Kompromittierte Webanwendungen

Web applications are all programmes and subprogrammes that are accessed and used via the Internet. These include websites, contact forms, advertisements placed on websites, moving images, and much more. Like all programmes, web applications also have vulnerabilities that can be exploited – compromised – by cybercriminals for their own purposes. A web application that has been compromised in this way can, for example, redirect a visitor to another website, offer them malware for download under false pretences, or spy on their data in order to take over their user account on the compromised website.

 

What does this mean in detail?

There are different terms for compromised web applications. For example: web application attacks, attacks on web applications.

The most common forms of attack include:

  • Cross-site scripting: a vulnerability is exploited to smuggle in a program that is executed when the web application is called up.
  • SQL injection: malicious SQL code is entered into an input mask of the web application. If successful, the cybercriminal can access the SQL database connected to the web application.
  • Malvertising: Online advertising containing malware is placed on a website.

 

Cybercriminals particularly like to exploit vulnerabilities in widely used web applications. These include content management systems such as WordPress.

 

Where do I encounter this issue in my everyday work?

In your everyday work, you may repeatedly come into contact with compromised web applications. For example, if you click on an interesting advertisement that prompts you to update your Flash Player and provides you with a link to do so, you are probably dealing with a compromised web application. (Always download updates directly from the manufacturer’s website for the respective programme and access this page manually.) However, your own company website can also be compromised. For example, if cybercriminals exploit a vulnerability in your server or obtain one or more passwords from other sources. Or, if you use a content management system such as WordPress, as many companies do, if a vulnerability in the content management system is exploited.

 

What can I do to improve my security?

Important rules for your own use of web applications:

  • Never click on online advertisements.
  • Always download updates directly from the manufacturer’s website, which you access manually.
  • Keep your browser (e.g. Firefox, Microsoft Edge, Safari, Google Chrome) up to date and install updates immediately whenever possible.

 

Important rules for your company website:

  • Keep all systems up to date and install updates immediately whenever possible.
  • If you place advertisements, have them thoroughly checked for malware and dubious links.
  • Use secure, unique passwords.
  • Consider using a web application firewall.