Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/26/2011
02:42 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Symantec Announces April 2011 MessageLabs Intelligence Report

Targeted attacks increase in intensity rising to 85 per day while global spam continues to fall

MOUNTAIN VIEW, Calif. – April 26, 2011– Symantec Corp. (Nasdaq: SYMC) today announced the publication of its April 2011 MessageLabs Intelligence Report. This month analysis reveals that targeted attacks intercepted by Symantec.cloud rose to 85 per day, the highest figure since March 2009 when the figure was 107 per day in the run-up to the G20 Summit held in London that year. Simultaneously, in the aftermath of the Rustock botnet takedown, global spam volumes continued to fall and decreased by 6.4 percentage points since March to 72.9 percent in April. MessageLabs Intelligence also revealed that shortened URLs have become increasingly popular recently, being used to lure people to click on advertising links; a practice known as click-fraud.

In April, 1 in 168.6 emails contained malware and targeted attacks accounted for approximately 0.02 percent of these. This represents an increase of 10.5 percent over a period of six months. The number of targeted attacks blocked each day was approximately 77 in October 2010.

“The trend in targeted attacks suggests there may be a seasonal pattern as the number of targeted attacks always seems to be higher at this time of year,” said Paul Wood, MessageLabs Intelligence Senior Analyst, Symantec.cloud. “As the financial year draws to a close in many countries, it is also possible that the timing is perfect for cybercriminals seeking information about the financial performance of a company, and a carefully crafted attack may be just the means by which they can achieve this.”

Also known as Advanced Persistent Threats (APTs), targeted attacks are frequently delivered by email and designed to breach a specific target for the purpose of industrial espionage.

During April, MessageLabs Intelligence identified 11 automated bots operating on a popular micro-blogging service, posting messages containing shortened URLs and using a variety of techniques to bring these messages to the attention of other users. People clicking on these links are redirected to web sites containing advertising links, which in turn will generate pay-per-click revenue for those sites hosting the banner ads.

“There are a number of motivations behind enticing users to follow shortened URLs, the primary one being financial gain,” Wood said. “Although online advertising providers have worked hard to prevent Web sites from being setup purely to profit from advertising revenues, the practice is still prevalent.”

Other report highlights:

* Spam: In April 2011, the global ratio of spam in email traffic from new and previously unknown bad sources decreased by 6.4% percentage points since March 2011 to 72.9% (1 in 1.37 emails). * Viruses: The global ratio of email-borne viruses in email traffic from new and previously unknown bad sources was one in 168.6 emails (0.593 percent) in April, an increase of 0.114 percentage points since March. * Endpoint Threats: The most frequently blocked malware targeting endpoint devices for the last month was the W32.Sality.AE virus. This virus spreads by infecting executable files and attempts to download potentially malicious files from the Internet. * Phishing: In April, phishing activity was 1 in 242.2 emails (0.413 percent), an increase of 0.02 percentage points since March. * Web security: Analysis of web security activity shows that an average of 2,431 Web sites each day were harboring malware and other potentially unwanted programs including spyware and adware, a decrease of 18.2 percent since March 2011. Thirty three percent of malicious domains blocked were new in April, a decrease of 4.0 percentage points since March. Additionally, 22.5 percent of all web-based malware blocked was new in April, a decrease of 1.9 percentage points since last month.

Geographical Trends:

* Oman became the most spammed in April with a spam rate of 81.9 percent. * In the US 72.8 percent of email was spam and 72.7 percent in Canada and the UK. * In The Netherlands, spam accounted for 74.1 percent of email traffic, in Germany 73 percent , 72.4 percent in Denmark and 73.6 percent in Australia. * Spam levels in Hong Kong reached 72.4 percent and 70.3 percent in Singapore. Spam levels in Japan were 68.9 percent. * In South Africa, spam accounted for 72.4 percent of email traffic. * Luxembourg remained the most targeted by email-borne malware with 1 in 28.9 emails blocked as malicious in April. * In the UK, 1 in 86.2 emails contained malware. In the US virus levels were 1 in 311.6 and 1 in 201.8 for Canada. In Germany, virus levels reached 1 in 277.5, 1 in 647.9 in Denmark and 1 in 311.2 for The Netherlands. * In Australia, 1 in 271.3 emails were malicious and, 1 in 321.0 for Hong Kong, for Japan it was 1 in 902.9 compared with 1 in 640.0 for Singapore. * In South Africa 1 in 68.1 emails contained malicious content.

Vertical Trends:

* In April, the most spammed industry sector with a spam rate of 76.5 percent continued to be the Automotive sector. * Spam levels for the Education sector were 74 percent, 72.8 percent for the Chemical & Pharmaceutical sector, 72.5 percent for IT Services, 71.8 percent for Retail, 70.9 percent for Public Sector and 72.2 percent for Finance. * In April, the Public Sector remained the most targeted industry for malware with 1 in 26.4 emails being blocked as malicious. * Virus levels for the Chemical & Pharmaceutical sector were 1 in 157.4, 1 in 260.4 for the IT Services sector, 1 in 287.6 for Retail, 1 in 87.1 for Education and 1 in 209.5 for Finance.

The April 2011 MessageLabs Intelligence Report provides greater detail on all of the trends and figures noted above, as well as more detailed geographical and vertical trends. The full report is available at http://www.messagelabs.com/intelligence.aspx.

Symantec’s MessageLabs Intelligence is a respected source of data and analysis for messaging security issues, trends and statistics. MessageLabs Intelligence provides a range of information on global security threats based on live data feeds from our control towers around the world scanning billions of messages each week.

About Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com .

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35210
PUBLISHED: 2021-06-23
Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
CVE-2021-27649
PUBLISHED: 2021-06-23
Use after free vulnerability in file transfer protocol component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via unspecified vectors.
CVE-2021-29084
PUBLISHED: 2021-06-23
Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in Security Advisor report management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2021-29085
PUBLISHED: 2021-06-23
Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in file sharing management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2021-29086
PUBLISHED: 2021-06-23
Exposure of sensitive information to an unauthorized actor vulnerability in webapi component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to obtain sensitive information via unspecified vectors.