Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/25/2012
01:22 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Releases Security Roundup Report For Q2 2012

Increasingly targeted and personalized attacks led to more than 140 million attacks that were blocked by Trend Micro against small businesses in the first half of the year

CUPERTINO, Calif., July 25, 2012 /PRNewswire/ -- Cybercriminals have increased their focus in targeting individuals and organizations of all sizes to steal personal and financial information according to the security roundup report for the second quarter of 2012 released today by the global cloud security leader Trend Micro Incorporated (TYO: 4704; TSE: 4704).

Among the examples of these increasingly focused attacks were the 142 million threats which were blocked from infecting small businesses as of the second quarter of 2012, an increase of 27% quarter on quarter. Trend Micro's report also outlines increasingly sophisticated attacks against individuals in the form of ATS attacks. Large organizations weren't exempt either: the IXSHE campaign showed cybercriminals stepping up their tactics to gain access to large multinational corporations without notice.

In addition to these more targeted attacks, Trend Micro's report shows cybercriminals continuing to cast their net widely in large-scale attacks using newer, more lethal methods. Police Trojan Attacks and the Black Hole Exploit Kit continue to target desktop systems while newer platforms such as Android are seeing an unprecedented explosion in malicious apps. Social media wasn't exempt as cybercriminals jumped on the Pinterest bandwagon bringing tried-and-true scams to the latest social networking craze.

Across the board though, the goal is the same: to get personal data and financial information.

"The reason why criminals are focusing their attacks on stealing personal data is simple. It's the sheer volume of people working from multiple devices that leaves them vulnerable to attacks," said Rik Ferguson, director of security research and communication, Trend Micro. "While Trend Micro has been integral in working with authorities to break up a number of cybercriminal rings over the last year, these cybercriminals have acquired new techniques and tools from collaborating with one another to accelerate their 'industry.' The fact is: business is booming for cybercrime and everyone needs to take notice."

Notable trends in Q2 2012:

-- 25,000 Android malware apps have been identified as of the second quarter of 2012, an increase of 317% over the number of samples found in the first quarter of 2012, which is compounded against the fact that Trend Micro has seen only 1 in 5 Android devices with a security app installed -- Ransomware attacks that track a victim's geographic location, holds the system captive and scares the victim into revealing personal information by using the victim's local police force as a threat -- More sophisticated attack tools, like the automatic transfer systems, allow criminals to steal banking information when they are not online -- Organization of tried-and-true attack methods, such as the Blackhole Exploit Kit, offers technical support for criminals looking to collect personal financial information -- The IXESHE malware targeted enterprises primarily in East Asia, with the number of C&C servers in Taiwan equaling those located in the U.S. -- Pinterest has become the social media platform of choice among criminals; the top 5 social engineering lures being used across all social networking sites are: Diablo 3, Instagram Android, Angry Birds Space, London 2012 Olympics and Tibet Supporting assets:

-- Small Business Is Big Business in Cybercrime (http://www.trendmicro.com/cloud-content/us/pdfs/about/tlp_small-business-big-for-cybercrime.pdf) -- Automating Online Banking Fraud--Automatic Transfer System: The Latest Cybercrime Toolkit Feature (http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_automating_online_banking_fraud.pdf) -- Is Your Business at Risk of Losing Data?: 5 Data Security Risks Every Small Business Should Know About (http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/sb_5-reasons-why-small-business-lose-critical-data.pdf) -- IXESHE: An APT Campaign (http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_ixeshe.pdf) -- The "Police Trojan": An In-Depth Analysis (http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_police_trojan.pdf) -- Social Security Guide to Social Networks (http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_security_guide_to_social_networks.pdf) The Report is available @ www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/rpt_its_big_business_and_its_getting_personal.pdf.

About Trend Micro Trend Micro Incorporated (TYO: 4704;TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5148
PUBLISHED: 2021-03-05
SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged user and potentially forces the SSO Agent to authenticate allowing an attacker to bypass firewall a...
CVE-2020-36255
PUBLISHED: 2021-03-05
An issue was discovered in IdentityModel (aka ScottBrady.IdentityModel) before 1.3.0. The Branca implementation allows an attacker to modify and forge authentication tokens.
CVE-2019-18351
PUBLISHED: 2021-03-05
An issue was discovered in channels/chan_sip.c in Sangoma Asterisk through 13.29.1, through 16.6.1, and through 17.0.0; and Certified Asterisk through 13.21-cert4. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijac...
CVE-2021-27963
PUBLISHED: 2021-03-05
SonLogger before 6.4.1 is affected by user creation with any user permissions profile (e.g., SuperAdmin). An anonymous user can send a POST request to /User/saveUser without any authentication or session header.
CVE-2021-27964
PUBLISHED: 2021-03-05
SonLogger before 6.4.1 is affected by Unauthenticated Arbitrary File Upload. An attacker can send a POST request to /Config/SaveUploadedHotspotLogoFile without any authentication or session header. There is no check for the file extension or content of the uploaded file.