61
Internet Threats Trend Report July 2011 The October 2011 Internet Threat Report is now available! Click here to view

July 2011 Internet Threats Trend Report

  • Upload
    cyren

  • View
    5.278

  • Download
    2

Embed Size (px)

DESCRIPTION

The Commtouch Quarterly Trends Threat Report provides insight on the latest spam, malware, phishing schemes and other web security threats. The July 2011 edition provides analysis of Internet security threats that occurred during the second quarter of 2011. You can download the complete report at http://www.commtouch.com/threat-report-July 2011.

Citation preview

Page 1: July 2011 Internet Threats Trend Report

Internet Threats

Trend Report

July 2011

The October 2011 Internet Threat Report is now available!

Click here to view

Page 2: July 2011 Internet Threats Trend Report

July 2011 Threat Report

The following is a condensed version of the July 2011 Commtouch

Internet Threats Trend Report

Download the complete report at www.commtouch.com/threat-report-July2011

Copyright© 2011 Commtouch Software Ltd. Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks,

and Commtouch, Authentium, Command Antivirus and Command Anti-malware are registered trademarks, of Commtouch.

U.S. Patent No. 6,330,590 is owned by Commtouch.

Page 3: July 2011 Internet Threats Trend Report

July 2011 Threat Report

Key Highlights

Trends Spam, Malware, Web Security, Compromised Websites, Phishing, Zombies and Web 2.0

Feature Where did all the spam go?

1

2

3

Page 4: July 2011 Internet Threats Trend Report

Key Highlights for Q2 2011

Page 5: July 2011 Internet Threats Trend Report

Key Security Highlights

Average daily spam/phishing emails sent

113 billion

Average daily spam down from Q1

Lowest level in 3 years

Page 6: July 2011 Internet Threats Trend Report

377,000 Zombies

Zombie daily turnover

Key Security Highlights

Number of zombies turned off and on daily - up significantly from 258,000 in Q1

Page 7: July 2011 Internet Threats Trend Report

Most popular blog topic on user generated content sites

Streaming media/ downloads

Key Security Highlights

The streaming media & downloads category includes sites with live or archived media for

download or streaming content, such as Internet radio, Internet TV or MP3 files.

(No Change)

Page 8: July 2011 Internet Threats Trend Report

Key Security Highlights

Most popular spam topic

Pharmacy Ads

While it was the most popular spam topic, it was down to only 24% of all spam, compared to 28% in Q1

Page 9: July 2011 Internet Threats Trend Report

Country with the most Zombies

India

Key Security Highlights

India continues to lead with 17% of all Zombies

(No Change)

Page 10: July 2011 Internet Threats Trend Report

Website category most likely to be compromised with malware

Pornography and sexually explicit material

Key Security Highlights

Page 11: July 2011 Internet Threats Trend Report

Feature…

Where did all the spam go?

Page 12: July 2011 Internet Threats Trend Report

• Q2 spam was at its lowest level in 3 years

• June’s spam level (106 billion)

• At its lowest point in June, spam accounted for 75% of all emails

Q2 2011 Spam Trends

Source: Commtouch

Ave

rage

dai

ly s

pam

em

ails

sen

t

Page 13: July 2011 Internet Threats Trend Report

Q2 2011 Spam Trends

Source: Commtouch

Spam Levels & Spam Percentage March - June, 2011

MAR APR MAY JUN

Spam

Ham

%spam16th MarRustock

takedown

Page 14: July 2011 Internet Threats Trend Report

• Indications are that spammer tactics are changing

• Mid-March 2011 Microsoft led takedown of the Rustock botnet immediately dropped spam levels by 30% to an average of 119 Billion messages per day

• In past, such takedowns have resulted in only temporary spam level drops, followed by increased activity to build new botnets and resume mass mailings

Q2 2011 Spam Trends

Page 15: July 2011 Internet Threats Trend Report

• Other changes in Q2 spam activity • Rustock takedown followed by large increases in

email-borne malware • Number of zombies activated daily more than

doubled in weeks following the malware outbreaks • Increased zombie horde not used for vast spam

mailings (hence the declining spam numbers) but instead for smaller malware distribution attacks

