Protect Your Website: How to Avoid SMS Traffic Flooding Attacks

简介: Business is taking off. You are hiring new people, expanding your customer base and you have just bought a new work van to handle the recent spike in

ebbe6797f37515d1dc884a05ec501522903c238b

Business is taking off. You are hiring new people, expanding your customer base and you have just bought a new work van to handle the recent spike in orders. 

Purchasing the vehicle is a significant investment for your business, including the extra expenditure to brand the vehicle with your company logo.

But all week you’re beaming with delight at the sight of your company’s new vehicle; which doubles as a portable billboard for your company.

However, four days in you wake up to a nasty surprise. Overnight a local graffiti gang has vandalized and tagged the van in three different colors. The news only gets worst when you spot a crude artistic attempt to depict the male genitalia next to your logo. Having just spent a small fortune (from the company’s point of view) to invest in the new vehicle, this was the last thing you needed! 

The cyber world is no different when it comes to malicious operators damaging company assets.

Distributed Denial of Service (DDoS) is one particular attack you want to avoid as a law-abiding netizen. DDoS attacks come in various shapes and sizes, and one common category of DDoS attack is a SMS flooding attack. An SMS flooding attack occurs when a high volume of cellular SMS messages are sent to saturate and overload the website’s server.

This leads to slow website server performance, soaring SMS registration verification charges and leaking of customer contact information.

What is a SMS traffic flooding attack?

For many websites, online users must provide their mobile phone number upon registration in order to validate their identity. Normally, users will click a button during the registration process to send a SMS message and a SMS message is sent to verify the user’s mobile phone number. However, if there are no defense policies protecting the SMS interface, attackers can leverage programs to send high frequency requests to the SMS interface.

Screenshot of online sign up form with SMS verification

5cbc1b9fa859777430fd77edcef456b1860ee3b1

Screenshot of a flood attached registered user:

25fe18be52f9d79ded3dac5c8abcd22ff0552382

Harm to website owner

1) SMS verification requests consume website CPU and memory which can lead to poor performance issues.

2) SMS charges soar!

3) Information of registered users can be leaked, and threaten the business’ reputation and customer base. Explanation: Users that later go to login or signup for an account and whose number has been already registered under a flood attack may be asked to verify their account via email. After adding their email contact details to the account, the hacking party then has access to their email details. The hacker can then sell email contact details to your competitors for precision marketing purposes. 

SMS flooding can also be used in special circumstances to assist cybercriminal activities, such as account hacking and transferring money out of a compromised account. Flood attacks that generate thousands of SMS messages can be used to prevent the account owner from detecting a SMS notification of the fraudulent behaviour/transaction. 

2ffb4323bb8688f2e29986e56f13f277912e9b91

Defense Policy

The Alibaba Cloud “Web Application Firewall” (For Enterprise) provides defense against traffic flooding attacks to SMS interfaces. Based on big data analysis on access behavior and SMS bomber behavior modeling, Web Application Firewall matches the attack behavior and adds the IP address initiating such behaviors to a blacklist.

For example, the figure below shows a traffic flooding attack to the SMS interface:

53264be636279c410c4d97f32c0ace673d09594c


Alibaba Cloud “Web Application Firewall” not only protects SMS interfaces against traffic flooding attacks, but also:

    1. Prevents data leaks

    2. Defends against malicious CC attacks

    3. Prevents Trojan horse attacks and tampering of websites

    4. Offers virtual patching to repair loopholes

目录
相关文章
|
算法 生物认证 开发工具
Guideline 5.1.2 - Legal - Privacy - Data Use and Sharing
你的应用程序收集的设备信息可能包括以下一些:attributesOfItemAtPath:error:, NSLocaleCountryCode, NSFileSystemSize, NSHomeDirectory,和serviceSubscriberCellularProviders。
235 0
|
6月前
|
搜索推荐 UED SEO
如何提高 Website 的 organic traffic?
如何提高 Website 的 organic traffic?
26 0
|
Java API
解决办法:access restriction is not accessible due to restriction
解决办法:access restriction is not accessible due to restriction
100 0
strange behavior:why u31000 is accessed for Extension project
Created by Wang, Jerry, last modified on May 20, 2015
92 0
strange behavior:why u31000 is accessed for Extension project
|
CDN
Building an Industry Information Website
Object Storage Server (OSS) is a massive, secure, low-cost and highly reliable distributed storage service offered by Alibaba Cloud.
1529 0
Building an Industry Information Website
|
SQL 安全
Protecting Websites through Semantics-Based Malware Detection
Malware detection is a fundamental feature of web security and serves as the first line of defense for most websites.
1337 0
|
Java
not accessible due to restriction on required library
The type AWTUtilities is not accessible due to restriction on required library D:\Program Files\jdk1.
939 0
Using Machine-Readable Threat Intelligence to Block Unknown Threats
https://www.brighttalk.com/webcast/8241/150227
671 0