Risk
7/12/2012
07:53 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Commtouch Report Names Big Brands Misleadingly Utilized In The Distribution Of Malware

Researchers name brands that were abused in various third-party email attacks

SUNNYVALE, Calif., July 12, 2012 /PRNewswire/ -- Commtouch® (NASDAQ: CTCH), a leading provider of cloud-based solutions for security companies and service providers, today reported that its security analysts have seen substantial continued blending of big brand names with malware. In its July 2012 Commtouch Internet Trends Report, researchers named the following top seven brands that were abused in various third-party email attacks:

-- Amazon - Order confirmation emails that didn't describe the order, but only the balance -- AT&T Wireless -Wireless bill summaries mentioned large account balances -- Citi - Offered the ability to view your Citi credit card online, showing extremely high balances -- Classmates.com - Emails thanked the recipient for joining and provided links to confirm -- Craigslist - With varying email subjects, messages included plausible sounding Craigslist posts -- LinkedIn - Emails mixed pending LinkedIn invitations with messages awaiting responses -- Verizon Wireless - Bill summary emails that copied the AT&T Wireless approach (Logo: http://photos.prnewswire.com/prnh/20120501/529254 )

Movie Ticket Hoax Hides Malware on Dropbox

A further example of a blended email/Web malware attack includes usage of the well-known Dropbox storage/sharing network. The Spanish emails offer free movie tickets. Clicking on the links leads to several redirects and scripts. One of Dropbox's features allows users to create publicly available folders, which essentially turns Dropbox into a free hosting site. The use of the popular service in this way provides a powerful platform for malware distribution.

"It's clear that attackers continue to increasingly exploit the comfort level that people have gained with big online brands - and they're doing so in craftier and craftier ways," said Haniel Ilouz, vice president of global engineering at Commtouch. "Not only are easily recognized brands utilized, but clever fake collaboration between sites such as Facebook and Digg show the ever-innovative approaches attackers deploy."

The Commtouch report also details spam statistics, zombie hotspots and the top 10 malware. The report is compiled based on a comprehensive analysis of more than 10 billion transactions handled by Commtouch's GlobalView(TM) Cloud on a daily basis. To view the entire report, visit: http://www.commtouch.com/threat-report-july-2012.

About Commtouch

Commtouch® (NASDAQ: CTCH) safeguards the world's leading security companies and service providers with cloud-based Internet security services. Real-time threat intelligence from Commtouch's GlobalView(TM) Cloud powers its Web filtering, email security and antivirus solutions, protecting thousands of organizations and hundreds of millions of users worldwide. Visit www.commtouch.com.

-- Blog: http://blog.commtouch.com/cafe -- Facebook: www.facebook.com/commtouch -- LinkedIn: www.linkedin.com/company/commtouch -- Twitter: @Commtouch Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Commtouch is a registered trademark of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch. All other trademarks are the property of their respective owners.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web