Updated date:

How to Monitor Your Website for Cyber-Attacks and Stop Them

Author:

This article is by Glenn Stok, a systems analyst with a Master’s Degree in Computer Science and hundreds of published educational essays.

Even though the United States has a Cyber Command for Cybersecurity, they still lack this simple solution to stop threats in their tracks.

Even though the United States has a Cyber Command for Cybersecurity, they still lack this simple solution to stop threats in their tracks.

Many companies fail to protect their websites from cyber-attacks, allowing hackers to find backdoor access to steal customer data. An extreme example was a data leak from a Facebook server in 2019 where hackers located personal information on 419 million users.1

I’ll show you a solution that I implemented on my website to block bots searching for ways to gain entry in real-time automatically.

How to Monitor a Website for Hacking Attempts

I have taken the following steps to monitor and stop attacks on my website as they happen. Of course, large corporations and government agencies can protect their computers that way too. But they don't, as evidence from all the reports of customer's data being stolen.

The process is so easy with code to monitor and discover cyber-attacks that seek to compromise security.

You might be familiar with the page on websites that tell you that you've reached a non-existent page. It's known as a 404 error page. If you click on a link to a page that no longer exists or mistype a URL, you will get that 404 error.

I used that error condition to capture information about visitors who got a 404 error. And more importantly, the software code I wrote tracks their activity in real-time to determine if they are attempting to hack into my database.

I capture info such as:

  • The visitors IP address
  • Their location in the world
  • The site and the page they were looking at before they came to my website
  • The page they were trying to see
  • The web browser they were using
  • Some of their system information

How can you make use of that info to block hackers? The trick is to automate it.

A large number of simultaneous 404 errors from the same IP address indicates possible hacking. When I look up their DNS authenticity, that sometimes shows, “Could be forged: hostname does not exist.” I find that to be an obvious clue that the visitor is up to no good.

It's quite easy to write a routine to block hacker bots automatically. I'll explain a little later how to automate the process to block hackers and stop cyber-attacks. But we need to start with a review of how to track hacking activity.

How to Track Hacking Activity on a Website

I programmed my website to send me emails of hacker attempts with all the data. So I can see what they are trying to achieve. It's usually a search to find a back door access, admin scripts, SQL database scripts, and PHP setup code. This type of activity indicates an attempt to gain access to my server through one of these routines.

I notice that these attempts always have IP addresses from foreign countries such as China, Japan, Bangladesh, India, Russia, Brazil, Ukraine, Lithuania, and Jordan. It’s rare to catch a hacker from the U.S.

Some of these attacks are so vicious they take up a lot of bandwidth, hitting hundreds of non-existent pages in seconds. They are hoping to find a backdoor entry to log in and get vital information.

I keep my customer records offline with no connection to the Internet in any way whatsoever. Besides, I don't have any scripts online that would allow access to my data, but the hackers don't know that.

You might be wondering why I get hit with these attacks. The criminals who run the code to do this are not going after any particular person or company. Instead, their bots scan randomly through all IP addresses, so they hit every computer server eventually, and websites run on computer servers.

They eventually will find a business or government website that is easy to penetrate. When they find an insecure website, they can plant executable code to search for useful information such as customer records.

How Hackers Get Access to Website Data

Since I have software to track what hackers are looking for, I have discovered a particular targeted search that happens almost every day. Hackers are searching for a file by the name of crossdomain.xml.

I don’t have that file on my server, but they keep scanning computers until they find it on any server somewhere. It may be a government installation or a big corporate office computer. Eventually, they find one that has this file, and once they do, they have a field day collecting data.

The purpose of the code in this file is to let users opt-in to allow other sites to read its data. Typically JavaScript, Flash, and Java limit reading data from the same website in the same domain. However, opting in to allow cross-domain data access is opening the door for trouble.

I am shocked that so many companies leave this code on their websites. And worse, they don't monitor it closely to know who is accessing it. Since I find hackers searching for this every day, I figure it must be quite prevalent. I wonder if some Webmasters don’t even realize they have it on their server.

While monitoring cyber-attack attempts on my site, I also see many bots searching for a way in through WordPress.

I don’t use WordPress. Instead, I write my own code. But hackers don’t know that, and their bots merely search for known WordPress vulnerabilities anyway.

About 70% of WordPress sites do not include security updates or use outdated WordPress software that is vulnerable to cyber-attacks. That statistic is from a study by Sandro Gauci, CEO of EnableSecurity.2 Hackers take advantage of that to deface or steal data.

How to Block Hackers and Stop Cyber Attacks

This last section is for web programmers who want to implement the code on their site. But anyone interested can follow along.

Make a 404.php file and specify that to be the page to display when someone clicks to a non-existent page or enters a non-existent page in their browser. That method will also capture bots that go around the Internet, searching for backdoor scripts that allow access.

Make the page display a friendly error telling a legitimate visitor that they stumbled upon a non-existent page. Include options to find their way around your website.

Now for the critical part:

Write PHP code that monitors hacker attacks. The method is to keep track of how many requests ended up with error-404's by the same IP address within a specified time—say 30 seconds.

If more errors occur than is a reasonable number for a human, it is most likely a cyber-hacker bot. Examine the requests for files that include SQL, admin, cross-domain, login, scripts, setup, and anything else that could provide a method of access to a hacker.

If there is a match, then you can safely assume this is a hacker. No one else would be looking for these types of scripts and getting continuous 404 errors while searching.

The next step of the PHP routine is to capture the following data:

  • The HTTP referrer (where they came from)
  • The redirect status (status code)
  • The HTTP user agent (browser info)
  • The server signature (webserver info)
  • Any other data you might want to track

Write additional PHP code that blocks that IP address. On an Apache server, you do that by adding a deny record to the "htaccess" file. That's the trick to block the hacker, and it takes just milliseconds.

You can also include PHP code to send the details of the hacker attempt to an administrator’s email address for follow-up, or you can post that information to a report file that can print out later for review.

A Central Database of Hacker IP Addresses Is Strongly Needed

It would be helpful to share the IP addresses collected from hackers with other field office computers. That way, they can block any discovered hackers too.

With this method, cyber hackers can be stopped in real-time before they succeed in getting through and compromising a server. If they try again from a different IP address, that too will be blocked in real-time. They won't have a chance!

Another way to enhance this implementation is to send hacker's IP addresses to a central database. I think the United States Cyber Command for Cybersecurity would be just the right place for that!

There presently are several sites where you can report hackers. Even the FBI has an online “File a Complaint Center” that includes reporting computer intrusions and hacking.3 However, the data has to be entered by a human, and it's time-consuming. I wish webmasters could use an API send data to that in real-time when it happens, but they don't provide an interface to do that.

I think all Webmasters need to work together to control cybercrime. Then, they can shut the door to these attacks, and the Internet can be much more secure for us all.

Real-Time World Map of Internet Attacks

References

  1. Priyanshu Sahay. (April 4, 2021). “Facebook Data Hacked – 500 Million Accounts Leaked Online.” HackersOnLineClub.com
  2. Wayne Mullins. (January 2, 2020). “How to increase security while developing a WordPress site” - UpdraftPlus
  3. FBI Internet Crime Complaint Center


This content is accurate and true to the best of the author’s knowledge and is not meant to substitute for formal and individualized advice from a qualified professional.

© 2011 Glenn Stok

Related Articles