SlideShare uma empresa Scribd logo
1 de 41
Internet Threats Trend Report April 2011
April 2011 Threat Report The following is a condensed version of the April 2011 Commtouch Internet Threats Trend Report Download the complete report atwww.commtouch.com/threat-report Copyright© 2011 Commtouch Software Ltd. Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Commtouch, Authentium, Command Antivirus and Command Anti-malware are registered trademarks, of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch.
April 2011 Threat Report 1 Key Highlights 2 Feature The ups & downs of Spam in Q1 3 Malware, Compromised Websites,Spam and Web 2.0 Trends
Key Highlights
Key Security Highlights Average daily spam/phishing emails sent 149 billion  Average daily spam was up in Q1
Key Security Highlights Zombie daily turnover 258,000 Zombies Number of zombies turned off and on each day went down in Q1
Key Security Highlights Most popular blog topic onuser generated content sites Streaming media/downloads
Key Security Highlights Most popular spam topic Pharmacy ads (28% of spam) While it was the most popular spam topic,it was down to only 28% of all spam
Key Security Highlights Country with the most Zombies India (17%)  India remains atop the list but with just 17%
Key Security Highlights Website category most likely to be compromised with malware Parked Domains Parked Domains took over the top spotin categories likely to be compromised
Feature… The ups & downs of spam in Q1
Q1 2011 Spam Trends ,[object Object]
Around Jan 10, 2011, spam shot up 45% (compared to previous two weeks) to pre-Christmas levels
The increase was attributed to the resumption of activity by the Rustockbotnet – primarily sending out pharmaceutical spam
Spam stabilizes in middle of quarter
February averages 165 billion spam emails/day (in comparison, Oct 2010 has 162 billion per day),[object Object]
Result – dramatic 30% decrease in spam rates, Spam Levels, December 2010 - March 2011 Source: Commtouch
Q1 2011 Spam Trends ,[object Object]
Large malware outbreak at the end of March results in large-scale recruitment of new zombies – more than doubling the daily turnoverNewly Activated Zombies, January  - March 2011 Source: Commtouch
Other trends in Q1 2011… Malware
Malware Trends ,[object Object]
Web-based methods have become more common as illustrated by several of the attacks described in this report
March Outbreak changed this – very high levels of emails with attached malware
At its peak accounted for over 30% of all email received
Sudden increase amounted to a 400% difference compared to the running average  (see graph below),[object Object]
Malware Trends ,[object Object],Source: Commtouch ,[object Object]
Later variations of the outbreak changed subjects to indicate DHL deliveries,[object Object]
One possible theory is the rebuilding of a botnet or new botnet after the takedown of Rustock
Rustock takedown resulted in a 30% drop in spam,[object Object]
Attached file contains JavaScript targeting vulnerabilities in PDF readers not running latest patches
After PC exploited, the malware fetches other malware from the InternetSource: Commtouch
Malware Trends Other Malware in Q1 targeted Figure below shows the flow of attack
Malware Trends Read all the details in the complete April 2011 threat report at www.commtouch.com/threat-report Other major malware attacks in Q1 2011: ,[object Object]
T-Online used for fake AV,[object Object]
Other trends in Q1 2011… Compromised Websites
Compromised Websites Analysis of Web sites most likely to be compromised with malware or phishing  ,[object Object]
For both these types of sites, the hosting of malware may well be part of the design of such sites,[object Object]
Compromised Websites Trends in Compromised Websites ,[object Object]
Benefits for the spammer
Provides FREE hosting
Forum domains most likely whitelisted by many URL filtering or anti-spam engines preventing these sites and associated spam emails from being blocked,[object Object]

Mais conteúdo relacionado

Mais de Cyren, Inc

Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
Cyren, Inc
 

Mais de Cyren, Inc (20)

Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend report
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle Cybercrime
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Commtouch April 2011 Internet Threats Trend report

