Attacks/Breaches
5/24/2012
01:47 PM
50%
50%

Android Malware Surges, Botnet Business Booms

McAfee reports thousands of new malware apps targeting Android appeared early this year, along with a steady stream of botnet updates.

The volume of malware surged in the first three months of 2012. In particular, there's been a flood of new types of rootkits, password-stealing Trojan applications, malware targeting Android users, and botnet infections.

This finding comes by way of a new report from security vendor McAfee.

"Malicious code is on the rise again, plain and simple," said David Marcus, director of security research for McAfee Labs, in a related blog post. "We are seeing more malware than in the recent past, and you can count on that figure to rise in the coming year. In particular, mobile platforms present today's cybercriminal with an almost irresistible target, specifically Android-based for now, but that can certainly evolve."

[ Cyber-scams and malware are expected to escalate as we approach the 2012 Olympics. Read more at London 2012 Olympics Scammers Seek Malicious Gold . ]

The number of new malicious applications targeting mobile devices leapt from about 500 in the fourth quarter of 2011 to over 6,000 in the first quarter of 2012. The jump was targeted almost solely at the Android platform, according to the McAfee report. It also noted that the vast majority of Android malware targets mobile users based in Russia and China, and comes not via the official Google Play application store but via third-party sources.

From a corporate information security standpoint, the most prevalent types of network-based attacks seen between January and the end of March 2012 were remote procedure calls, SQL injection attacks, and browser cross-site scripting (XSS) attacks.

Geographically, the United States took top marks when it came to SQL injection attacks, both as the region from which most of these attacks were launched and as the biggest target. The United States also saw the largest number of machines compromised by botnets, which, as McAfee reported, are "often used as a proxy for spam, botnets, denial of service, or other types of malicious activities."

On the good news front, spam volumes have recently been decreasing, with McAfee recording about 1 trillion spam messages circulating worldwide per month. Decreases were most significant in Brazil, Indonesia, and Russia, while increases in spam were found in China, Germany, Poland, Spain, and the United Kingdom, according to the report. The United Kingdom in particular is no surprise, given the increase in spam, phishing, and malware attacks that are related to the July 2012 Summer Olympics that will be happening in London.

If spam volumes are down, however, botnet activity is up. All told, McAfee saw about 5 million new botnet infections--2 million alone due to the Cutwail (a.k.a. Pushdo) botnet--during the first three months of 2012. The biggest increase in the overall number of botnet infections, meanwhile, was in Columbia, Japan, Poland, Spain, and the United States.

Without a doubt, the botnet business is booming--and for a price, anyone can buy in. For example, McAfee researchers found that a botnet known as Citadel, available via a malware-as-a-service model, costs $2,400, plus $125 for renting the required "bot builder and admin panel." Meanwhile, for an additional $395, users can add an upgrade that brings "automatic updates for antivirus evasion," according to the McAfee report, although each update then costs $15.

First detected in December 2011 and based on the published Zeus financial malware source code, Citadel has quickly become one of the most rapidly adopted profit-driven attack toolkits, meaning it's designed to separate consumers from their bank account and credit card details.

Meanwhile, the price of the Darkness botnet marketed by "SVAS/Noncenz," which is designed for launching distributed denial-of-service (DDoS) attacks against websites, starts at $450--with no free updates or add-on modules--but can rise to $1,000 for lifetime free upgrades and an attack module that will grab passwords from infected PCs.

Finally, the latest version of the Carberp financial botnet, which is designed to steal bank account data or even Facebook e-cash vouchers, costs $2,500. While Russian authorities announced on March 20, 2012, that they'd arrested the gang behind Carberp, the new version debuted the next day.

Think your corporate website isn't vulnerable to a SQL injection attack? Start rethinking. SQL injection is among the most prevalent--and most dangerous--techniques for exploiting Web applications and attacking back-end databases that house critical business information at companies of every size. In our Stop SQL Injection report, we explain how SQL injection works and how to secure your Web apps and databases against it. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.