious user injects Java code, abusing the OGNL Java Expression Language. This kind of attack became very popular due to recent flaws in the Struts Framework.

MFU / Malicious file upload (or unrestricted file upload) is a type of attack where a malicious user uploads unauthorized files to the target application. These potentially malicious files can later be used to gain full control over the system.

To read the full story, pre-register for your copy of the Q1 2015 State of the Internet Security Report.

Leave a comment