  • 1. Internet Threats Trend Report April 2011
  • 2. April 2011 Threat Report The following is a condensed version of the April 2011 Commtouch Internet Threats Trend Report Download the complete report atwww.commtouch.com/threat-report Copyright© 2011 Commtouch Software Ltd. Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Commtouch, Authentium, Command Antivirus and Command Anti-malware are registered trademarks, of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch.
  • 3. April 2011 Threat Report 1 Key Highlights 2 Feature The ups & downs of Spam in Q1 3 Malware, Compromised Websites,Spam and Web 2.0 Trends
  • 5. Key Security Highlights Average daily spam/phishing emails sent 149 billion Average daily spam was up in Q1
  • 6. Key Security Highlights Zombie daily turnover 258,000 Zombies Number of zombies turned off and on each day went down in Q1
  • 7. Key Security Highlights Most popular blog topic onuser generated content sites Streaming media/downloads
  • 8. Key Security Highlights Most popular spam topic Pharmacy ads (28% of spam) While it was the most popular spam topic,it was down to only 28% of all spam
  • 9. Key Security Highlights Country with the most Zombies India (17%) India remains atop the list but with just 17%
  • 10. Key Security Highlights Website category most likely to be compromised with malware Parked Domains Parked Domains took over the top spotin categories likely to be compromised
  • 11. Feature… The ups & downs of spam in Q1
  • 12.
  • 13. Around Jan 10, 2011, spam shot up 45% (compared to previous two weeks) to pre-Christmas levels
  • 14. The increase was attributed to the resumption of activity by the Rustockbotnet – primarily sending out pharmaceutical spam
  • 15. Spam stabilizes in middle of quarter
  • 16.
  • 17. Result – dramatic 30% decrease in spam rates, Spam Levels, December 2010 - March 2011 Source: Commtouch
  • 18.
  • 19. Large malware outbreak at the end of March results in large-scale recruitment of new zombies – more than doubling the daily turnoverNewly Activated Zombies, January - March 2011 Source: Commtouch
  • 20. Other trends in Q1 2011… Malware
  • 21.
  • 22. Web-based methods have become more common as illustrated by several of the attacks described in this report
  • 23. March Outbreak changed this – very high levels of emails with attached malware
  • 24. At its peak accounted for over 30% of all email received
  • 25.
  • 26.
  • 27.
  • 28. One possible theory is the rebuilding of a botnet or new botnet after the takedown of Rustock
  • 29.
  • 30. Attached file contains JavaScript targeting vulnerabilities in PDF readers not running latest patches
  • 31. After PC exploited, the malware fetches other malware from the InternetSource: Commtouch
  • 32. Malware Trends Other Malware in Q1 targeted Figure below shows the flow of attack
  • 33.
  • 34.
  • 35. Other trends in Q1 2011… Compromised Websites
  • 36.
  • 37.
  • 38.
  • 41.
  • 42.
  • 44.
  • 45.
  • 46. Dropped to 28% of all spam
  • 47. Down from 42% in Q4 2010
  • 48. 419 fraud, enhancements, and dating all increased Source: Commtouch
  • 49. Spam Trends Spam Sending Domains Commtouch monitors domains used by spammers in the “from” field of the spam emails, typically faked in order to give the impression of a reputable, genuine source.
  • 50.
  • 51. 17th place – dhl.comUsed in the later stages of the March outbreak
  • 52. 40th place – postmaster.twitter.comUsed extensively throughout Q1 to distribute fake Twitter notifications with links to pharmacy sitesSource: Commtouch
  • 53.
  • 54. Brazil returned to second place with 12% after drop in last quarter
  • 56. Vietnam moved into 3rd place
  • 57.
  • 58. Web 2.0 Trends Web 2.0 Trends Commtouch’s GlobalView Network tracks billions of Web browsing sessions and URL requests, and its URL Filtering service includes highly granular categorization of Web 2.0 content. In addition to filtering accuracy, this provides insight into the most popular user generated content sites.
  • 59. Web 2.0 Trends Most Popular User Generated Content Sites Includes sites with live or archived media for download or streaming content, such as Internet radio, Internet TV or MP3 files These blogs typically cover television, movies, and music as well as hosting celebrity fan sites and entertainment news Source: Commtouch
  • 60. Review of Q1 2011
  • 61. Review of Q1 2011 Source: Commtouch
  • 62. Download the complete April 2011 Internet Threats Trend Reportatwww.commtouch.com/threat-report
  • 63. For more information contact: info@commtouch.com 650 864 2000 (Americas) +972 9 863 6888 (International) Web: www.commtouch.com Blog: http://blog.commtouch.com