Security Report Sample
Security Report Sample
User: All
Security Report logologol
Security Summary
Summary
Recommendations:
Follow the security enhancement
200.200.1.1 server(1) has been Hacked
recommendations in the corresponding
202.96.134.134,202.96.134.133,192.6.134.133
server security or endpoint security sections
host(3) has been Infected to fix the issues as soon as possible for fear of
business losses.
Recommendations:
200.200.1.1 has(have) been defaced and 1. Remove the backlink from the
injected 5 backlink(s). corresponding webpage.
2. Download the anti-malware software and
perform full scan over the website.
Comments:
158 attack(s) occured
Overall security rating is Poor, though most
of the attacks are blocked by Sangfor NGAF.
Comments:
Certain server is very vulnerable. To learn how
42 vulnerability(ies) has been detected, to fix the vulnerabilities, log in to the NGAF
among which 17 is(are) high risk. GUI and go to Status > Real-Time
Vulnerability Analysis to generate the report.
1
Security Report logologol
Trends
Total Attacks: Indicates the total number of attacks detected by the Sangfor NGAF that are
against protected zones. The more the attacks, the worse the network security.
Attack Events: Indicates the major attack events extracted and categorized based on a variety of
security logs and attack chain analysis techniques. The more the attack events, the more the
attacks. The servers in protected zone will be more likely attacked, and network security will
become worse.
Vulnerability Distribution
The vulnerabilities detected in specific protected zone fall into the following major types:
2
Security Report logologol
42 vulnerability(ies) has been detected, 17 is(are) high-risk, 21 is(are) medium-risk, 4 is(are) low-risk, 0 is exploited
According to analysis of vulnerability impacts, the follow servers will be or have been influenced the most:
3
Security Report logologol
No. Action Taken Target Server Application Server Severity (Level) Latest Threat Threat Count
miserupdate.aliyun.
2 No - Ever been attacked(3) 2016-06-15 09:33:57 30
com (200.200.1.1)
Attack Events
The following are the major attack events categorized and extracted according to analysis of security logs, i
n conjunction with attack chain analysis techniques.
● Hacked (server has been infected with Trojan or defaced)
● Bot Controlled (host or server has become “zombie")
● Ever been attacked (server has ever been attacked, but no data proves that any attack is successful)
1 server(s) has been hacked. 200.200.1.1 is(are) among the 1 server(s) injected Backlink
1 Hacked
Injection
1) 200.200.1.1 has suffered 76 attack(s), which fall into the following major types: SQL
occurrence(s)
3) 200.200.1.2 has suffered 10 attack(s), which fall into the following major types: User
4
Security Report logologol
Endpoint Security
Top Bot-Infected Hosts
The following are the top bot-infected hosts:
No. Action Taken Host Zone Severity (Level) Latest Threat Threat Count
Malicious Files
The following are the top malicious files detected based on sandbox technology that involved in 0-Day vulnerability exploit:
No. File MD5 Virus Name Threat Level Host Infected Hosts Threat Count Latest Threat
569def15112e43
SF/IPS.WIN.Lo
1 a511ae7af2cbb6 High 192.6.134.131 (2) 1 2 2016-06-15 09:33:58
ophole
5803
07577c5a49fda3
Win32/Trojan.
2 3069910fcd5c28 High 192.6.134.138 (2) 1 2 2016-06-15 09:33:58
Gen.PK
a66b
5
Security Report logologol
Malicious Websites
The following are the top malicious websites detected based on sandbox technology that have involved in
0-Day vulnerability exploit:
Recommendations: Download anti-malware software to scan for and remove malware on the infected hos
ts. (Download Anti-malware Software: http://sec.sangfor.com/apt)
1. Log in to the NGAF GUI and follow the recommendations in Alerts tab to fix the vulnerabilities.
2. Log in to the NGAF GUI and go to Status > Real-Time Vulnerability Analysis to generate the report and
follow the recommendations to fix the existing vulnerabilities.
