Akamai Diversity
Home > Web Security

Recently in Web Security Category

Akamai is aware of a recently disclosed vulnerability in OpenSSL that can be exploited to perform denial of service attacks against any system which processes public keys, certificate requests, or certificates.

The announcement for CVE-2015-1788 (discovered by Joseph Barr-Pixton and fixed by Andy Polyakov of the OpenSSL development team) and CVE-2015-1789 (discovered independently by Robert Swiecki and Hanno Böck) can be found here. The fix was developed by Emilia Käsper of the OpenSSL development team.

In Akamai's most recent SOTI (State of the Internet) Security Report (Download the Q1 2015 report here), two areas of research focused on the most frequent attack types by target industry, and DDoS attack distribution between Q1 2014 and the same period a year later.

Since the report's release, we've delved deeper into the data and came up with two charts showing a more granular view based on Fig. 1-4 and 1-7 within that report.

By Richard Willey, Senior Program Manager - Adversarial Resilience

Akamai maintains a database that records information about different attacks it has observed.  The ongoing analysis of that database is captured each quarter in Akamai's State of the Internet Security Report. (Download the Q1 2015 report here.) But even after a report is released, researchers continue to dig deeper into the data and provide updates.

To that end, this article describes an exploratory data analysis exercise of attacks captured by PLX Routed and Proxy DDoS solution scrubbing centers between Q1 2013 and Q1 2015.

Akamai, Trustwave Form Strategic Alliance

Akamai has announced a new strategic alliance with Trustwave, designed to help businesses more effectively fight myriad threats through vulnerability assessment, denial-of-service prevention and incident response.
From the press release:

"Through this partnership, Akamai and Trustwave plan to make available to their respective customers select technology solutions and security services from each company's portfolio. The strategic relationship is intended to allow both companies to provide a broader set of cyber security protections to meet a wide range of customer requirements in a constantly changing cyber security threat landscape."

In a new bulletin released this morning, Akamai researchers outlined a threat in which malicious actors use vulnerabilities in third-party plug-ins to target the large websites that utilize them. Such exploits require little technical skill and are highly effective.

Instead of targeting a high-traffic website directly, attackers simply target the third-party advertising company, content network or provider used by the site.

High-profile sites are common targets and their security posture is tougher than the average site. But they also use third-party content providers whose security is less than ideal. Those who manage a major website put a lot of effort into fortifying the front entrance. But the third-party content they use are like open windows in the back of the building.

Akamai CSIRT Manager Mike Kun described the problem in this podcast recently.

In the past years we have seen an increase in distributed attacks against web applications. By using many attacking resources to target the same destination, attackers are obscuring their identity while boosting attack bandwidth, placing a greater challenge to defensive forces. Most of the distributed attacks use "volumetric" methods such as Distributed Denial of Service (DDoS) or brute force techniques such as "slow and low" to attack web applications.

In this episode, State of the Internet Security Podcast host Bill Brenner chats with Akamai CSO Andy Ellis about the findings in Akamai's Q1 2015 State of the Internet - Security Report.

Specifically, they discuss how:

  • Q1 2015 set a record for the number of DDoS attacks observed across the PLXrouted and proxy mitigation platforms - more than double the number recorded in Q1 2014 - and a jump of more than 35 percent compared to last quarter.
  • Simple Service Discovery Protocol (SSDP) attacks were the top attack vector Akamai mitigated, comprising more than 20 percent of DDoS attacks. This was an increase of 6 percent compared to the previous quarter.
  • The online gaming sector was once again hit with more DDoS attacks than any other industry.
  • Q1 2015 saw Akamai aggressively moving away from the use of SSL in favor of TLS. This is noteworthy, since SSL flaws were at the heart of some of the vulnerabilities Akamai has dealt with in recent months.
  • A majority of web application attacks in Q1 were attributed to LFI and SQLi exploits. The retail sector was hardest hit by those attacks, followed by media, entertainment, hotel and travel companies.

Listen to the episode.

Akamai Statement on the Logjam Vulnerability

In response to the Logjam vulnerability discussed in this disclosure, Akamai is continuing to analyze its production servers to determine if it supports the relevant Diffie-Hellman ciphers that would leave customers vulnerable to Logjam.

We have determined that Akamai hosts on our Free Flow and Secure Content Delivery Networks are not vulnerable. 

We do recommend customers check their origin. We also recommend that anyone using a web browser, running a server or developing relevant software read the "What should I do?" section of this advisory.

If our investigation uncovers additional risks, we will provide follow-up blog posts and Luna advisories to update customers on how we are affected and what we're doing about it.

Other resources
We recommend people read this OpenSSL post on upcoming changes related to Logjam and FREAK.
Today we release the Q1 2015 State of the Internet Security Report. You can grab it here, but we've been previewing it for the last few weeks in the Akamai Blog:

Q1 2015 SOTI Security Preview: 7 Attack Vectors

In this final preview before the report's release, we look at the most-used attack vectors for the quarter.

Coming Soon: The Q1 2015 State of the Internet Security Report

Among the Q1 2015 highlights:

  • We saw a record number of DDoS attacks recorded on the Prolexic network - more than double what was reported in Q1 2014.
  • The profile of typical attacks changed. 
  • Last year, high bandwidth, short-duration attacks were the norm. This time, the typical DDoS attack was less than 10 Gbps and lasted for more than 24 hours. 
  • SSDP attacks -- absent in Q1 2014 -- came on strongly in Q1 2015. 
  • The proliferation of unsecured home-based, Internet-connected devices using the Universal Plug and Play (UPnP) Protocol has made them attractive attack targets.

Q1 2015 SOTI Preview: Significance of a 100 GBPS Attack

Today, we look at the significance of a 100 GBPSattack.

Q1 2015 SOTI Preview: Website Defacements and DNS Hijacking

Today, we look at the continuing trend of website defacements and DNS Hijacking.

Q1 2015 SOTI Preview: IPv6 Security Challenges

The potential security risks of widespread IPv6 adoption.

The past fortnight has been a hectic period for Akamai's security teams in Australia and New Zealand. We've been approached by a number of financial organisations, and large and medium sized business to help mitigate DDoS threats from DD4BC. If you're not familiar with DD4BC, here is a updated writeup on their extortion attempts by Bill Brenner