SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Symantec Intelligence Report

    June 2012


Symantec Intelligence              1
About the Symantec Intelligence Report

The Symantec Intelligence report provides the latest analysis of
cyber security threats, trends and insights from the Symantec
Intelligence team concerning malware, spam, and other
potentially harmful business risks.


The data used to compile the analysis for this combined report
includes data from May and June 2012.




Symantec Intelligence                                              2
October 2011 Highlights
• 36% of targeted attacks directed at SMBs
• Further analysis of W32.Flamer
• In-depth look a recently attempted targeted attack
• Spam – 66.8 percent (a decrease of 1.0 percentage point since
  May 2012)
• Phishing – One in 467.6 emails identified as phishing (an
  increase of 0.04 percentage points since May 2012)
• Malware – One in 316.5 emails contained malware (an increase
  of 0.04 percentage points since May 2012)
• Malicious Web sites – 2,106 Web sites blocked per day (a
  decrease of 51.7 percent since October 2011)

Symantec Intelligence                                             3
Targeted Attacks in 2012
• Daily targeted attacks increased by a minimum of 24%.
• More than 36% of all targeted attacks are aimed at small
  companies, compared to 18% at the end of 2011.
• Direct correlation between a rise in attacks against small
  companies and a drop in attacks against larger ones.
• 45% of all targeted attacks are aimed at the Defense industry.
• In four of the top five source countries, their own country is
  either the first or second-most targeted country.




Symantec Intelligence                                              4
Spam Rate & Sources
                      5
Symantec Intelligence   ‹#›
Additional Spam Metrics
Spam URL TLD Distribution

                                                         Change
TLD                          June         May
                                                       (% points)
.com                         74.7%       66.6%              +8.1
.ru                          4.1%        7.5%                -3.4
.net                         4.6%        5.8%                -1.2
.br                          2.9%        3.4%                -0.5

 Average Spam Message Size

                                                         Change
Message Size                     June            May
                                                       (% points)

0Kb – 5Kb                        43.1%       51.1%           -8.0
5Kb – 10Kb                       33.3%       29.1%          +4.2
>10Kb                            23.6%       19.8%          +3.8



Symantec Intelligence                                               7
Spam Subject Line Analysis
        June 2012                               No. of   May 2012                                    No. of
Rank    Total Spam: Top Subject Lines            Days    Total Spam: Top Subject Lines                Days
1      Delivery Status Notification (Failure)       28   Save-8O%-0ff-Viagra©-Cia1is©-Levitra©           28
2      Save-8O%-0ff-Viagra©-Cia1is©-Levitra©        28   (blank subject)                                 30
                                                         High-End-Designer-Watch-Replicas-Save-
3      (blank subject)                              28                                                   22
                                                         THOUSANDS-2012-Models
                                                         HIGH-QUALITY-ROLEX-REPLICA-
4      My Sexy Pics                                 28                                                   17
                                                         WATCHES&DESIGNER BAGS
                                                         ADD THREE INCHES TO YOUR MANHOOD
5      0                                             5                                                   19
                                                         NOW!
       We cant make it ANY EASIER toget LAID
6                                                   16   Order confirmation                               8
       tonight
       HIGH-QUALITY-ROLEX-REPLICA-                       Hey, You Need To Cum Check out My FucBook
7                                                   23                                                   14
       WATCHES&DESIGNER BAGS                             Page! :)
8      look at my photos                            13   Undelivered Mail Returned to Sender             30

9      Buy Viagra/Cialis Online!                     3   look at my photos                                7

10     ENLARGE YOUR MANHOOD 2-4 INCHES              22   Erika Sent You A Message                         7




Symantec Intelligence                                                                                         8
Additional Spam Metrics
Global Spam Categories

Category Name             June 2012   May 2012
Adult/Sex/Dating            64.28%     70.16%
Pharma                      18.76%     19.22%
Casino                       5.24%      0.88%
Jobs                         4.72%      3.47%
Watches                      2.94%      3.45%
Software                     1.67%      1.78%
Degrees                      0.47%      0.57%
419/Scam/Lotto               0.27%      0.13%
Mobile                       0.09%      0.14%
Newsletters                  0.08%      0.03%
Weight Loss                 <0.01%      0.08%




Symantec Intelligence                            9
Phishing Rate & Sources




                          10
Phishing Rate & Sources




                          11
Tactics of Phishing Distribution
     Automated Toolkits                          55.5%

 Other Unique Domains                    36.9%

     IP Address Domains       2.8%

 Free Web Hosting Sites           4.0%

           Typosquatting   0.8%




Symantec Intelligence                                    12
Organizations Spoofed in Phishing Attacks, by Industry
Sector
              Banking                               46.1%

         E-Commerce                         34.9%

  Information Services              15.0%

                 Retail     1.4%

      Communications        1.1%

  Telecommunications       0.919%

         Government       0.439%

          Retail Trade    0.078%

              Security    0.048%

            Insurance     0.019%

                    ISP   0.011%




Symantec Intelligence                                       13
Virus Rate




             14
Most Frequently Blocked Email Malware
   Malware Name                         % Malware
   W32/Bredolab.gen!eml.k                 17.43%
   W32/Bredolab.gen!eml.j                  9.49%
   Link-Exploit/Spam-3a71                  3.82%
   W32/NewMalware!16a0                     3.48%
   Exploit/Link-generic-ee68               3.22%
   W32/NewMalware-Generic-a2a1-3477        2.34%
   HTML/JS-Encrypted.gen                   1.69%
   Trojan.Bredolab                         1.56%
   W32/Bredolab.gen!eml-01cd               1.52%
   Link-Gen:Variant.Barys.1516.dam         1.43%