3. Add the attack sources to Global Blacklist in System > Global Whitelist/Blacklist.
4. Carefully read all the Security Enhancement Recommendations in every Security Detail section in this report.
6
Security Report logologol
Server Security
200.200.1.1 Security Details (Waiting for Action)
200.200.1.1 is controlled by the attacker and has suffered 86 attack(s) , and is detected 42 vulnerability(ies).
The attacker has injected 5 backlink(s) to Pornography,Gambling,Game contents
Attack Events
Injected backlink(s):
192.168.114.117/test/heilianfan.html
Type: Counteraction & Other Illegalities
Contents: <a href="http://www.testurl.com">办毕业证</a>
192.168.114.117/test/heiliandu.html
Type: Gambling
Contents: <a href="http://www.testurl.com">六合彩</a>
192.168.114.117/test/heilianyao.html
Type: Illegal Drugs
Contents: <a href="http://www.testurl.com">催情药</a>
192.168.114.117/test/heilianyouxi.html
Type: Game
Contents: <a href="http://www.testurl.com">精品复古</a>
7
Security Report logologol
Vulnerabilities
Recommendations:
● Log in to the NGAF GUI and go to Status > Real-Time Vulnerability Analysis to generate the Full Report
and follow the recommendations to fix the existing vulnerabilities.
Attack Sources
The following are the major sources launched attacks against 200.200.1.1, 86 attack(s) in total. We are reco
mmended to add them into the Global Blacklist in System > Global Whitelist/Blacklist.
The server has been hacked. Follow the recommendations below to enhance security.
1. Backlink Injection
● Check source code of the victim webpages and delete all the modified codes. For more information, log
in to the NGAF GUI and go to Status > System > Alerts.
● Download, install and launch anti-malware software to scan websites for and remove the backlinks. (Do
wnload Anti-malware Software: http://sec.sangfor.com/apt)
8
Security Report logologol
Attack Events
More logs are available in Internal Report Center, in Logs > WAF and IPS.
Vulnerabilities
No data available
Attack Sources
The following are the major sources launched attacks against 200.200.1.1, 30 attack(s) in total. We are reco
mmended to add them into the Global Blacklist in System > Global Whitelist/Blacklist.
9
Security Report logologol
Attack Events
Summary 200.200.1.2 has been attacked by 192.6.134.136(United States, 10 occurrences), User login security(10)
More logs are available in Internal Report Center, in Logs > WAF and IPS.
Vulnerabilities
No data available
Attack Sources
The following are the major sources launched attacks against 200.200.1.2, 10 attack(s) in total. We are reco
mmended to add them into the Global Blacklist in System > Global Whitelist/Blacklist.
10
Security Report logologol
Attack Events
More logs are available in Internal Report Center, in Logs > WAF and IPS.
Vulnerabilities
No data available
11
Security Report logologol
Attack Sources
The following are the major sources launched attacks against 200.200.1.3, 2 attack(s) in total. We are reco
mmended to add them into the Global Blacklist in System > Global Whitelist/Blacklist.
12
Security Report logologol
Endpoint Security
202.96.134.134 Security Details (Waiting for Action)
202.96.134.134 has undergone 6 threat(s). It is at the stage of C&C Communication currently. At this attack
stage, host is infected with malware and controlled by hacker.
Threat Details
2016-06-15 09:33:57 BitCoin mining activity is detected the host(192.168.183.188). It may have
become a bot. (3 occurrence(s))
Log Examples
2016-06-15 09:33:57 The host(192.168.183.188) is transmit data via IRC protocol and might be
infected. Please view details for more information. (2 occurrence(s))
● The host is infected with malware. We are recommended to download anti-malware software to scan for
and remove malware on the infected hosts. (Download Anti-malware Software: http://sec.sangfor.com/
apt)
202.96.134.133 has undergone 2 threat(s). It is at the stage of C&C Communication currently. At this attack
stage, host is infected with malware and controlled by hacker.
