Vulnerabilities / Threats
4/20/2012
01:53 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Websense 2012 Threat Report: How Cybercriminals Are Infecting Networks And Stealing Data Undetected

Eighty-two percent of malicious websites are hosted on compromised hosts, according to report

SAN DIEGO—April 19, 2012—Research released today by the Websense® Security Labs™ in the Websense 2012 Threat Report reveals the trifecta that is driving epidemic levels of data theft: 1) extremely effective social media lures; 2) evasive and hard-to-detect infiltration of malware; and 3) sophisticated exfiltration of confidential data. The report provides real-world examples, and offers practical advice to IT security practitioners.

“Traditional defenses just aren’t working any more. Organizations need real-time defenses with multiple detection points that deeply analyze both the inbound content of each website and email as well as the outbound transmission of sensitive data,” said Charles Renert, vice president of research and development for Websense. “Nearly all data-stealing attacks today involve the web and/or e-mail. And many increasingly use social engineering to take advantage of the human element as the weakest link. Since the current generation of attackers use multiple data points and threat vectors to target their victims, only a solution that understands the entire threat lifecycle and combines data from each phase can protect against them.”

Below are key findings:

- 82 percent of malicious websites are hosted on compromised hosts. If compromised hosts are the norm, cloud and hosting services can’t be trusted. This threatens to put a damper on our economy, which is tapping the cloud as a backbone for commerce, communications, and culture.

- 55 percent of data-stealing malware communications are web-based.

- 43 percent of Facebook activity is streaming media, including viral videos. That’s more than five times the next largest category of news and media within Facebook. The streaming media percentage is important because web lures (like videos, fake gift offers, surveys, and scams) prey on human curiosity and have moved onto the social network. Websense has partnered with Facebook to scan all clicked Facebook web links so that Websense researchers have unprecedented visibility into the social network’s content.

- 50 percent of malware redirects lead to the United States followed by Canada.

- 60 percent of phishing attacks are hosted in the United States trailed by Canada. The United States is also the top host of malware (36 percent), followed by Russia.

- 74 percent of email is spam, compared to the previous year of 84 percent. It’s clear that efforts to take down spam botnets are showing results. However, while overall spam is down, 92 percent of email spam contains a URL, illustrating the increasingly blended nature of today’s email threats. The top five email malware lures are: order notifications, ticket confirmations, delivery notices, test emails, and tax refund information. Spear phishing also continues to increase as a delivery vehicle for targeted attacks.

- Websense Labs has analyzed more than 200,000 Android apps and does see a noticeable quantity with malicious intent or permissions. The number of users who will be exposed to a malicious mobile app is increasing quickly.

- Advanced threats can be described in six stages: lures, redirects, exploit kits, dropper files, call-home communications, and data theft. Each stage has unique characteristics that need specific real-time defenses. Traditional defenses mainly focus on the fourth stage and known threats by looking at malware files, and in large part that is why they are ineffective. Advanced threats use unique dropper files that go undetected by traditional defenses for hours or days.

Multimedia Elements:

A full copy of the 2012 Websense Threat Report can be downloaded here.

Click to share the 2012 Websense Threat Report on Facebook.

Click to share on Twitter:

New @Websense 2012 threat report finds more targeted cyber-attacks are stealing confidential data http://ow.ly/9NyFf

Websense Links:

Facebook: “Like” Websense.

Twitter: Follow @Websense.

About Websense, Inc.

Websense, Inc. (NASDAQ: WBSN), a global leader in unified web security, email security, mobile security, and data loss prevention (DLP), delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organizations around the world. Distributed through a global network of channel partners and delivered as appliance-based software or SaaS-based cloud services, Websense content security solutions help organizations leverage social media and cloud-based communication, while protecting from advanced persistent threats and modern malware, preventing the loss of confidential information, and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit www.websense.com.

Follow Websense on Twitter: www.twitter.com/websense

Join the discussion on Facebook: www.facebook.com/websense

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2014-0778
Published: 2014-04-19
The TCPUploader module in Progea Movicon 11.4 before 11.4.1150 allows remote attackers to obtain potentially sensitive version information via network traffic to TCP port 10651.

CVE-2014-1974
Published: 2014-04-19
Directory traversal vulnerability in LYSESOFT AndExplorer before 20140403 and AndExplorerPro before 20140405 allows attackers to overwrite or create arbitrary files via unspecified vectors.

CVE-2014-1983
Published: 2014-04-19
Unspecified vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x before 3.1.1 allows remote attackers to cause a denial of service (CPU consumption) via unknown vectors.

Best of the Web