Blackholing beats the hackers

FireHost has announced trends for the attacks it blocked from its clients’ web applications in Q4 2013. FireHost’s IT security experts have noted that the company’s most recent Superfecta* data on attempted cyberattacks could provide evidence of a ‘blackholing’ effect, whereby FireHost’s IP Reputation Management (IPRM) filters have, over time, helped to hide FireHost’s customers’ IPs from would-be hackers.

  • 10 years ago Posted in

Indeed, the blackholing effect has contributed to the total number of attacks filtered by FireHost’s IPRM dropping from over 17m in Q3 2013 to less than 9m in Q4 2013.

“For anyone new to cybersecurity and threat detection, the blackholing phenomenon must sound incredibly abstract,” admits FireHost founder and CEO Chris Drake. “Thankfully, it’s actually quite simple and our latest statistics certainly quantify the positive benefits this effect has in terms of the protection of regulated data.”


How the blackholing effect works
In a virtualised infrastructure with comprehensive security layers (such as the service provided by FireHost), most of the malicious traffic seen and blocked comes from malevolent networks and botnets. An IP reputation filter intercepts web traffic at the perimeter layer and recognises when a would-be intruder has been black listed. This means that, when cybercriminals launch web-based attacks or perform reconnaissance on large chunks of the internet from known ‘bad’ IP addresses, the IP reputation filter can prevent them from connecting to a protected network space without reason or response.


Over time, the black hole makes the protected IPs invisible to attackers. As a result, these web applications are exposed to less and less attack traffic, improving memory and processor efficiency as well as reducing network traffic load, to name a few benefits. By the same token, the volume of spam and everything else associated with illegitimate sources also decreases.


“In a conflict zone, hostiles don’t shoot at trees on the off-chance there’s an incredibly well camouflaged infantry unit nearby,” explained FireHost CEO, Chris Drake. “That’s more or less the principle behind the black hole effect. If an automated attack detects a dead address, it’s unlikely to probe it any further. It will simply move on to another, a new vulnerable target, and launch the same attack there.”


Tom Byrnes, CEO of ThreatSTOP, which developed the IP reputation filter FireHost uses to protect its customers, also notes that the decrease in attack traffic could be due to seasonality. “Much like any legitimate corporate industry, cybercrime observes regular business cycles. It’s likely that hackers were mostly targeting consumer applications such as Google and known vulnerable networks such as commodity hosting environments during the last quarter of 2013; this would, in part, account for a decrease in attacks on FireHost’s servers. That said, there’s no doubt that the black hole effect also had a significant impact, with automated attacks unable to recognise the value of FireHost’s IPs.”


Hackers favour the tried and tested
The black hole filtering effect was not the only trend flagged by FireHost’s IT security teams however. According to Chris Hinkley CISSP and senior security engineer at FireHost, the fact that the data for Q4 and Q3 2013 was so similar actually says a lot about the current cybersecurity landscape. Namely that attackers are presently less inclined and less incentivised to develop new attack methods, or at least aren’t creating new malicious tools on a large scale.


“Attackers are still using relatively old attack methods and it’s easy to see why, there’s very little resistance from potential victims and the security industry is struggling to keep up. While new tools and delivery methods are created periodically, recent data breaches such as those suffered by the likes of SnapChat and Target bear proof that old-hat is still good enough. Security measures and countermeasures are not advancing at a quick enough pace to force attackers to be incredibly innovative. There are still many potential victims vulnerable to attack using the same old exploits and tools.


“Until the information attackers seek is properly protected, and we break out of the status quo, intruders will stick to their favoured attacks and do well by them.”


The Superfecta consists of four distinct web-application attack types that pose the most serious threat to businesses, comprising Cross-site Request Forgery, (CSRF), Cross-site Scripting (XSS), SQL Injection and Directory Traversal.


Superfecta Definitions:
· Cross-site Scripting (XSS) – Cross-site scripting involves the insertion of malicious code into webpages in order to manipulate website visitors. It is used by attackers for a range of reasons, from simply interfering with websites to launching phishing attacks against web users.
· Directory Traversal – A Path Traversal attack aims to access files and directories that are stored outside the web root folder.
· Cross-Site Request Forgery (CSRF) – CSRF is an attack that forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
· SQL Injection – SQL Injection involves the entering of malicious commands into URLs and text fields on websites that happen to be vulnerable, usually in an attempt to steal the contents of databases storing valuable data such as credit card details or usernames and passwords. The attack vector has been associated with many high profile data breaches.

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Atos has launched Atos OneCloud Sovereign Shield, a set of solutions, methodologies, and...
New distribution agreement set to bolster Westcon-Comstor’s Zero Trust offering in more markets...
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
This year, over half of MSPs or their end customers have been attacked by ransomware but only 53%...
Trend Micro has published new research revealing that 90% of IT decision makers claim their...
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real...