• Spam coming from compromised or spammer accounts as well as compromised mail servers has increased

Q2 2011 Spam Trends

Page 16: July 2011 Internet Threats Trend Report

Q2 2011 Spam Trends

A percentage of emails from Gmail and Hotmail actually come from genuine accounts – compromised accounts or accounts specifically created by spammers

Analysis of Compromised Accounts

• Almost 30% of the spam from Hotmail actually comes from compromised or spammer Hotmail accounts

• Gmail spam mostly from zombies that simply forge Gmail addresses

Source: Commtouch

Page 17: July 2011 Internet Threats Trend Report

Q2 2011 Spam Trends

Analysis: Things are different this time as spammers are changing their tactics

Download the complete July 2011 Internet Threats Trend Report for a complete review

of the changing tactics of cybercriminals www.commtouch.com/threat-report-July2011

Page 18: July 2011 Internet Threats Trend Report

Trends in Q2 2011…

Spam Trends

Page 19: July 2011 Internet Threats Trend Report

Spam Trends

Spam Sending Domains

Commtouch monitors domains used by spammers in the “from” field of the spam emails, typically faked in order to give the impression of a reputable, genuine source.

Page 20: July 2011 Internet Threats Trend Report

Spam Trends

Top Faked Spam Sending Domains*

Source: Commtouch

* The domains that are used by spammers in the “from” field of the spam emails.

• NOTE “ups.com” in 14th place due to very large numbers of fake UPS notification emails sent in Q2

• See more details on the UPS outbreak in this quarter’s complete Internet Threats Trend Report

Page 21: July 2011 Internet Threats Trend Report

Spam Trends

• Pharmacy spam remained in the top spot but dropped to only 24% (down from 28% in Q1 2011)

• 419 fraud, phishing, and pornography all increased

Source: Commtouch

Spam Topics

Page 22: July 2011 Internet Threats Trend Report

Spam Trends

• Q2 2011 also saw the emergence of e-cigarette spam

French email above promotes health benefits of e-cigarettes due to the absence of 4,000 unwanted substances found in a normal cigarette

Page 23: July 2011 Internet Threats Trend Report

Trends in Q2 2011…

Malware

Page 24: July 2011 Internet Threats Trend Report

• End of Q1 2011 • Enormous outbreaks of email-borne malware

(up to 30% of global email traffic) • Initial attachments were “UPS package notifications” • Then the subjects changed to “DHL package notifications”

• Start of Q2 2011 • Attacks continued on smaller

scale • Switched to “FedEx

notifications”

Q2 2011 Malware Trends

Page 25: July 2011 Internet Threats Trend Report

Examples of Malware

• Email appears to be from IRS (US government income tax authority)

• Message informs recipients their tax payments via electronic payment system rejected

• Link provided to receive a “tax transaction report” (actually a .exe file described as a self extracting PDF file )

Attack: IRS Payment Rejected

Purpose: Most likely password theft

How it works:

Page 26: July 2011 Internet Threats Trend Report

Examples of Malware

• Links lead to one of 2,500 domains registered in the 48 hours before the attack

• Upon pressing the link, users gets to a page with a “404 not found” message, which hides the script that starts the virus download

Page 27: July 2011 Internet Threats Trend Report

Examples of Malware Attacks

• Targets financially knowledgeable victims using the term “stat arb” (foreign exchange trading term) in the subject

• Extracted file appears to be a PDF, but actually an executable file

• When file runs, actually shows a non-malicious PDF file in a fake PDF reader window

Attack: PDF Malware

Purpose: Capture keystrokes and browser activity

How it works:

