CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
May 12th, 2010

Compromised Web Servers Used To Launch DDoS Attacks

Hackers have begun using compromised servers instead of client PCs to launch more powerful denial of service attacks. Hundreds of web servers are infected with a DoS application that transforms them into zombie drones, according to database security firm Imperva. These zombie servers are controlled using a simple web application, consisting of just 90 lines of PHP code.

Servers are harder to compromise than desktop PCs, which can potentially be compromised as easily as tricking a user into opening a maliciously constructed email or visiting a dodgy website. However once compromised servers offer more horsepower and, typically, fatter pipes for throwing out spurious traffic.

Attacks launched from web servers may also be more difficult to detect. “Trace backs typically lead to a lone server at a random hosting company,” Imperva warns.

Amichai Shulman, Imperva’s CTO, claims denial of service attacks from compromised servers are ongoing. “Now that a network of server bots has been created, it will be quite easy for them to ‘rent’ them out or increase their activity,” he said. “Companies should regularly monitor their Google presence to look for evidence of being compromised.”

Credit: The Register

Share this item with others:

More on CyberInsecure:
  • Overclockers.co.uk Offers Reward For DDoS Attackers Information
  • Denial-of-service Attack Hits Wikileaks During US Diplomatic Cables Leak Release
  • Compromised Web Servers Used As Botnet To Brute Force SSH
  • BBC Website Hit By DDoS Attack
  • Anti Fraud Site Bobbear.co.uk Hit By A DDoS Attack

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: Compromised Web Servers Used To Launch DDoS Attacks

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.