Статті на англ
Статті на англ
Статті на англ
Abstract
Today, the Internet is developing very rapidly, and the blogosphere is an integral
part of this process. And at the same time, it is at the forefront of the development
of the Network, because develops most dynamically - the number of blogs doubles
every six months. According to the latest data, the size of the Blogosphere is more
than 70 million blogs. And according to data for 2007, on average, 120,000 new
blogs are created every day (or 1.4 blogs every second).
At the same time, blogs are the most active part of the Internet. In 2007, an average
of 1.5 million posts were published per day (or 17 posts per second). And some
blogs are even included in the 50 most popular world news web resources.
And all owners of blogs, as well as all owners of websites, need to think about the
security of their resources. Security is an important component of the life of any
web resource, which is often forgotten (especially by bloggers). And the security
level of today's networks is very low.
Now, in the era of Web 2.0, they are beginning to think about the future of the
Internet - about Web 3.0. And that's why this topic is being raised now (in 2006
and 2007). I myself started thinking about the third web back in early 2006. And
not just to think, but to take real steps to approach the era of Web 3.0. And I work
in two directions - which I attribute to the components of Web 3.0.
The security of blogs, an important component of the World Wide Web, also needs
to be monitored, because the number of blogs is huge and rapidly growing, as well
as the huge number of security threats, which is growing instead of with the
growth of the Blogosphere.
1. Comment spam.
2. Spam trackback.
3. Conjunctions.
At the same time, the blogs themselves can be divided into two groups: blog-sites
(on independent hosting) and blog-diaries (on blog-services). Different types of
threats appear both in both groups of blogs and have their own characteristics in
each of the groups.
Regarding external threats. All bloggers face comment spam. And depending on
the tools used, this problem is solved at the expense of the blog owner's time. Only
by using active security tools, such as Captcha, can you really fight against
spam. But even this will not solve the problem - something else I will say at the
end of the report. Trackback spam is also spreading more and more, but it is
mainly encountered by the owners of blog sites, and various methods can be used
to combat this problem. As for splogs (spam blogs), this problem also becomes
relevant. According to the latest data, 3,000-7,000 new syllables are created every
day. And the owners of blogs themselves cannot fight this - search systems
(including blog search engines) are engaged in this, weeding out links from their
indexes.
Regarding internal threats. That is to maintain personal security - in this case of his
computer, a blogger, as well as any site owner, must constantly. Use a reliable
browser, antivirus (with fresh databases) and firewall. This is a generally accepted
recommendation.
But as for the security of blog engines, the situation here is sad. They are very
vulnerable, and new holes are regularly found in such engines. I myself regularly
find holes in blog engines (in particular, in WordPress). And here, bloggers need to
follow closely - at least update the engine to new versions, and if possible, also
follow bugtracks and when information about a hole appears, they will fix it
themselves. The most serious bloggers can order a secure audit of their site.
As for blog services and blog engines, the users of these two groups of blogs face
the problems of vulnerabilities in the server software to varying degrees. On blog
services, administrators monitor security, so this aspect does not concern this
category of bloggers, but owners of blog sites need to monitor the security of their
blogs themselves (including not forgetting to update the engine). If the owners of
the blog service do not use their own engine for creating blogs, but use some
popular engine, then this will increase the security requirements (because the
problems of this engine will also affect the owner of this blog service).
Vulnerabilities are regularly found on blog services on the Internet and Unet, about
which I have written more than once in my news (for example, on Google's
Blogger). Also, I myself more than once found vulnerabilities on similar services
(which I reported or will report to their administrators). In particular, I found
vulnerabilities on: dnevnik.bigmir.net, blog.i.ua, blog.meta.ua,
blogs.internetua.com and yesterday even on blog.korrespondent.net. By the way, I
already informed the representatives of Internet UA about the hole on
blogs.internetua.com (one of the information sponsors of Blogcamp) at the
beginning of October, and also reminded them two days ago when I wrote to them
about a new hole on their main site. As for blog engines, I myself have repeatedly
found vulnerabilities in them, and hackers find new holes every day. So this type
of server applications is very vulnerable and constantly attracts the attention of
hackers.
