Botnets continue to be the backbone of cyber-crime, with four of the top 10 threats in 2010 getting regular instructions from malicious command-and-control-servers, Microsoft said in a recent report. Phishing on social networks also became more prevalent in 2010.
While the Taterf, Rimecud, Conficker and Renos worms continued to wreak havoc on user systems, attacks based on rogue security software, phishing scams on social networking sites and adware increased significantly, according to Microsoft’s latest version of the Security Intelligence Report released May 12. In SIR volume 10, Microsoft researchers examined security trends based on data collected from more than 600 million systems worldwide between July and December of 2010.
There is a “polarization” of criminal behavior, the report found. There are two types of cyber-criminals, with one group going after large targets with sophisticated tools and the other camp relying on more “accessible” methods such as social engineering and other “marketing like” tricks or launching attacks based on toolkits and other exploits. The more skilled group looks for large payoffs while the less sophisticated attacks were interested in stealing small amounts from a large number of people, the report found.
One of the reasons Microsoft puts out this report is to provide “actionable guidance” along with an overview of malware trends, Jeff Williams, principal group program manager with the Microsoft Malware Protection Center, told eWEEK.
Phishing attacks on social networking platforms that trick users into giving up sensitive information or clicking on malicious links have sky-rocketed 1,200 percent. Phishing on social networking sites accounted for 84.5 percent of all phishing attacks in December, compared with a mere 8.3 percent at the beginning of 2010.
Phishing attacks take advantage of the user’s tendency to trust content they think is from their friends. The criminals also get a higher return on investment targeting social networks because a handful of sites represent the majority of the users, Williams said. Phishing attempts are still concentrated on financial targets, which see between 78 and 91 percent of all phishing attacks each month.
Adware surprisingly increased 70 percent globally during the second half of 2010, according to the report. In previous versions of the report, adware had been declining, according to Williams. The increase was caused by two new adware “families,” including ClickPotato, which displays pop-up and notification-style advertisements based on the user’s browsing habits, and Pornpop, with adult content pop-under ads.
Pornpop appeared for the first time in the fourth quarter of 2010 and is one of the fastest spreading, according to Williams. Although ClickPotato had been around for awhile, it hadn’t been much of a threat. But in the second half of 2010, these two families were the two biggest sources of malware and accounted for nearly 25 percent of all the infections, Williams said.
Rogue scareware, such as fake antivirus and other security software, has emerged as one of the most common methods to swindle money out of victims. The five largest software families accounted for 70 percent of the detections, according to Williams. FakeSpypro was the most commonly detected fake software up until third quarter 2010, when it practically disappeared. Then FakePAV emerged around the same time and became the most commonly detected scareware in the fourth quarter.
It was possible the FakeSpypro gang had decided to switch tactics to work on FakePAV, Williams said.
Java exploits broke into the list of top 10 threat families for the first time, with two different JRE exploits accounting for 9 percent of infections.
The report highlighted some positive trends, including the continued decline in vulnerability disclosures, which dropped 16.5 percent from 2009 to 2010. The drop was probably the result of “better development practices and quality control” throughout the industry as well as better technology advancements in Windows 7, Williams said.
In the previous report, four of the top 10 threats used the AutoRun worm, but the technological improvements in Windows 7 had pushed down Autorun malware as a threat, Williams said.
Spam dropped from more than 90 billion unwanted messages blocked per month at the beginning of the reporting period to below 60 billion in December, according to the report.
Organizations should protect its systems by actively updating its network and implementing strong information security policies to ensure all systems are properly patched and updated before getting on the network, Williams said.