News Archive

Cyber Threats

by msecadm4921

An internet security threat report released by US-based IT security firm Symantec Corp suggests that the current internet threat environment is characterized by an increase in data theft, data leakage, and the creation of targeted, malicious code for the purpose of stealing confidential information that can be used for financial gain.

Cyber criminals continue to refine their attack methods in an attempt to remain undetected and to create global, cooperative networks to support the ongoing growth of criminal activity.

“Symantec’s Internet Security Threat Report gives our organisation a detailed analysis of worldwide Internet threats, helping us monitor security risks and adjust our technology and protection processes accordingly,” said Dan Lohrmann, chief information security officer for the state of Michigan. “Safeguarding sensitive information and the public’s trust is essential for our support of Michigan agencies providing law enforcement, health care, and citizen service. The report’s comprehensive data on the global threat landscape complements our department’s security operations.”

The report shows:

Trojans constituted 45 percent of the top 50 malicious code samples, representing a 23 per cent increase over the first six months of 2006. This significant increase supports Symantec’s forecast from previous research, which noted that attackers appeared to be making a shift away from mass-mailing worms toward using Trojans.

Symantec documented 12 zero-day vulnerabilities during the second half of 2006, marking a significant increase from the one zero-day vulnerability documented in the first half of 2006, increasing the exposure of consumers and businesses to unknown threats.

Underground economy servers are being used by criminals and criminal organisations to sell stolen information, including government-issued identity numbers, credit cards, bank cards and personal identification numbers (PINs), user accounts, and e-mail address lists.

Theft or loss of a computer or data storage medium, such as a USB memory key, made up 54 percent of all identity theft-related data breaches.

For the first time, Symantec identified the countries with the highest amount of malicious activity originating from their networks. The United States had the highest proportion of overall malicious activity, with 31 percent; China was second, with 10 per cent; and Germany was third, with 7 per cent.

What they say

“As cyber criminals become increasingly malicious, they continue to evolve their attack methods to become more complex and sophisticated in order to prevent detection,” said Arthur Wong, senior vice president, Symantec Security Response and Managed Services. “End users, whether consumers or enterprises, need to ensure proper security measures to prevent an attacker from gaining access to their confidential information, causing financial loss, harming valuable customers, or damaging their own reputation.”

Threats to information

For the first time, Symantec tracked the trade of stolen confidential information and captured data frequently sold on underground economy servers. These servers are often used by hackers and criminal organisations to sell stolen information, including social security numbers, credit cards, personal identification numbers (PINs), and e-mail address lists. During the last six months of 2006, 51 percent of all known underground economy servers in the world were located in the United States. US-based credit cards with a card verification number were available for between US $1 and $6 while an identity, including a US bank account, credit card, date of birth and government issued identification number, was available for between US $14 and $18.

During the reporting period, Symantec observed a rise in threats to confidential information due to the increase of Trojans and bot networks enabling an attacker to gain access to a victim’s computer. Attacks that obtain sensitive data stored on an infected computer can result in significant financial loss, particularly if credit card or banking information is exposed. Threats to confidential information made up 66 percent of the top 50 malicious code reported to Symantec, an increase over the 48 percent reported in the previous period. Threats that could export user data, such as user names and passwords, accounted for 62 percent of threats to confidential information during the second half of 2006, up from 38 percent in the first half of the year.

Increase in breaches

Confidential information used in identity theft is often confiscated as a result of a data breach. During the reporting period, Symantec assessed data breaches that resulted from hacker activity, the theft or loss of computer hardware, and security policy failure. Data breaches and the potential use of confidential information for identity theft can result in a loss of public confidence, legal liability, or costly litigation. The majority of global data breaches affected the government sector, accounting for 25 percent of the total. Government organisations may be considered a prime target as they often store data in many separate locations making it accessible to various people, and thereby increasing the opportunities for attackers to gain unauthorised access.

Rise in spam

Symantec observed high levels of coordinated attacks combining spam, malicious code, and online fraud. During the second half of 2006, spam made up 59 per cent of all monitored e-mail traffic marking a steady increase over the first six months of 2006, with 30 percent of the total spam related to the financial services industry resulting from an increase in “pump-and-dump” spam. During a “pump-and-dump” scheme, cyber criminals profit by purchasing stock when it is low and then artificially pumping up interest in the stock by sending out spam containing false predictions of high performance for the stock. Spam recipients trust the content and buy the stock, creating demand and resulting in a rise in the stock price. When the stock price increases, the cyber criminals sell their stock for a profit.

Over the last six months of 2006, Symantec detected a total of 166,248 unique phishing messages, an average of 904 per day, marking a 6 percent increase over the first six months of 2006. For the first time, Symantec analyzed the effects that the day of the week and seasonal events may have had on phishing attacks. Throughout 2006, Symantec detected an average of 27 percent fewer unique phishing messages on weekends than the average of 961 phishing messages on the weekdays. This trend indicates that phishing activity mirrors the business week where attackers attempt to mimic a legitimate company’s e-mail practices. However, this pattern may also indicate that phishing campaigns are short lived and most effective when victims receive and read the phishing e-mails shortly after they were distributed. Symantec observed an increase in phishing activity during major holidays and other large events, such as the FIFA World Cup, due to the fact that attackers may find it easier to craft theme specific social engineering attacks surrounding special events.

About the report

The semiannual Symantec Internet Security Threat Report (ISTR) volume XI covers the six-month period from July 1, 2006, through December 31, 2006. It is based on Symantec data collected from more than 40,000 sensors deployed in more than 180 countries in addition to a database that covers more than 20,000 vulnerabilities affecting more than 30,000 technologies from more than 4,000 vendors. Symantec also reviews more than 2 million decoy accounts that attract e-mail messages from 20 countries allowing Symantec to gauge global spam and phishing activity. The full report includes additional statistics and detail and is available for download:

Related News

  • News Archive

    Data Compliance Date

    by msecadm4921

    The eighth Annual Data Protection Compliance Conference runs in London on October 8 and 9. The keynote speaker is Christopher Graham, the…

  • News Archive

    Metal Keypad

    by msecadm4921

    Paxton Access, the UK manufacturer of access control systems introduces the vandal-resistant compact metal keypad. The keypad has been developed in response…

  • News Archive

    IIPSEC 2008

    by msecadm4921

    IIPSEC 2008 runs from January 29 to 31 at the same venue: Stoneleigh, near Coventry. Now in its sixth year, IIPSEC is…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing