Threat Trends for 2008
Secure Computing Corporation, a leading enterprise gateway security company, published the company’s Q2 Internet Threat Report containing data and analysis from the Secure Computing research team. Among other findings, the report shows that while spam volume and new zombies have decreased in the past quarter, enterprises and home users are increasingly being attacked through malicious Web content and blended security attacks.
The Secure Computing report states that even though the overall spam volume is up 280 % from Q2 2007 to Q2 2008, spam volumes have decreased by 40 % this quarter. In addition, Q2 of 2007 witnessed over 300,000 new zombies per day, and during the second quarter of 2008 Secure saw half that amount. Even though both spam and new zombies are down this year, Secure Computing researchers point to other areas that are increasingly problematic, including:
* Over 16 % of all spam originates from the U.S., more than twice the amount of the No. 2 country — Russia.
* Male enhancement, product replica, and prescription drug spam hold the top three places of types of spam.
* Swizzor, a rapidly growing ad/spyware family, now makes up more than 30 % of all new malware in Q2 of 2008.
* The ZBot spyware family is another such ad/spyware family that has grown significantly this quarter. ZBot steals users’ sensitive data while establishing a backdoor on infected computers to give the attackers full control over compromised systems.
50 % of all websites are now published in languages other than English
“We are witnessing change every single day in how the cybercriminals are developing new vectors of attack through spam, malicious Web content, spyware and botnet deployments,” said Dmitri Alperovitch, director of intelligence analysis at Secure Computing.
Summary of Key Threats:
The threats challenging the enterprise today are becoming a blended variety that challenge both email and Web security. Without integrated and correlated protection between the two, the ability to stay ahead of these threats will become increasingly difficult.
Threats are becoming more and more sophisticated as recipients of threats are better educated on what to look for. Users are more cautious and this has lead to a rise in more cunning ways to harvest personal information without users’ apparent involvement.
Spammers are continuing to use pop culture and current events (elections, Olympics) to entice end users into responding or clicking on links whose sole purpose is to download malware.
Threats are and will continue to be driven by financial motivations. No matter what the threat is, or how it is delivered, the perpetrator is almost always looking for financial gain.
In an effort to address these threats, Secure Computing researchers recommend that both enterprises and consumers assure their software and patches are up-to-date, and that they implement a multi-layered approach to preemptively detect and block attacks.
Internet Threats: Menace for Organizations
- Predictions for RPA in Financial Services in 2018
- Which Sector Will Be The First To Go 100% Robot?
- SpiderOak CEO Warns Of 10 Cybersecurity Threats For 2018
- Stratus Unveils Edge Computing Strategy
- 70% Consumers Stop Following A Business After Data Breach: Study
- CISOs, Beware Of Crime-as-a-Service, IoT Threats In 2018
- Multi-Cloud Environments Force CIOs To Rethink Cloud Strategies
- How E-Commerce Can Deliver Exceptional Experiences
- Weekly Rewind: Top 10 Stories On CXO Today (Nov 6-11)
- Transforming Business With Cloud Migration