Subscribe

Defacing the Web


Johannesburg, 26 Jan 2018

In the past, when activists wanted to make a statement, they would spray graffiti on a wall or march outside an organisation's building carrying placards. The digital age has provided activists and vandals with a completely different set of tools that have proved to be just as, if not more, effective than the traditional methods of protest.

Trend Micro, a leader in global security, has just released its report: "Digital Vandals", which delves deep into the minds and methods of cyber vandals and hacktivists. Geopolitical events have triggered these attacks, and one of the factors that comes into play with the attacks is the religious beliefs of the attackers.

"Trend Micro analysed the data to get a clear picture of what methods attackers are using and the reasons behind their attacks. We took into account metadata provided by some of the attackers themselves. In all, the data was gathered from 13 million defaced Web sites, from five independent data sources, in order to build a comprehensive understanding of the perpetrators and their methods," says Anvee Alderton, Channel Manager for Trend Micro, sub-Saharan Africa.

Web site defacing dates back to 1998, and the data gathered from the defacers has revealed more than 30 different methods of vandalising Web sites. What's more, defacers are different from other cyber criminals in that they are quite happy to leave their contact details on the pages they have defaced. It would appear these hackers were keen to advertise themselves along with their slogans or political statements.

"We've come to refer to co-ordinated defacement attacks as a campaign. The attacks are launched usually in reaction to certain events on the world stage, or to push a specific political movement or agenda as well as airing grievances publicly. The 'Digital Vandals' report highlights several of these attacks and discusses them in detail," Alderton advises.

What has come to light is that defacing groups are loose affiliations and that members are often active in more than one group. The people involved in these groups are quite comfortable sharing toolkits, defacement templates and even target lists with each other. Because the goal is to make some sort of statement, sharing information and tools is commonplace.

"Some of these groups even set up forums and have discussions and tutorials on how to use various tools and exploits. We have discovered that most of these defacements are benign; however, the data on the servers that were compromised in the hack is vulnerable and sensitive. Digital defacement could provide a perfect opportunity for redirecting visitors to pages that may then install malware when downloaded," Alderton explains.

Protection is imperative. Basic security such as strong passwords, the correct configurations, security policies and firewalls cannot be overlooked. Secure coding is also vital, along with patching systems and networks on a regular basis. Multilayered protection is ideal to deter the defacers.

"Defacers are more than an annoyance. They can do reputational as well as financial damage to an organisation. Treat your company's Web site as you would the actual walls and buildings of the organisation itself: make sure it has the best available security and protection," Alderton concludes.

To read Trend Micro's full report, click here.

Share

Trend Micro

Trend Micro, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Trend Micro's innovative solutions for consumers, businesses and governments provide layered security for data centres, cloud environments, networks and endpoints. All its products work together to seamlessly share threat intelligence and provide a connected threat defence with centralised visibility and control, enabling better, faster protection. With over 5 000 employees in over 50 countries and the world's most advanced global threat intelligence, Trend Micro enables organisations to secure their journey to the cloud. For more information, visit www.trendmicro.com.

Editorial contacts