Risk
1/21/2009
04:14 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

70 Of Top 100 Web Sites Spread Malware

Advice to visit only legitimate Web sites appears to be meaningless as increasing numbers of mainstream sites contain known malicious code.

Internet users are often encouraged to visit only legitimate Web sites to reduce the risk of malware infections, but distinguishing between legitimate and illegitimate Web sites increasingly appears to be meaningless.

Seventy percent of the top 100 Web sites either hosted malicious content or contained a link designed to redirect site visitors to a malicious Web site during the second half of 2008, claims Websense's report State of Internet Security, Q3-Q4, 2008.

That represents a 16% increase over the first half of 2008.

Perhaps more to the point, Websense says that 77% of Web sites with known malicious code are "legitimate" sites, calling into question the utility of any such designation of approval.

There are a variety of ways that brand-name sites can be compromised, including online iFrame injection services that rely on stolen logon information or SQL injection attacks.

Spam messages with malicious links can also lead to site compromises. According to Websense's report, almost 85% of e-mail messages were spam during the second half of 2008, and more than 90% of spam messages contained links to spam sites or malicious sites.

Only 6% of spam messages were phishing attempts, a 33% decrease from the first six months of 2008. Malware authors appear to be focusing more on data-stealing Trojans and DNS poisoning to accomplish their goals.

Porn-related spam surged 94% during the latter half of last year, a marketing gambit that appears to be consistent with porn industry poor-mouthing -- earlier this month, porn moguls made a show of stated plans to ask the U.S. government for a $5 billion financial bailout to shore up sagging sales. Porn spam, however, only represents 9% of the spam out there.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0999
Published: 2015-06-02
Sendio before 7.2.4 includes the session identifier in URLs in emails, which allows remote attackers to obtain sensitive information and hijack sessions by reading the jsessionid parameter in the Referrer HTTP header.

CVE-2014-8391
Published: 2015-06-02
The Web interface in Sendio before 7.2.4 does not properly handle sessions, which allows remote authenticated users to obtain sensitive information from other users' sessions via a large number of request.

CVE-2015-0759
Published: 2015-06-02
Cross-site request forgery (CSRF) vulnerability in Cisco Headend Digital Broadband Delivery System allows remote attackers to hijack the authentication of arbitrary users.

CVE-2015-0850
Published: 2015-06-02
The Git plugin for FusionForge before 6.0rc4 allows remote attackers to execute arbitrary code via an unspecified parameter when creating a secondary Git repository.

CVE-2015-1945
Published: 2015-06-02
Unspecified vulnerability in the Reference Data Management component in IBM InfoSphere Master Data Management 10.1, 11.0, 11.3 before FP3, and 11.4 allows remote authenticated users to gain privileges via unknown vectors.

Dark Reading Radio
Archived Dark Reading Radio
From Target to Sony to Anthem, they are happening all around you: the “big” data breaches that compromise critical data and threaten the welfare of the corporate brand. Is your organization ready to respond?