Imperva - 15 Ways Your Website Is Under Attack
Imperva - 15 Ways Your Website Is Under Attack
Imperva - 15 Ways Your Website Is Under Attack
SECURITY
ATTACK CLASSIFICATION WHY? WHO? SOLUTION IMPERVA
REQUIRED
1 OWASP Top Web Attacks Exploit business through web Criminals Web App
app code vulnerabilities. Firewall
2 OWASP Top 10 API Attacks Exploit business through Criminals API Protection
API vulnerabilities.
3-6 DDoS Attacks (Includes Bring down the IP address, Criminals and DDoS
Ransom DDoS) web application, network or competitors Protection
3. DDoS Of IP address DNS to prevent access.
4. DDoS Of Website
5. DDoS Of Network
6. DDoS Of DNS
7-10 Automated Bot Attacks Exploit functionality and Criminals, Bot Protection
7. Credential stuffing attacks proprietary data published competitors
on websites to abuse the and business
8. Scraping attacks
business and customers in anti- partners
9. Scalping attacks
competitive and criminal ways.
10. 18 Other unique bot attacks
Protecting from OWASP top 10 risks Source: OWASP TOP 10 Web Application
Security Risk
While fixing vulnerabilities within the code is ideal, this reality is almost impossible to
achieve. Web Application Firewalls (WAF) were created to solve this code vulnerability
problem while also helping organizations meet compliance requirements. For example:
PCI compliance for businesses processing payment and credit cards.
• UDP floods
Attack explanation
• NTP amplification
DDoS attacks equate to loss of business. There are four distinct targets that are typically • DNS amplification
under DDoS attack–DDoS of individual IP addresses, DDoS of Website, DDoS of the • Tsunami SYN flood
Network, and DDoS of Domain Name Servers (DNS). • CharGEN amplification
• Memcache amplification
LAYER 7 ATTACKS
Imperva’s DDoS Protection is included in Imperva’s Cloud Application Security
• NS Query floods
Platform and is the right defense against any DDoS attack. With an industry leading
• SlowLoris attack
3-second SLA to stop any attack of any size, Imperva ensures 99.999% uptime
• HTTP(S) GET request floods
against any of today’s modern DDoS attacks.
• HTTP(S) POST request floods
• SMTP request flood
• Formjacking
Attack explanation
• Credit card skimming
This supply chain attack exploits the growth of JavaScript services used in modern • Card skimming
web applications. From chatbots to payment processors, attackers compromise the • Skimmers
source code of these services and steal data from any website where the compromised • Magecart
code is used. • JavaScript supply chain attacks
Attackers goals
Performing a continuous single record data breach wherever the compromised code is
deployed allows for stealthy data theft of credit cards and PII on multiple websites.
Supply chain attacks exploit any vulnerabilities in third party services used in modern • Backdoors
web applications. Examples include: • Zero days
• Target server
• SOFTWARE SUPPLY CHAIN ATTACKS (EG. SOLARWINDS) - Zero days or backdoors
• Target client
installed in consumer-off-the-shelf software or open source libraries used within any
• Malware distribution
applications.
• Data theft
• CLIENT-SIDE SUPPLY CHAIN ATTACKS - Compromise of JavaScript services used on
websites globally.
JavaScript Supply Chain
Many legacy applications have zero day vulnerabilities that cannot be fixed. Protecting • Unknown new attacks
them from attacks is difficult because a signature of the attack is unavailable. Insiders • Internal facing app attacks
using the application bypass other security tools and can successfully compromise
Techniques
legacy internal facing applications.
• Clickjacking
About Imperva
Imperva is the cybersecurity leader whose mission is to protect data and all paths to it.
Imperva protects the data of over 6,200 customers from cyber attacks through all stages
of their digital journey. Imperva Research Labs and our global intelligence community
enable Imperva to stay ahead of the threat landscape and seamlessly integrate the
latest security, privacy and compliance expertise into our solutions.