sb-eu logo
Story image

Financial institutions' websites most frequently attacked – report

02 Jul 2019

Positive Technologies today released a new research report, Attacks on Web Applications: 2018 in Review, which lists the main threats to modern web resources.

The analysis, covering over a million attacks, used web attack statistics collected by Positive Technologies Application Firewall.

For this research, experts selected 140,000 attacks which targeted specific sites and created an attack chain.

These chains make it possible to identify the attackers' steps.

The study showed that the three most common attacks are simple and effective: SQL Injection, Path Traversal, and Cross-Site Scripting.

However, the experts noted some peculiarities for specific sectors.

The share of information leakage attacks has also doubled.

This is an attack that is especially prevalent with government websites, making up 67% of attacks.

Malicious actors often use these attacks to analyse systems, determine system version and configuration, and access service information.

Once attackers have that information, they can stage targeted attacks.

The experts also note that government institutions’ websites are still exposed to dangerous attacks aimed at gaining server control and stealing database information.

This means gaining control of the attacked website, having access to the OS and to all files on the server.

Positive Technologies experts assert that all websites, regardless of sector, are attacked daily.

In the case of a targeted attack, it is possible to correlate the different stages and reconstruct the attack chain.

A chain can contain dozens, hundreds, or even thousands of events a day.

The report concludes that the greatest daily number of attack chains per application was found on the sites of financial institutions (151 chains) compared to other industries. 

Having visibility of the whole attack chain enables businesses to have a holistic overview of hacks to localise threats and protect resources more effectively.

Positive Technologies cybersecurity resilience lead Leigh-Anne Galloway says that risk-wise, web applications of financial institutions are different from the rest.

“Even the risks related to sites compromised are high. For instance, if the official bank site is used to distribute malware or stage phishing attacks, customers will be the first to be hit. Attacks on customers top the list of attacks on web applications of financial institutions.

“As regulation has levelled the playing field between fintechs and digital challengers, traditional banks’ market dominance is being threatened. Customers now have more choice on who to bank with and are more brand-agnostic. This means traditional banks risk losing customers if their systems are not robust and secure.”

Transportation companies rank second in the number of attack chains (135 a day), right after financial institutions.

Their web resources support online payments, for instance, for buying tickets.

This attracts hackers interested in users' payment cards.

Next on the list of most attacked web resources were hospitality and entertainment companies with 114 attack chains a day.

Attackers are drawn to the valuable personal and payment data these industries have at their disposal to hack.

Galloway continued; “Increasingly, the attacks target the personal and payment data of customers. Most of 2018’s attacks (42%) were aimed at data theft. We also see attacks aimed at infecting a site with malware, which allows hackers to reach more victims and use vulnerable sites for targeted attacks.”

Story image
Network intelligence is stopping a wave of DDoS misdiagnosis
Security teams already know the value of a layered defence; it’s time to add more layers, writes ThousandEyes principal solutions analyst Mike Hicks.More
Story image
CompTIA's new threat intelligence resource officially launches
The new resource is designed to help technology solution providers, managed services providers (MSPs) and other organisations searching for critical cybersecurity threat intelligence. More
Story image
Slack unveils new security features as remote working skyrockets
Slack has introduced new security features, integrations and certifications to its platform in response to growing security concerns as more people work remotely.More
Story image
Cloud breaches set to increase in velocity and scale - Accurics
“While the adoption of cloud native infrastructure such as containers, serverless, and servicemesh is fuelling innovation, misconfigurations are becoming commonplace and creating serious risk exposure for organisations."More
Story image
Tanium and Google Cloud bring greater security to distributed IT
“This joint solution with Chronicle gives Tanium customers access to massively scalable analytics and investigation capabilities far beyond that of other endpoint detection and response point tools."More
Story image
APAC consumers not taking ownership of their data, study finds
The majority of consumers in the Asia Pacific (APAC) region expect businesses or governments to protect their data, according to a new F5 research report titled Curve of Convenience 2020: The Privacy-Convenience Paradox. More