Web application attacks intensify

Leading edge platform provider identifies new attack patterns and ways for organisations to best protect digital assets, in inaugural issue of quarterly threat report.

  • Friday, 23rd February 2024 Posted 1 year ago in by Phil Alsop

Edgio has found that web application attacks continued to increase and evolve in the fourth quarter of 2023, as reported in its new Edgio Quarterly Attack Trends Report in which the company analysed 5.2 billion attack requests. Edgio found that the most prevalent attack mitigated was path traversal. A successful path traversal attack allows a threat actor to access files on a web server, and has surpassed the prior #1 threat, SQL injection, a common attack vector that often uses malicious SQL statements to attempt to exfiltrate sensitive data from databases behind applications.  

Edgio’s report explains how path traversal attacks can lead to deep system intrusions posing a significant threat to an organization’s infrastructure and the confidentiality, integrity, and availability of data delivered over the Internet. These attacks can result in unauthorised access to content, the loss of personally identifiable information (PII), the dissemination of private/copyrighted information, or even remote code execution. Unmitigated attacks can lead to even more serious consequences, such as the deployment of ransomware or other malicious software.  

“As one of the leading edge-computing providers, Edgio has unparalleled visibility into the threats facing web applications today,” said Tom Gorup, Vice President of Security for Edgio. “We are assembling our knowledge and expertise into a quarterly read-out to enable enterprises to better protect their web infrastructure and applications. As more businesses become dependent on their digital assets, it’s critical this knowledge is shared to build a safer Internet.”   

The report looked at malicious requests and the different types of blocking, categorising protection into three categories: access control rules, managed rulesets, and custom signatures. Of those that were focused on access controls, over 76% of mitigated requests were based on IP, user-agent, and country matches, highlighting just how much bad traffic can be eliminated with basic blocklisting tactics. With managed rulesets, Edgio saw a wide range of threat types blocked, with path traversal, SQL injection and cross-site scripting (XSS) attacks leading the way when it comes to OWASP attacks.  

In addition, Edgio was able to review web application firewall (WAF) request denials by country of origin, while noting that attackers often leverage local resources to launch attacks in order to evade geofencing tactics. This could explain why attacks coordinated from advanced threat actors in more prominent countries did not crack Edgio’s Top 10 for the quarter.  

Top countries by malicious request origin, making up nearly 62% of all requests denied, include:  

· United States – 26.3% 

· France – 17.4% 

· Germany – 9.4% 

· Russia – 8.8% 

Edgio found that WAF customers used access control features to allow or deny specific request methods, using their knowledge of their own applications to inform their security controls and lower risk. The report indicates that attackers frequently leverage request methods like HEAD that return app and infrastructure information that can be used by the attacker for reconnaissance purposes and to craft a malicious payload.  

Based on deep parsing of attack payloads, Edgio found that 98% of all malicious payloads fell into JavaScript Object Notation (JSON) and URL encoded form categories (used for storing and transporting data) but cautioned security teams to remain vigilant as attackers evolve in their selection of payload content types. 

Best practices for digital asset protection: proactively stop threats against websites and applications  

Based on its findings, Edgio recommends the following methods to best protect digital assets, including websites and applications: 

Ensure your WAF provides a layered defence to protect organisations against the known bad, application-specific, and emerging threats. A complete solution will show a distribution of enforcement across access control rules, managed rulesets, and custom signatures. 

Blocklists are still an effective and low-cost part of a layered security approach to safeguard Internet-facing assets. Organisations should also take advantage of threat intelligence feeds to further harden their security posture against known bad actors.  

While managed rules are often maintained and updated by your WAF provider, it is not advisable to use a ‘set it and forget’ approach. As an application evolves and new functionalities are developed, policy reviews and analysis of managed ruleset enforcement is recommended. It is best to ensure rules are closely aligned with business application needs. 

Organisations should take the time to understand where they are doing business and where they aren’t allowed to do business. Block the countries or sub-regions that bring no value to a brand to reduce their attack surface. Blocking embargoed countries is a great starting point, but don’t rely on this approach as a catch all for bad actors. 

Know the application and use this knowledge to inform security solutions, like a WAF, to limit the application request methods or content types based on application needs.   

Rising threats: the 2026 Arctic Wolf security report

Posted 6 hours ago by Sophie Milburn
Arctic Wolf highlights a surge in data-theft extortions and remote access threats in its latest threat report.

Centacare updates disaster recovery with 11:11 Systems

Posted 6 hours ago by Sophie Milburn
Centacare Catholic Community Services enhances its infrastructure with 11:11 Systems, aiming to achieve resilient disaster recovery and reduced costs.

Guarding AI: defence strategies against emerging threats

Posted 7 hours ago by Sophie Milburn
Emerging research highlights the need to protect AI skills from cyber threats in critical sectors.
Skillsoft launches its upgraded platform to link skills development with business outcomes amidst rapid technological change.
Birmingham City University partners with Exponential-e to implement a cloud-based communications platform for students and staff.
Sage introduces AI-driven updates to help mid-sized businesses improve decision-making, reduce manual work, and increase operational visibility.
Nebula's Impact Rewards Partner Program links customer loyalty with ESG initiatives, providing partners with opportunities to support sustainable...

BMG and Iron Mountain partner on workplace transformation

Posted 11 hours ago by Sophie Milburn
BMG partners with Iron Mountain to enhance workplace transformation, aiming to blend physical moves and information governance into one service.