sb-nz logo
Story image

Financial institutions' websites most frequently attacked – report

02 Jul 2019

Positive Technologies today released a new research report, Attacks on Web Applications: 2018 in Review, which lists the main threats to modern web resources.

The analysis, covering over a million attacks, used web attack statistics collected by Positive Technologies Application Firewall.

For this research, experts selected 140,000 attacks which targeted specific sites and created an attack chain.

These chains make it possible to identify the attackers' steps.

The study showed that the three most common attacks are simple and effective: SQL Injection, Path Traversal, and Cross-Site Scripting.

However, the experts noted some peculiarities for specific sectors.

The share of information leakage attacks has also doubled.

This is an attack that is especially prevalent with government websites, making up 67% of attacks.

Malicious actors often use these attacks to analyse systems, determine system version and configuration, and access service information.

Once attackers have that information, they can stage targeted attacks.

The experts also note that government institutions’ websites are still exposed to dangerous attacks aimed at gaining server control and stealing database information.

This means gaining control of the attacked website, having access to the OS and to all files on the server.

Positive Technologies experts assert that all websites, regardless of sector, are attacked daily.

In the case of a targeted attack, it is possible to correlate the different stages and reconstruct the attack chain.

A chain can contain dozens, hundreds, or even thousands of events a day.

The report concludes that the greatest daily number of attack chains per application was found on the sites of financial institutions (151 chains) compared to other industries. 

Having visibility of the whole attack chain enables businesses to have a holistic overview of hacks to localise threats and protect resources more effectively.

Positive Technologies cybersecurity resilience lead Leigh-Anne Galloway says that risk-wise, web applications of financial institutions are different from the rest.

“Even the risks related to sites compromised are high. For instance, if the official bank site is used to distribute malware or stage phishing attacks, customers will be the first to be hit. Attacks on customers top the list of attacks on web applications of financial institutions.

“As regulation has levelled the playing field between fintechs and digital challengers, traditional banks’ market dominance is being threatened. Customers now have more choice on who to bank with and are more brand-agnostic. This means traditional banks risk losing customers if their systems are not robust and secure.”

Transportation companies rank second in the number of attack chains (135 a day), right after financial institutions.

Their web resources support online payments, for instance, for buying tickets.

This attracts hackers interested in users' payment cards.

Next on the list of most attacked web resources were hospitality and entertainment companies with 114 attack chains a day.

Attackers are drawn to the valuable personal and payment data these industries have at their disposal to hack.

Galloway continued; “Increasingly, the attacks target the personal and payment data of customers. Most of 2018’s attacks (42%) were aimed at data theft. We also see attacks aimed at infecting a site with malware, which allows hackers to reach more victims and use vulnerable sites for targeted attacks.”

Story image
Gartner: By 2023, 65% of the world will have personal data covered under modern privacy regulations
“Security and risk management (SRM) leaders need to help their organisation adapt their personal data handling practices without exposing the business to loss."More
Story image
APAC organisations struggle to find balance between digital adoption and cybersecurity
Organisations in the Asia Pacific (APAC) region are significantly concerned about security threats, but nevertheless are looking to advance operations through digital adoption.More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More
Story image
Report: Rushing into cloud migration directly related to security issues
A new report from Radware highlights the impact of COVID-19 on organisations compelled to digitally transform in order to maintain business continuity. More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Sophos named mobile security Leader in IDC MarketScape
Sophos Intercept X for Mobile has capabilities in protecting Android, iOS and Chrome OS users from known and never before seen mobile threats.More