📜 ⬆️ ⬇️

Lock on access_log, an easy way to shoot a leg or eliminate competitors

Another example of how easy it is to shoot yourself in the leg, this time “overdoing” while protecting the site.
I don’t call names as always, but the story is indicative as-is, i.e. as an example, how not to "protect" their servers. Oh, tell them, say - and all to no avail.

It was necessary here the other day to do an “audit” of a commercial project ... well, they were very requested.
Site traffic has fallen, not quite at all, but quite noticeable. We looked at the logs, search engine analytics, etc. etc. Everything seems to be normal, and who comes, he does not even leave immediately.
But I will not go around and so on - after analyzing the logs of bans over IP, one pattern emerged - in a short time a huge number of IP addresses fell into the ban. All polls for one reason - ostensibly as botsearch. Logged logs for the last month, too, were horrified by their size, and it was not even necessary to look in there, and so everything is clear. Those. The following happened: a bunch of customers just could not get to the site.
The question “something changed about a month ago?” Received a negative answer.

I will not tire here with detective reading, after a brief search - oil painting. A certain direct competitor of this site contributed to the “leakage” of customers, or rather, and organized this “strange non-attendance”.

Description of the “attack” scenario:

By the way, the blocking here was carried out not by access_log, but due to high server load, directly from the web server. In the language of nginx, a postprocessor was plugged into a location that was working on 404 and other errors, after the filtering of the IP address blocking service after filtering by certain regular expressions by URLs. Well, type nginx-botsearch filter fail2ban, but without the tedious rasparzivaniya logs (which is often very expensive).
')
However, in the same way, you can shoot yourself in the foot, for example, simply by activating some jail in fail2ban that use filters such as " nginx-botsearch ", " apache-botsearch " or many other filters set on the access-log web server in a huge the number of plying on the Internet for "protection" from bots. Here, for example, another such filter , waiting for a pull-request in fail2ban. And there are hundreds of such descriptions and even more.

But back to the attack itself. What is remarkable, most likely these bad people hired someone from the blackhat-s (well, they didn’t come to it themselves) probably for hacking the competitors site. Perhaps you needed a customer base, or were looking for a way for a better DDoS, and you never know what else. Well, those, having discovered such a “protection” against a fool, have probably already sold them several URLs, or include it themselves, as a simple opportunity to “eliminate the competitor”. In any case, the likelihood that such a practice has not been massively adopted is different from zero.

Speculation - speculation, but the fact of "attack" and some damage there is.
Therefore, be careful and turn on the head. Well, or call a friend supervisor ...

Source: https://habr.com/ru/post/260647/


All Articles