Page 28: July 2011 Internet Threats Trend Report

Examples of Malware Attacks

Fake PDF file and reader

Email with attachment

Page 29: July 2011 Internet Threats Trend Report

Malware Trends

Source: Commtouch

Top 10 Malware of Q2 2011

Rank Malware name Rank Malware name

1 IFrame.gen 6 W32/Worm.MWD

2 W32/Ramnit.E 7 W32/VBTrojan.17E!Maximus

3 W32/Worm.BAOX 8 W32/Ramnit.D

4 W32/RAHack.A.gen!Eldorado 9 W32/Mydoom.O@mm

5 W32/Sality.gen2 10 W32/Vobfus.L.gen!Eldorado

Page 31: July 2011 Internet Threats Trend Report

Trends in Q2 2011…

Web Security

Page 32: July 2011 Internet Threats Trend Report

Q2 Threats

The Pros: • Trusted friend environment means users don’t suspect

a message is coming from a compromised account

The Cons: • Need compromised accounts to access other accounts • Friend networks rarely exceed a few hundred people • Facebook has implemented mechanisms to detect

multiple simultaneous messages postings

Facebook’s vast and ever-increasing user base continues to attract cybercriminals

Page 33: July 2011 Internet Threats Trend Report

Q2 Facebook Threats

Several techniques combined with social engineering elements were used to compromise Facebook user accounts in Q2 and increase the scale of attacks.

Exploits in Q2 2011

Page 34: July 2011 Internet Threats Trend Report

Q2 Facebook Threats

Example: Osama Bin Laden death exploited by Affiliate Marketing Groups

• Goal of exploit:

Affiliates earn money by driving victims to sites that pay

bonuses based on clicks or successful sign-ups

• How exploit worked:

Initial Osama-themed messages sent from several

compromised accounts and then quickly spread to draw

users to the affiliated sites (see flow on next slide)

Page 35: July 2011 Internet Threats Trend Report

Q2 Facebook Threats

User receives message or event invitation from friend promising video of Bin Laden death. Message tricks user into running a malicious JavaScript while Facebook open.

With access to user’s friends, malware sends out more invitations to continue the cycle.

Site then quickly redirects to an affiliate marketing page.

1

2

3

4

Infected user lead to a site with YouTube clip of President Obama announcing operation.

Osama Bin Laden Affiliate Marketing Exploit

Page 36: July 2011 Internet Threats Trend Report

Q2 Facebook Threats

Osama Bin Laden – users run this script

Page 37: July 2011 Internet Threats Trend Report

Q2 Facebook Threats

Additional Facebook exploits in Q2:

• See who’s been viewing your profile • Free Facebook credits • How many girls and boys have viewed your wall

Download the complete July 2011 Internet Threats Trend Report for more details on these exploits www.commtouch.com/threat-report-July2011

Page 38: July 2011 Internet Threats Trend Report

Other trends in Q2 2011…

Compromised Websites

Page 39: July 2011 Internet Threats Trend Report

Compromised Websites

• Compromised websites being used to hide phishing pages and malware

• Benefits to the cybercriminal • Legitimate domains most likely have a good

reputation in URL filter engines, so not likely to be blocked

• Provides FREE hosting

Trends in Compromised Websites

Page 40: July 2011 Internet Threats Trend Report

Compromised Websites

Example: iPhone 5 Virus (May 2011)

• Malicious email distributed with promise of details regarding soon to be released “iPhone 5G S”

• Images and links in email point to a file “iphone5.gif”, but it is actually a malware file “iphone5.gif.exe”

Page 41: July 2011 Internet Threats Trend Report

Compromised Websites

Example: iPhone 5 Virus (May 2011)

• Examination of the link reveals malware is hidden inside a compromised, legitimate website (see image)

Page 42: July 2011 Internet Threats Trend Report

Website categories infected with malware

Compromised Websites

Rank Category

1 Pornography/Sexually Explicit

2 Parked domains

3 Portals

4 Education

5 Entertainment

6 Business

7 Health & Medicine

8 Travel

9 Computers & Technology

10 Fashion & Beauty

Portals category includes sites offering free homepages, which are abused to host phishing and malware content.

