Those Vulnerable 3rd-Party Web Services

Just when you think things are getting safer on the web, somebody comes up with a startling claim and spoils your party: “Our analysis paints a somewhat bleak situation on the state of modern web ecosystem.” That’s the conclusion of a 2016 study conducted by Carnegie Mellon University. The full title is worth noting:

Oh, What a Fragile Web We Weave:
Third-party Service Dependencies In Modern Webservices and Implications

We’ll save you the trouble of the long read and give you the highlights in this manageable blog post. The authors did some in-depth research on the subject. Their findings may surprise you.

Not As Robust As We Thought

All those network security guys out there seem to know a lot. Look around on the web and you can read all kinds of information about how to assess and protect against vulnerabilities. And we’ve covered a lot of them in this blog. We’ve written about the top 10 web application security risks as defined by the OWASP project. We’ve discussed the need for redundancy and proactive maintenance. And we’ve told you about such things as server hardening and change management. We’ve tried to cover all the bases. But here’s another issue that shouldn’t be overlooked:  third-party web services.

“Internet infrastructure may be fairly resilient thanks to its distributed nature, but the web we’ve built on top of it appears to be rather fragile.”

What are third-party services? There must be a lot of them out there, but the researchers focused on three of them:  domain name systems (DNS); certificate authorities (CAs); and content delivery networks (CDNs). As the British website The Register points out in their report on this study, “Internet infrastructure may be fairly resilient thanks to its distributed nature, but the web we’ve built on top of it appears to be rather fragile.” The real “painful truth”, as the writer of the article puts it, is that third-party services like these are the “Achilles Heel” for top websites.

Case in Point:  Dyn

The poster child for third-party vulnerability is a company called Dyn. In 2016, there was a “mega-attack” on the service provider that shook the foundations of the internet. Ok, that may be an overstatement. But the issue was big enough to reach the desk of the US Director of National Intelligence at the time, James Clapper. He told CBS that the DDoS attack on Dyn was likely the work of “non-state actors”. Some group called New World Hackers claimed responsibility.

Dyn claims on their website that they have “the world’s most trusted DNS product suite”. We don’t want to disparage Dyn here. In fact, their claim may very well be true. They say that they are “trusted by the best”, and list some famous companies as customers.

The introduction to the study gives us more information about the attack: “Dyn hosted the authoritative nameservers for many popular web services, such as PayPal, Twitter, and Github and as a result they were inaccessible to a sizable part of the East Coast.” There seemed to be a cascade effect since many other web services were also dependent on Dyn. As the authors stated, “the incident resulted in a massive impact on the availability of many popular web services.”

This major internet outage was caused by an attack on a third-party web service provider. DNS translates IP addresses into the website names that we type into the top of our browsers. Without the domain name service, the websites may as well be down — because nobody can get to them!

Wakeup Call

This major DDoS attack was a wake-up call for the internet.  So the researchers at Carnegie Mellon dug in and analyzed the real situation out there. What are the risks related to third-party service providers? Here is what they found:

  1. 73.14% of the top 100,000 popular services are vulnerable.
  2. The use of third-party services is concentrated, so if the top-10 providers are affected it could hit many of the top 100,000 websites.
  3. Something called “transitive dependencies” can make the impact more widespread.
  4. Targeting even less popular web services can also cause significant collateral damage.

The authors distinguish between two types of dependencies. An example of a direct dependency, they say, is where a web service like Spotify uses Dyn as its DNS provider. Then there are “indirect or transitive dependencies that consider ‘multi-hop’ effects; e.g., loading Netflix.com entails loading Symantec which in turn depends on Verisign for DNS.” It is a tangled web.

Recommendations

The findings were pretty clear. The internet is at risk. And third-party services are the weak spot. The paper’s recommendations are:

  1. Web service companies should add more redundancy in terms of third-party services. (Getting a backup DNS provider, for instance, is a pretty good idea.) Website managers should also keep an eye out for hidden dependencies.
  2. Third-party service providers should become more transparent in their reporting.

Conclusion

The research paper goes into much more detail about such things as their methods and motives. They also mention something about the “attack surface” of a web service provider. To find out your attack surface, perhaps you should ask the question “Where can they hit us?” In this case, the authors — and the Dyn example — prove very clearly that attackers can hit us in unexpected places. Third-party services is definitely one of them.


Total Uptime offers Web Services protection with our Web Application and API Protection (WAAP) service.

Protect your App with our WAAP!

TRY IT FREE