SQL Injection & Amazon AWS
-
Hello,
since October 18th, for the first time I’m getting hit by a wave of IPs all managed by AmazonAWS:
3.210.184.170
52.34.183.195
54.196.64.198
52.70.5.189
52.34.76.65
54.240.197.234
18.228.43.18
54.203.213.125
54.88.251.203
54.190.32.22
54.207.53.208
34.219.184.161
54.202.87.48
34.219.36.191
3.86.187.42
34.219.173.241
34.210.81.177
34.219.176.170
52.90.235.182and counting…
Except the first IP, all these IP are detected by Wordfence, trying the same type of SQL Injection:
“blocked by firewall for SQL Injection in query string: s=index%2Findex%2Findex”While report an abuse to the other web hosting like for example as GoDaddy, OVH, DigitalOcean etc, Amazon AWS it’s a pain in the a** at the same level of a Tor Node Exit, meaning that they do almost nothing and those are the scenario:
First Scenario
They receive the abuse report and pass the ball to their customer which basically can tell any story and apparently Amazon AWS is good with that.
The fact is that not being an IT expert nor a Developer there’s not match that I can reply.Two of their clients answered back this:
The behavior is expected as the Trend Micro’s download service. When the customer uses Trend Micro products to connect to Internet, Trend Micro solution visits the site by using exactly the same approach/URL as the customer then analyze to prevent our customers from hackers. Our servers do not perform any action other than the customers did and do not perform access other than the 1st access to download the page which is for analysis purpose. There won’t following connections from Trend Micro even though the one keep accessing your site.
Once we have assigned a rating to a website, we designate rating of the sites so next customer who subsequently visit that same website will receive the relevant rating automatically from our servers. Our servers would generally no need to access those same websites again. However in some circumstances Trend Micro will still try to analyze your site. For example, there no detection result from your site. – Trend Micro
If I stay stick on Wordfence report, there’s no way that a customer, in order to visit my website as typed the server IP instead of the domain name plus s=index%2Findex%2Findex
On the other hand, Trend Micro refused to provide the supposed exact URL used by their customer.
Another Amazon AWS customer reply back to Amazon:
“This web request was made to determine if the URL was safe to access. It was not unsolicited, nor was it an attempt to catalog, index, probe, or otherwise “crawl” the URL in question. The request does not make spurious DNS requests or create an open proxy for arbitrary requests. It is not an “intrusion attempt” or a “web crawl”
Again, what kind of URL was safe to access? This one server IP/index.php?s=index%2Findex%2Findex
Furthermore Fireeye stated that their customer would have received an email with such link, which makes no sense.
And all of this brings to main question, when Wordfence detect an SQL injection is true? or Wordfence is wrong?
Second Scenario
Sometime, Amazon AWS does not accept the data that I provide from Wordfence, they do it randomly so I guess it depends by the agent that read the abuse report.
When they do not accept Wordfence data, they ask for this:* Complete, accurate timestamps of the activity including
– Time Zone
* Destination IP(s)
* Destination port(s) and protocol(s)
* Log extracts showing the intensity and duration of the activityWhere I get this data if not from Wordfence/Tools?
thanks
- The topic ‘SQL Injection & Amazon AWS’ is closed to new replies.