A peek at recent headlines backs up what most IT professionals already know: cyberattacks against businesses, governments, and individuals are on the rise.
As a webmaster, a big part of your job is protecting clients' websites from infiltration by crackers, hackers, and malicious trackers. So, you might be wondering what the most common types of cyberattacks are and what you can do to prevent them?
Even old attacks can become new again when cybercriminals find fresh ways to probe and penetrate website vulnerabilities. It's essential for everyone from seasoned IT experts to the average computer user to stay aware of where the cybersecurity threats come from and the take steps to prevent data breaches.
DDoS attacks are easy to launch. They aren't normally used to access the system under attack, but to block access for others. Although there are several types of DDoS attacks, they mainly work by overloading a network with requests until it crashes.
There are five main varieties of DDoS attacks:
TIP: A solution to these problems? DDoS protection software. |
This tried-and-true email scam has seen many evolutions over the years.
The cybercriminal sends an email pretending to be from a trusted source with the purpose of gaining access to personal information or convincing the recipient to act in a way that benefits the sender, often financially.
One of the most notorious of these is these spear phishing scams is the “Nigerian Prince” email scams that resurface in some form every few years, while ransomware is a relatively new player on a scene that has created plenty of havoc in its short lifespan.
Image courtesy of iStock
SQL injections are perhaps the most common form of cyberattack today. The malicious SQL commands are injected into existing script instead of traditional input like a password.
This causes changes in command lines, allowing data to be read or changed in some way. This kind of attack allows the hacker to issue commands to the operating system and even shut the whole system down.
Another popular style of attack is cross-site scripting. There has been a recent spate of them involving adware used by Google clients. An XSS attack affects systems from the user side. The XSS script inserts alternative JavaScript code that redirects a visitor to the hacker's website or account instead of the correct one.
The website owner may not even know that their script has been hijacked until they notice a lack of commission deposits due to lower to click-through rates; likewise, the user may never know they're been redirected from the normal browsing and shopping experience either.
With this type of attack, it's more than money from ad clicks that can be stolen. XSS attacks can also allow the hijacker to record keystrokes, obtain passwords, collect private information, or gain control of the user's computer.
Related: Unsure how to recover from a cyberattack? Check out these seven tips! |
There are a number of tactics a webmaster can deploy to secure a website from these sort of infiltrations. It’s also not a bad idea to put time and effort into educating clients on preventative actions they can take, such as creating more secure passwords and recognizing the signs of fraudulent emails.
TIP: Ensure your safety from data breaches and fraudalent charges with the help of G2 Track. (It's free!) |
The best defense against cyberattacks is a good offense.
One of the first steps should be data encryption through Secure Socket Layers (SSL) technology. Google has pushed for net-wide adoption of SSL to the extent that your website will display the message not secure in the URL bar if you don’t have it. The only way to remove that message is to get an SSL certificate.
Image courtesy of pixelprivacy.com
Understanding and using resources like Google's Webmaster tools provides you a single dashboard to work from and early warnings if something is amiss.
TIP: For a full explanation of SSL protection and how it works, check out this guide. |
Here are some tips for warding off specific kinds of cybercrime:
How you handle this depends on the nature, mode, and scope of attack. For example, users can install security patches or disable SMBv2 and block ports 139 and 445 to protect against a teardrop attack.
Smurf attacks can be handled by disabling IP-directed broadcasts from the router to prevent ICMP echos, or you can simply reconfigure the system to keep it from responding to such broadcasts. Using a firewall that checks the file size of IP packets will keep you from experiencing the Ping of Death, and Black Hole or RFC3704 filters will chase away botnets.
There are several measures that can be taken to guard against XSS attacks. Google handles it by removing all affected affiliate advertisers. Educating clients, advertisers, affiliates, and the general public about their existence won't protect systems, but it will make them aware of the problem.
What can a webmaster do on the admin side?
Using the filter_var() function for PHP code with the FILTER_SANITIZE_STRING will remove tags and sanitize input code. Another trick is to write script so that you keep the first line intact when you write to the file and discard it when the file is read.
Store the file with a data.php or other .php extension. When a hacker tries to gain access, it will be interpreted as an executable PHP and the server will exit the file.
You can also use functions to validate data and ensure that it's coming from a reliable source. The most common are:
A good start is to update from older functional interfaces used by PHP and ASP applications. Using J2EE and ASP.NET applications will increase the chances of running into the more vulnerable interfaces that can be exploited by SQL injections. Applying least privilege permission models and validating input against a whitelist at the application level will also protect your system.
In the midst of fighting off hackers from the client side, don’t overlook the server side help that should be available from your web host provider. A good one should be a partner against cyberattacks. The industry leaders offer strong security solutions for locking down client websites against exploit attempts as a core feature, and they’re not shy about telling potential customers. Read the fine print before signing up to understand exactly what they offer.
One of the best ways to harden your website against attacks is to avoid free or very cheap hosting, lest you end up one of the 13.5 million username/password combinations either leaked or hacked from 000webhost.com. During a multi-year review of Canadian web hosts, Hosting Canada reported on the leak and subsequent investigation by Forbes. Inquiries to contact 000 and other hacked hosting providers led nowhere.
Free web hosts not only can be expected to not invest in the hardware or software to properly protect customers from cybercriminals, but also have been known to actively collect and sell customer data. They’ve got to make money somehow!
In 2017 alone, ransomware attacks cost businesses more than 2 billion dollars. On top of that, individuals were duped out of 9 billion dollars through scams involving compromised business emails.
Obviously there’s a problem, and it’s one without a simple solution. Investing in security software, a proactive mindset, and being aware of growing threats is the best defense against cybercrime that costs time, money, and public trust.
Ready to learn more about protecting yourself from cyberattacks? Learn about the biggest cybersecurity trends and read our comprehensive list of 50 cybersecurity statistics for 2019.
Sam Bocetta is a freelance journalist specializing in U.S. diplomacy and national security, with emphases on technology trends in cyberwarfare, cyberdefense, and cryptography.
In today's ecosystem, losses at the hands of enterprising scammers are as inevitable as the...
Packed with sensitive data and accessible from anywhere, mobile apps are every hacker's dream.
After the year 2000, when technology use and development skyrocketed, the progression of cyber...
In today's ecosystem, losses at the hands of enterprising scammers are as inevitable as the...
Packed with sensitive data and accessible from anywhere, mobile apps are every hacker's dream.