SlideShare una empresa de Scribd logo
1 de 11
RFI Attacks
in the Security Landscape
Incapsula: Website Security and Acceleration
Methodology
• The following facts and figures are based on data from
billions of sessions, which were managed by Incapsula’s
CDN, over a 6-month period.
• Session data was collected and analyzed by Incapsula’s
proprietary traffic profiling security algorithms.
• Links lifespan information is based on a sampled data
from a group of 1,000 RFI links, which carry 226 different
types of backdoor shells and shell variants.
• All data was aggregated from Incapsula’s crowd-sourced
database, dedicated to an ongoing research of RFI attacks
and backdoor shell behavior.
Attack Description
Remote File Inclusion (RFI)
attacks abuse user-input and
file-validation vulnerabilities to
upload a malicious payload from
a remote location.
With such shells, an attacker's
goal is to circumvent all security
measures by gaining high-
privileged access to
website, web application and
web hosting server controls.
• RFI attacks are popular for their ease of automation and high damage potential.
• RFI circumvents other security measures, offering the best ROI for an attacker.
• RFI attacks are executed via widely available automated tools.
• Many websites still carry known/patched RFI vulnerabilities.
• Patching is not an effective wide-scale solution.
• Compromised websites are hijacked for malware distribution and DDoS attacks.
• Compromised site is a persistent threat to itself, its visitor and other websites.
• RFI links serve as centralized distributers of Backdoor Shells.
• Many RFI links are re-used for multiple attacks, with different attacks vectors,
on various targets.
• The lifespan of RFI links averages over 60 days, making them great candidates
for long-term intelligence gathering.
• High-visibility RFI attacks will result in defacement or manipulation of content.
• The attacker will often prefer a more subtle approach, using the compromised
site as long-term resource for DDoS, data-theft and malware distribution.
• One compromised site can endanger the whole server!
• Masked Gif files are the “backdoor of choice” for RFI attacks.
• Gif’s popularity is influenced by the popularity of TimThumb vulnerability.
• Gif’s are used to mask large shells and droppers alike.
Conclusions
• Signature-based methods are effective against most RFIs but not against
Zero-day threat.
• Patching is not an effective wide-scale solution.
• RFI links’ lifespan, and their position as centralized distribution points, offer
many benefits for Whitehats.
• Data from RFI links can be harvested for reputation-based algorithms, to
hardening RFI and Backdoor protection.
• Data from RFI links can be used as a backbone for an effective early warning
system for unique zero-day threats.
• Incapsula’s native crowdsourcing functionalities, coupled with its access control
capabilities, are extremely well-suited for RFI link monitoring and reputation-
based mitigation.
Learn More
For more information about RFI attacks and Incapsula’s unique
crowdsourcing security visit:
• http://www.Incapsula.com
• http://www.incapsula.com/the-incapsula-blog/item/801-
crowdsourced-security-rfi-protection
• http://www.incapsula.com/the-incapsula-blog/item/802-rfi-
attacks-in-the-security-threat-landscape
or contact us at: Info@Incapsula.com
Stay Safe

Más contenido relacionado

Más de Imperva Incapsula

Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Imperva Incapsula
 
Understanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your BusinessUnderstanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your Business
Imperva Incapsula
 

Más de Imperva Incapsula (20)

D3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnD3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
 
D3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudD3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the Cloud
 
D3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize SecurityD3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize Security
 
D3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access ControlD3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access Control
 
D3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery RulesD3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery Rules
 
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients Performance
 
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedD3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the Curve
 
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
 
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionProtect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS Protection
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
 
Is the Cloud Going to Kill Traditional Application Delivery?
Is the Cloud Going to Kill Traditional Application Delivery?Is the Cloud Going to Kill Traditional Application Delivery?
Is the Cloud Going to Kill Traditional Application Delivery?
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
 
Understanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your BusinessUnderstanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your Business
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
 
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Where Remote File Inclusion (RFI) Attacks Fall in the Security Threat Landscape

  • 1. RFI Attacks in the Security Landscape Incapsula: Website Security and Acceleration
  • 2. Methodology • The following facts and figures are based on data from billions of sessions, which were managed by Incapsula’s CDN, over a 6-month period. • Session data was collected and analyzed by Incapsula’s proprietary traffic profiling security algorithms. • Links lifespan information is based on a sampled data from a group of 1,000 RFI links, which carry 226 different types of backdoor shells and shell variants. • All data was aggregated from Incapsula’s crowd-sourced database, dedicated to an ongoing research of RFI attacks and backdoor shell behavior.
  • 3. Attack Description Remote File Inclusion (RFI) attacks abuse user-input and file-validation vulnerabilities to upload a malicious payload from a remote location. With such shells, an attacker's goal is to circumvent all security measures by gaining high- privileged access to website, web application and web hosting server controls.
  • 4. • RFI attacks are popular for their ease of automation and high damage potential. • RFI circumvents other security measures, offering the best ROI for an attacker. • RFI attacks are executed via widely available automated tools.
  • 5. • Many websites still carry known/patched RFI vulnerabilities. • Patching is not an effective wide-scale solution. • Compromised websites are hijacked for malware distribution and DDoS attacks. • Compromised site is a persistent threat to itself, its visitor and other websites.
  • 6. • RFI links serve as centralized distributers of Backdoor Shells. • Many RFI links are re-used for multiple attacks, with different attacks vectors, on various targets. • The lifespan of RFI links averages over 60 days, making them great candidates for long-term intelligence gathering.
  • 7. • High-visibility RFI attacks will result in defacement or manipulation of content. • The attacker will often prefer a more subtle approach, using the compromised site as long-term resource for DDoS, data-theft and malware distribution. • One compromised site can endanger the whole server!
  • 8. • Masked Gif files are the “backdoor of choice” for RFI attacks. • Gif’s popularity is influenced by the popularity of TimThumb vulnerability. • Gif’s are used to mask large shells and droppers alike.
  • 9. Conclusions • Signature-based methods are effective against most RFIs but not against Zero-day threat. • Patching is not an effective wide-scale solution. • RFI links’ lifespan, and their position as centralized distribution points, offer many benefits for Whitehats. • Data from RFI links can be harvested for reputation-based algorithms, to hardening RFI and Backdoor protection. • Data from RFI links can be used as a backbone for an effective early warning system for unique zero-day threats. • Incapsula’s native crowdsourcing functionalities, coupled with its access control capabilities, are extremely well-suited for RFI link monitoring and reputation- based mitigation.
  • 10. Learn More For more information about RFI attacks and Incapsula’s unique crowdsourcing security visit: • http://www.Incapsula.com • http://www.incapsula.com/the-incapsula-blog/item/801- crowdsourced-security-rfi-protection • http://www.incapsula.com/the-incapsula-blog/item/802-rfi- attacks-in-the-security-threat-landscape or contact us at: Info@Incapsula.com