Page 44: July 2011 Internet Threats Trend Report

Other trends in Q2 2011…

Phishing Trends

Page 45: July 2011 Internet Threats Trend Report

Phishing Trends

Phishing Trends

• Phishing attacks continued to target

• Local and global banks

• Web email users

• Facebook accounts

• Online gaming sites

Page 46: July 2011 Internet Threats Trend Report

Phishing Trends

• Users asked to enter their credentials to overcome a security warning on the page

• Entering credentials, they provide the phisher with valid Facebook access details that can be used or sold to other cybercriminal

Example – Facebook Phishing Page

Page 47: July 2011 Internet Threats Trend Report

Phishing Trends

Improved Phishing Sites

• In an attempt to provide protection from keyloggers, some financial institutions provide a virtual keyboard which users must use to enter their login information and passwords

• Phishers have now added these keyboards to their phishing pages (see example on next page)which mimic the original

Page 48: July 2011 Internet Threats Trend Report

Phishing Trends

Improved Phishing Sites

Fake Abu Dhabi Commercial Bank (ADCB) site complete with reproduced virtual keyboard

Page 49: July 2011 Internet Threats Trend Report

Website categories infected with phishing

Compromised Websites

Rank Category

1 Games

2 Portals

3 Shopping

4 Forums/Newsgroups

5 Non-profits & NGO

6 Fashion & Beauty

7 Leisure & Recreation

8 Sports

9 Education

10 Business

Portals category includes sites offering free homepages, which are abused to host phishing and malware content.

Page 51: July 2011 Internet Threats Trend Report

Trends in Q2 2011…

Zombie Trends

Page 52: July 2011 Internet Threats Trend Report

Zombie Trends

• Average of 377,000 zombies newly activated each day for malicious activity

• Substantial increase compared to the 258,000 in Q1

Daily Turnover of Zombies in Q2

Source: Commtouch

Page 53: July 2011 Internet Threats Trend Report

Zombie Trends Worldwide Zombie Distribution in Q2

• India remains atop the list with 17% • Brazil, Vietnam, and the Russian federation all remained in the

same places • Peru and Argentina dropped out of the top 15 replaced by Romania

and Morocco

Source: Commtouch

Page 54: July 2011 Internet Threats Trend Report

Zombie Trends

• As IPv4 addresses reach exhaustion, IPv6 addresses will begin to become more prevalent

• Vast number of IPs available to a zombie makes blocking of a specific IP, associated with a Zombie, impossible

• Blocking a range of IPs has issues • May block other users/devices that are not malicious

(i.e.: generates false positives) • No standard IP range allocation currently defined – it is

therefore difficult to know how wide a range of IPs should be blocked

Zombies and IPv6

Page 55: July 2011 Internet Threats Trend Report

Zombie Trends

• Commtouch has begun to monitor spam received from IPv6 sources and future Internet Threat Trend Reports may include relevant data as IPv6 traffic grows

• Two on-demand webcasts are available from Commtouch providing information on IPv6 and potential threats:

• An introduction to IPv6

• Overview of IPv6 threats

Zombies and IPv6

Page 56: July 2011 Internet Threats Trend Report

Trends in Q2 2011…

Web 2.0 Trends

Page 57: July 2011 Internet Threats Trend Report

Web 2.0 Trends

Most Popular User Generated Content Sites

Rank Category %

1 Streaming Media & Downloads 21%

2 Entertainment 9%

3 Computers & Technology 8%

4 Pornography/Sexually Explicit 5%

5 Shopping 5%

6 Arts 4%

7 Fashion & Beauty 4%

8 Religion 4%

9 Sports 4%

10 Restaurants & Dining 4%

11 Education 3%

12 Leisure & Recreation 3%

13 Health & Medicine 3%

14 Games 2%

Source: Commtouch

Page 58: July 2011 Internet Threats Trend Report

Review of Q2 2011

Page 59: July 2011 Internet Threats Trend Report

Review of Q2 2011

Source: Commtouch

Page 61: July 2011 Internet Threats Trend Report

For more information contact: [email protected]

650 864 2000 (Americas) +972 9 863 6895 (International)

Web: www.commtouch.com

Blog: http://blog.commtouch.com