Threat Details
Log Examples 2016-06-15 09:33:57 Host 192.168.183.188 is infected with Gh0st trojan (2 occurrence(s))
13
Security Report logologol
● The host is infected with malware. We are recommended to download anti-malware software to scan for
and remove malware on the infected hosts. (Download Anti-malware Software: http://sec.sangfor.com/
apt)
192.6.134.133 has undergone 2 threat(s). It is at the stage of C&C Communication currently. At this attack
stage, host is infected with malware and controlled by hacker.
Threat Details
2016-06-15 09:33:58 BitCoin mining activity is detected the host(192.168.183.188). It may have
Log Examples
become a bot. (2 occurrence(s))
● The host is infected with malware. We are recommended to download anti-malware software to scan for
and remove malware on the infected hosts. (Download Anti-malware Software: http://sec.sangfor.com/
apt)
92.96.134.134 has undergone 8 threat(s). It is at the stage of C&C Communication currently. At this attack
stage, host is infected with malware and controlled by hacker.
Threat Details
14
Security Report logologol
● The host is most likely infected with malware. We are recommended to download anti-malware software
to scan for and remove malware on the potential infected hosts. (Download Anti-malware Software: http://
sec.sangfor.com/apt)
192.96.134.133 has undergone 4 threat(s). It is at the stage of C&C Communication currently. At this attack
stage, host is infected with malware and controlled by hacker.
Threat Details
● The host is most likely infected with malware. We are recommended to download anti-malware software
to scan for and remove malware on the potential infected hosts. (Download Anti-malware Software: http://
sec.sangfor.com/apt)
15
Security Report logologol
192.6.134.139 has undergone 2 threat(s). It is at the stage of C&C Communication currently. At this attack
stage, host is infected with malware and controlled by hacker.
Threat Details
Log Examples 2016-06-15 09:33:58 Host (192.168.183.188) is infected with virus Conficker.Worm. (2 occurrence(s))
● The host is most likely infected with malware. We are recommended to download anti-malware software
to scan for and remove malware on the potential infected hosts. (Download Anti-malware Software: http://
sec.sangfor.com/apt)
192.6.134.134 has undergone 2 threat(s). It is at the stage of C&C Communication currently. At this attack
stage, host is infected with malware and controlled by hacker.
Threat Details
● The host is most likely infected with malware. We are recommended to download anti-malware software
to scan for and remove malware on the potential infected hosts. (Download Anti-malware Software: http://
sec.sangfor.com/apt)
16
Security Report logologol
192.96.134.134 has undergone 2 threat(s). It is at the stage of C&C Communication currently. At this attack
stage, host is infected with malware and controlled by hacker.
Threat Details
● The host is most likely infected with malware. We are recommended to download anti-malware software
to scan for and remove malware on the potential infected hosts. (Download Anti-malware Software: http://
sec.sangfor.com/apt)
92.96.134.139 has undergone 2 threat(s). It is at the stage of C&C Communication currently. At this attack
stage, host is infected with malware and controlled by hacker.
Threat Details
● The host is most likely infected with malware. We are recommended to download anti-malware software
to scan for and remove malware on the potential infected hosts. (Download Anti-malware Software: http://
sec.sangfor.com/apt)
17
Security Report logologol
Server security is based on comprehensive analysis of all the security logs related to the internal servers in
protected zones. Server security rating falls into four types, namely, Hacked, Ever been attacked, Data ever
been harvested and Vulnerable. Endpoint security is based on comprehensive analysis of all network secur
ity logs related to all the hosts in protected zones, and rating also falls into four types, namely, Infected, Hi
gh, Medium and Low.Overall security is assessed according to server security and endpoint security, and t
he rating falls into the following:
● It indicates that severity of at least one server is rated Critical(hacked), or severity of at least one host
● It indicates that severity of at least one server is rated High(ever been attacked), or severity of at least
● It indicates that severity of at least one server is rated Medium(data ever been harvested), or severity
● It indicates that severity of at least one server is rated Medium(data ever been harvested), or severity
Impacts
Backlink
A backlink is a hidden hyperlink that links from a defaced webpage, back to a specific webpage or website,
also called inbound link. Backlink is generally used to illegitimately link to another website, or to obtain W
EBSHELL of websites with high Page Rank(PR) or weight in search engine after employing the vulnerabiliti
es on the web server. The attacker will then inject backlink that link to its own website. Backlink is no differ
ent from outbound link in nature, with the same purpose of getting higher page rank, but may cause legal
risk if website is linked to gambling, games, porn or other illegal contents.
