Vulnerabilities / Threats
4/22/2008
02:41 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Infected Web Pages Nearly Triple

Sophos says that it discovered a new infected Web page every 5 seconds. In 2007, the company says, it saw new infected Web pages every 14 seconds.

The rate at which Internet security company Sophos detected infected Web pages nearly tripled in the first quarter of 2008, the company said.

In its Q1 08 threat report released Monday, Sophos says that it discovered a new infected Web page every 5 seconds. In 2007, the company says, it saw new infected Web pages every 14 seconds.

"The Web continues to be the preferred way for malware authors to deliver their attacks," the report says. "Our growing dependence on the Web for purchasing and gathering information makes it an ideal hunting ground for cyber criminals chasing poorly protected users."

The rise in infected Web pages is related to a decline in infected e-mail. Sophos says that about 1 out of every 2,500 e-mail messages contained malware, compared to 1 out of every 909 messages monitored in 2007.

Sophos attributes this decline to a shift from infectious attachments to the inclusion of links that lead to infected sites.

E-mail containing such links may not register as a carrier of infection, but the absence of a malware payload doesn't mean such messages are any less dangerous.

The Sophos report says that the company found new spam Web pages every three seconds and that 92.3% of e-mail during this period was spam.

"Ironically, there is a still a common belief that unsolicited e-mail, or spam, is a non-threat," the report says. "With virtually all of it unwanted and a large portion linking to infected Web sites, organizations would be wise to address this problem before they become a victim."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.