Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/26/2011
02:42 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Symantec Announces April 2011 MessageLabs Intelligence Report

Targeted attacks increase in intensity rising to 85 per day while global spam continues to fall

MOUNTAIN VIEW, Calif. – April 26, 2011– Symantec Corp. (Nasdaq: SYMC) today announced the publication of its April 2011 MessageLabs Intelligence Report. This month analysis reveals that targeted attacks intercepted by Symantec.cloud rose to 85 per day, the highest figure since March 2009 when the figure was 107 per day in the run-up to the G20 Summit held in London that year. Simultaneously, in the aftermath of the Rustock botnet takedown, global spam volumes continued to fall and decreased by 6.4 percentage points since March to 72.9 percent in April. MessageLabs Intelligence also revealed that shortened URLs have become increasingly popular recently, being used to lure people to click on advertising links; a practice known as click-fraud.

In April, 1 in 168.6 emails contained malware and targeted attacks accounted for approximately 0.02 percent of these. This represents an increase of 10.5 percent over a period of six months. The number of targeted attacks blocked each day was approximately 77 in October 2010.

“The trend in targeted attacks suggests there may be a seasonal pattern as the number of targeted attacks always seems to be higher at this time of year,” said Paul Wood, MessageLabs Intelligence Senior Analyst, Symantec.cloud. “As the financial year draws to a close in many countries, it is also possible that the timing is perfect for cybercriminals seeking information about the financial performance of a company, and a carefully crafted attack may be just the means by which they can achieve this.”

Also known as Advanced Persistent Threats (APTs), targeted attacks are frequently delivered by email and designed to breach a specific target for the purpose of industrial espionage.

During April, MessageLabs Intelligence identified 11 automated bots operating on a popular micro-blogging service, posting messages containing shortened URLs and using a variety of techniques to bring these messages to the attention of other users. People clicking on these links are redirected to web sites containing advertising links, which in turn will generate pay-per-click revenue for those sites hosting the banner ads.

“There are a number of motivations behind enticing users to follow shortened URLs, the primary one being financial gain,” Wood said. “Although online advertising providers have worked hard to prevent Web sites from being setup purely to profit from advertising revenues, the practice is still prevalent.”

Other report highlights:

* Spam: In April 2011, the global ratio of spam in email traffic from new and previously unknown bad sources decreased by 6.4% percentage points since March 2011 to 72.9% (1 in 1.37 emails). * Viruses: The global ratio of email-borne viruses in email traffic from new and previously unknown bad sources was one in 168.6 emails (0.593 percent) in April, an increase of 0.114 percentage points since March. * Endpoint Threats: The most frequently blocked malware targeting endpoint devices for the last month was the W32.Sality.AE virus. This virus spreads by infecting executable files and attempts to download potentially malicious files from the Internet. * Phishing: In April, phishing activity was 1 in 242.2 emails (0.413 percent), an increase of 0.02 percentage points since March. * Web security: Analysis of web security activity shows that an average of 2,431 Web sites each day were harboring malware and other potentially unwanted programs including spyware and adware, a decrease of 18.2 percent since March 2011. Thirty three percent of malicious domains blocked were new in April, a decrease of 4.0 percentage points since March. Additionally, 22.5 percent of all web-based malware blocked was new in April, a decrease of 1.9 percentage points since last month.

Geographical Trends:

* Oman became the most spammed in April with a spam rate of 81.9 percent. * In the US 72.8 percent of email was spam and 72.7 percent in Canada and the UK. * In The Netherlands, spam accounted for 74.1 percent of email traffic, in Germany 73 percent , 72.4 percent in Denmark and 73.6 percent in Australia. * Spam levels in Hong Kong reached 72.4 percent and 70.3 percent in Singapore. Spam levels in Japan were 68.9 percent. * In South Africa, spam accounted for 72.4 percent of email traffic. * Luxembourg remained the most targeted by email-borne malware with 1 in 28.9 emails blocked as malicious in April. * In the UK, 1 in 86.2 emails contained malware. In the US virus levels were 1 in 311.6 and 1 in 201.8 for Canada. In Germany, virus levels reached 1 in 277.5, 1 in 647.9 in Denmark and 1 in 311.2 for The Netherlands. * In Australia, 1 in 271.3 emails were malicious and, 1 in 321.0 for Hong Kong, for Japan it was 1 in 902.9 compared with 1 in 640.0 for Singapore. * In South Africa 1 in 68.1 emails contained malicious content.

Vertical Trends:

* In April, the most spammed industry sector with a spam rate of 76.5 percent continued to be the Automotive sector. * Spam levels for the Education sector were 74 percent, 72.8 percent for the Chemical & Pharmaceutical sector, 72.5 percent for IT Services, 71.8 percent for Retail, 70.9 percent for Public Sector and 72.2 percent for Finance. * In April, the Public Sector remained the most targeted industry for malware with 1 in 26.4 emails being blocked as malicious. * Virus levels for the Chemical & Pharmaceutical sector were 1 in 157.4, 1 in 260.4 for the IT Services sector, 1 in 287.6 for Retail, 1 in 87.1 for Education and 1 in 209.5 for Finance.

The April 2011 MessageLabs Intelligence Report provides greater detail on all of the trends and figures noted above, as well as more detailed geographical and vertical trends. The full report is available at http://www.messagelabs.com/intelligence.aspx.

Symantec’s MessageLabs Intelligence is a respected source of data and analysis for messaging security issues, trends and statistics. MessageLabs Intelligence provides a range of information on global security threats based on live data feeds from our control towers around the world scanning billions of messages each week.

About Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com .

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.