18
Security Report logologol
Solution:
● Scan for and remove the backlink injections in HTML source codes
● Download anti-malware software, scan for and remove the backlink injected into the website (Download
Anti-Malware software: http://sec.sangfor.com/apt)
WEBSHELL Backdoor
The attacker takes advantage of the proved vulnerability on the web server and injects WebShell onto the
web server. With the help of WEBSHELL, the attacker could visit the database, execute system commands
and manipulate the web server in the long run.
Solution:
● Download anti-malware software, scan for and remove the potential WEBSHELL or viruses on the server
(Download Anti-Malware software: http://sec.sangfor.com/apt)
● Configure a corresponding web application protection rule and set Action to Deny.
Bot Controlled
Once a host is infected with worm, virus or Trojan, the host could be remotely controlled by the attacker w
ho may launch a variety of attacks(DoS, APT, etc.), aiming to destroy customer's network or crucial applic
ation system and steal confidential data.
Solution:
● Download anti-malware software to scan for and remove malware on the infected host. (Download Anti-malware Software:
http://sec.sangfor.com/apt)
The attacker employs advanced techniques to initiate intrusions and attacks against a specific enterprise n
etwork, with the purpose of stealing cooperate data. This type of attack is often more hidden, organized a
nd persistent, after long-term planning and operating. Since the attacker is very good at hiding, data theft
may turn to cyber spying eventually.
19
Security Report logologol
● SQL Injection: The attacker makes use of the vulnerability on database and steal data from it, causing
data and account leaks.
● Brute-force Attack: The attacker uses tools to perform brute-force attacks against the servers that are
with password-based authentication enabled. After attack success, the attacker can execute arbitrary com
mand through that server.
● XSS Attack: The attacker makes use of the vulnerability to execute command, obtain system running in
formation, create new system user account and enable remote control to control the web server.
Solution:
● Configure a corresponding web application protection rule and set Action to Deny.
● Configure a corresponding IPS rule and set action to Deny.
● Stages of Attack
● Severity Ratings
Ever been a No data proves that server has been hacked, but some logs show that intrusions
2 3-4
ttacked have ever occurred, such as SQL injection, brute-force login, WEBSHELL upload, etc.
Data ever b
3 No data proves that server has been hacked, but there is proof that data have been harvested. 2
een harvested
20
Security Report logologol
4 Vulnerable No data or log proves that server has been hacked, but server contains security vulnerabilities. 1
Bot Threat
● Stages of Attack
● Severity Ratings
10 Host visits malicious URL, domain name and IP address related to known m
alware, sends data out and may have infected database server.
Infected
Host is acting like a
1 9 Host visits malicious URL, domain name and IP address related to known m
host infected with
malware. alware, attempts to spread malicious file to other hosts.
7 Host launches outgoing DDoS attacks or visits suspicious Conficker domain names.
High
Host sends or receives suspicious packets related to malware, or spreads m
2 Host is most likely 6
alicious shellcode.
infected with malware
21
Security Report logologol
Host uses protocols related to malware(such as IRC, HFS, etc) and accesses
2
suspicious domain names or IP addresses related to malware.
Low
4 Host is less likely in
Abnormal traffic is detected, such as SSL protocol uses other ports rather th
fected with malware
an the standard port 443, but threat level is low. Host may visit phishing/fak
1
e websites/emails that steal accounts.
22