According to the latest data from the Sophos company, which works in the field of
information security, Russia and Ukraine are among the leading countries in terms
of the number of web pages infected with viruses. They include both sites created
by criminals and hacked sites.
The first place in the number of viruses was taken by the Chinese segment of the
Internet. 44.8% of the total number of infected pages turned out to be in
China. The second place was taken by the United States of America with 20.8% of
infected pages. The third place with an indicator of 11.3% was taken by
Russia. The fourth place was taken by Ukraine with an indicator of
7.7%. Moreover, in 2006, Ukraine took fifth place with 3.2% of web pages
spreading viruses. That. increase in the number of infected pages by 2.4 times in
the last hour.
I will also present you with information about hacker activity in Uanet. Based on
the reports that I regularly publish on my website. At the moment, I am the only
person investigating hacker activity in Uanet. I will give only general figures,
detailed information is available on my website.
In the first half of 2007, Uanet hackers behaved more actively than in 2006. During
this time, 5 sites were hacked (and all of them were political). What can be
explained by the pre-election atmosphere. These data are collected from open
sources, and considering that few people are spreading the fact that their site has
been hacked, the numbers are small (and the real numbers are larger, and most of
the hacks remain in the shadows).
For comparison. for the whole of 2006, 5 attacks on websites were carried out in
Uanet. This is a very small number compared to other regions of the Network
(where it is an order of magnitude and even several orders of magnitude
higher). Nevertheless, only in the first half of 2007, the number of attacks was
comparable to that of the whole of 2006. That. increase in dynamics by 2 times
(and by the end of the year it can increase even more). So hacker activity in Uanet
is steadily growing. And site owners need to take this into account.
I note that according to the current information for the second half of 2007, I
identified 5 cases of attacks on websites. And by the end of the year, it can
significantly increase even more. I will tell you in more detail about one of the
incidents that became known in the second half of the year (and which is related to
the topic of blogs). That a Russian hacker hacked Bigmir back in June, about
which he published an article in the Hacker magazine.
Moreover, the hacking was complex. The hacker, using a vulnerability on the
Bygmyrov site blog.korrespondent.net (which uses the WordPress engine, in which
I regularly find vulnerabilities myself), gained access to the admin. Both to the
administrator of correspondent blogs and to the main administrator of Bigmir. And
after gaining access to the database, he stole data about the Bygmyrovskaya Aska
(with the aim of reselling short numbers). This example shows that you need to
constantly monitor the security of your sites, including blogs.
As a result, Bigmir temporarily closed the blog service (after hacking). And he
discovered it only recently. That. both the Bygmyrov residents themselves and the
users of this blog service suffered from the negligent attitude to security. There are
questions as to why Bygmyrov did not monitor security (and this is their norm,
since I found vulnerabilities on many of their services), and why they did not
update WordPress, why they did not monitor reports about holes in it (about which
I regularly write in the news ). Rhetorical questions. More than that. Yesterday
evening, while preparing this report, I went to this blog service and found that
Bigmir had already opened it, I found a vulnerability on this site in less than a
minute (and this is after they patched holes on the site since June). The
vulnerability is less dangerous than the one mentioned earlier, but still less serious.
Conclusion
Summing up, I note that the level of Internet security in general, and Uanet in
particular, is very low. And the situation does not improve much from year to
year. It is necessary to work hard to change this situation and increase the level of
network security (which I do every day). Including educating site owners and web
developers, to increase literacy in security issues, so that they pay more attention to
it. One of the elements of this educational activity is my report. Good luck to you
and safety to your sites.
I will also announce my new project, which will be held next month. This is a
preliminary announcement - I will officially announce this project next week on
my website. And this project in one way or another will affect all bloggers, site
owners, web developers and the Internet as a whole.
And that's why there will be an Apocalypse for Captchas in November. Many of
the captchas will be hacked to death. They will die in order to be reborn into new,
more secure captchas. The time has come.