07:53 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

Commtouch Report Names Big Brands Misleadingly Utilized In The Distribution Of Malware

Researchers name brands that were abused in various third-party email attacks

SUNNYVALE, Calif., July 12, 2012 /PRNewswire/ -- Commtouch® (NASDAQ: CTCH), a leading provider of cloud-based solutions for security companies and service providers, today reported that its security analysts have seen substantial continued blending of big brand names with malware. In its July 2012 Commtouch Internet Trends Report, researchers named the following top seven brands that were abused in various third-party email attacks:

-- Amazon - Order confirmation emails that didn't describe the order, but only the balance -- AT&T Wireless -Wireless bill summaries mentioned large account balances -- Citi - Offered the ability to view your Citi credit card online, showing extremely high balances -- Classmates.com - Emails thanked the recipient for joining and provided links to confirm -- Craigslist - With varying email subjects, messages included plausible sounding Craigslist posts -- LinkedIn - Emails mixed pending LinkedIn invitations with messages awaiting responses -- Verizon Wireless - Bill summary emails that copied the AT&T Wireless approach (Logo: http://photos.prnewswire.com/prnh/20120501/529254 )

Movie Ticket Hoax Hides Malware on Dropbox

A further example of a blended email/Web malware attack includes usage of the well-known Dropbox storage/sharing network. The Spanish emails offer free movie tickets. Clicking on the links leads to several redirects and scripts. One of Dropbox's features allows users to create publicly available folders, which essentially turns Dropbox into a free hosting site. The use of the popular service in this way provides a powerful platform for malware distribution.

"It's clear that attackers continue to increasingly exploit the comfort level that people have gained with big online brands - and they're doing so in craftier and craftier ways," said Haniel Ilouz, vice president of global engineering at Commtouch. "Not only are easily recognized brands utilized, but clever fake collaboration between sites such as Facebook and Digg show the ever-innovative approaches attackers deploy."

The Commtouch report also details spam statistics, zombie hotspots and the top 10 malware. The report is compiled based on a comprehensive analysis of more than 10 billion transactions handled by Commtouch's GlobalView(TM) Cloud on a daily basis. To view the entire report, visit: http://www.commtouch.com/threat-report-july-2012.

About Commtouch

Commtouch® (NASDAQ: CTCH) safeguards the world's leading security companies and service providers with cloud-based Internet security services. Real-time threat intelligence from Commtouch's GlobalView(TM) Cloud powers its Web filtering, email security and antivirus solutions, protecting thousands of organizations and hundreds of millions of users worldwide. Visit www.commtouch.com.

-- Blog: http://blog.commtouch.com/cafe -- Facebook: www.facebook.com/commtouch -- LinkedIn: www.linkedin.com/company/commtouch -- Twitter: @Commtouch Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Commtouch is a registered trademark of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch. All other trademarks are the property of their respective owners.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

Published: 2014-07-10
Cross-site scripting (XSS) vulnerability in viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308.

Published: 2014-07-10
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.