What do hackers talk about amongst themselves?
Those findings come via a new report released by data security firm Imperva, which reviewed the chatter on 18 underground forums -- including one with 250,000 members -- to see what participants discussed. Beyond DDoS and SQL injection, the other top topics, based on a keyword analysis, were shell code (16% of all discussions), spam (14%), cross-site scripting (12%), and brute-force techniques (11%).
[ What do we know about the U.S. bank hackers? Read Who Is Hacking U.S. Banks? 8 Facts. ]
Imperva also found that the majority of forum threads were devoted to beginner hacking, hacking tools and programs, and website and forum hacking. Other information security topics, such as wireless hacking and cryptography, were also discussed, but with much less frequency.
Beyond tutorials and education, hacking forums also serve as a place for people to buy and sell their goods or services. "The pages are filled not only with job offers, but with advertisements for paid services, buy/sell, ads, and trading goods," read the Imperva report. "Goods in the cyber world can be anything from Facebook 'likes,' hacking tools, and e-books to botnets and pornographic material. Some simple tools are shared for free, just to increase the status of the developer. Transactions are usually made in ways that allow anonymity, like Bitcoins, Liberty Reserve, or even PayPal."
One area of increasing interest on hacking forums involves so-called "e-whoring" attacks. E-whoring, according to the Imperva report, is "a practice of selling pornographic content, while pretending to be the person, usually girl, photographed." The report continued, "It is considered a form of social engineering, when the victim is misled to believe he is interacting with a girl who is sending him nude photos and video clips of herself." To facilitate such attacks, hackers -- or more precisely, social engineers -- actively share, if not buy and sell, "e-whoring packages," which typically include photographs and videos. An attacker then lurks in adult chat rooms, using the photos and videos to pretend to be the pictured woman, to try and lure buyers into paying to see more racy material.
While these types of social-engineering ruses may be popular, some of the most devastating exploits being launched today involve DDoS attacks, aided in part by a number of free but effective DDoS tools. DDoS attacks involve flooding a network with fake packets, to make it effectively unreachable. Such attacks have recently been used to disrupt the websites of major U.S. banks.
The most common type of hack attack seen these days, however, involves SQL injection. Attackers -- including hacktivists -- favor SQL injection attacks because they allow attackers to "inject" their own commands into databases. When databases aren't configured to properly screen inputs for signs of attack, attackers have an easy-to-use, remote technique for obtaining any information stored by the database.
According to Imperva, SQL injection attacks are the most common type of attack launched against websites -- and more often than not are the favored attack type for stealing sensitive data. For example, numerous security experts suspect that SQL injection attacks were used in the online attack against South Carolina state systems announced Friday by state officials. All told, the breach involved the social security numbers of some 3.6 million state residents, as well as 387,000 credit and debit card numbers. Unfortunately, the social security numbers, along with about 16,000 card numbers, weren't stored in encrypted format.
Attackers are increasingly using a simple method for finding flaws in websites and applications: They Google them. Using Google code search, hackers can identify crucial vulnerabilities in application code strings, providing the entry point they need to break through application security. In our report, Using Google To Find Vulnerabilities In Your IT Environment, we outline methods for using search engines such as Google and Bing to identify vulnerabilities in your applications, systems and services--and to fix them before they can be exploited. (Free registration required.)