The number of SQL Injection attacks seen by one vendor increased by two-thirds between Q1 and Q2 this year.
According to secure cloud hosting company FireHost, its users were protected from a total of 17 million cyber attacks during the period of April to June 2012. It also claimed that there was a 69 per cent increase in SQL Injection attacks between Q1 and Q2, rising from 277,770 blocked attacks to 469,983.
Chris Hinkley, senior security engineer at FireHost, said that as SQL Injection attacks are often automated, many website owners may be blissfully unaware that their data could actively be at risk.
“These attacks can be detected and businesses should be taking basic and blanket steps to block attempted SQL Injection, as well as the other types of attacks we frequently see,” he said.
The recent password breach of Yahoo! Voices was enabled by a union-based SQL injection vulnerability in the application, leading to 400,000 Voices account usernames and passwords being stolen and published online.
Todd Gleason, director of technology at FireHost, said: “Some of the data theft incidents that are reported in the media are precisely targeted, but a more substantial risk to most comes from an abundance of automated, malicious bots that attack websites in a more random fashion.”
Recent research by White Hat Security found that while SQL injection is a prevalent website vulnerability, it only affects 11 per cent of websites and flaws are fixed in an average of 53 days. It claimed that five per cent of all websites it evaluated had at least one SQL injection vulnerability that was exploitable without first needing to login to the website.
The April 2012 'State of Software Security Report' from Veracode, said that SQL injection remains one of the two most frequently exploited vulnerability types (along with cross-site scripting), with a statistically flat incidence rate from the first quarter of 2010 to the fourth quarter of 2011.