Symantec Intelligence                               15
New Malware and Spyware Sites Per Day




Symantec Intelligence                   16
Policy, Malware & Potentially Unwanted Programs




Symantec Intelligence                             17
Most Frequently Blocked Malware at the Endpoint
  Malware Name                                                                                                                           % Malware
  WS.Trojan.H                                                                                                                                29.06%
  W32.Sality.AE                                                                                                                               6.81%
  W32.Ramnit!html                                                                                                                             6.01%
  W32.Ramnit.B                                                                                                                                5.61%
  W32.Downadup.B                                                                                                                              3.82%
  W32.Ramnit.B!inf                                                                                                                            3.53%
  W32.Virut.CF                                                                                                                                2.07%
  Trojan.ADH.2                                                                                                                                2.00%
  W32.Almanahe.B!inf                                                                                                                          1.83%
  Trojan.ADH                                                                                                                                  1.43%




                        [1] For further information on these threats, please visit: http://www.symantec.com/business/security_response/landing/threats.jsp




Symantec Intelligence                                                                                                                                        18
Where to next?
• Web:
    – www.symanteccloud.com/intelligence
    – www.symantec.com/spam


• Twitter:
    – @symanteccloud




Symantec Intelligence                      19

Weitere ähnliche Inhalte

Andere mochten auch

Open For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusionOpen For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusionBrunswick Group
 
CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016Andrew Gunn
 
Getting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStackGetting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStackAnthony Chow
 
Best Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageBest Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageRyan Snell
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Accenture Technology
 

Andere mochten auch (6)

Open For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusionOpen For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusion
 
CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016
 
Getting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStackGetting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStack
 
Best Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageBest Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash Storage
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3
 
99 Facts on the Future of Business
99 Facts on the Future of Business99 Facts on the Future of Business
99 Facts on the Future of Business
 

Ă„hnlich wie Symantec Intelligence Report June 2012 Highlights

2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report2012 February Symantec Intelligence Report
2012 February Symantec Intelligence ReportSymantec
 
Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec
 
Multiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the ProsMultiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the ProsLitmus
 
2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report2011 September Symantec Intelligence Report
2011 September Symantec Intelligence ReportSymantec
 
Webinar presentation-for-web
Webinar presentation-for-webWebinar presentation-for-web
Webinar presentation-for-webBoni
 
DMA digital tracking study May 2010
DMA digital tracking study May 2010DMA digital tracking study May 2010
DMA digital tracking study May 2010Bryan Miller
 
Multiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpopMultiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpopSilverpop
 
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)Global Business Events
 
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...McKinley Advisors
 
Security4all Desktop Security
Security4all   Desktop SecuritySecurity4all   Desktop Security
Security4all Desktop SecurityBen W.
 
Credit Suisse Group Financial Services Forum
	Credit Suisse Group Financial Services Forum 	Credit Suisse Group Financial Services Forum
Credit Suisse Group Financial Services Forum QuarterlyEarningsReports3
 
Mobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail SectorMobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail SectorMobilosoft
 
McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011McDougall Interactive
 
LonghornPHP - CVE 101.pdf
LonghornPHP - CVE 101.pdfLonghornPHP - CVE 101.pdf
LonghornPHP - CVE 101.pdfTheresa Mammarella
 
2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source results2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source resultsBryan House
 
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de marktMobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de marktShareforce
 
Mobile Email: Why, What, How
Mobile Email: Why, What, HowMobile Email: Why, What, How
Mobile Email: Why, What, HowLitmus
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec
 

Ă„hnlich wie Symantec Intelligence Report June 2012 Highlights (20)

2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report
 
Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011
 
Multiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the ProsMultiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the Pros
 
2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report
 
Webinar presentation-for-web
Webinar presentation-for-webWebinar presentation-for-web
Webinar presentation-for-web
 
DMA digital tracking study May 2010
DMA digital tracking study May 2010DMA digital tracking study May 2010
DMA digital tracking study May 2010
 
Multiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpopMultiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpop
 
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
 
Reeves - Williams
Reeves - WilliamsReeves - Williams
Reeves - Williams
 
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
 
Security4all Desktop Security
Security4all   Desktop SecuritySecurity4all   Desktop Security
Security4all Desktop Security
 
Credit Suisse Group Financial Services Forum
	Credit Suisse Group Financial Services Forum 	Credit Suisse Group Financial Services Forum
Credit Suisse Group Financial Services Forum
 
Mobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail SectorMobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail Sector
 
McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011
 
LonghornPHP - CVE 101.pdf
LonghornPHP - CVE 101.pdfLonghornPHP - CVE 101.pdf
LonghornPHP - CVE 101.pdf
 
BNYMellon - CVE 101.pdf
BNYMellon - CVE 101.pdfBNYMellon - CVE 101.pdf
BNYMellon - CVE 101.pdf
 
2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source results2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source results
 
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de marktMobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
 
Mobile Email: Why, What, How
Mobile Email: Why, What, HowMobile Email: Why, What, How
Mobile Email: Why, What, How
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 

Mehr von Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

KĂĽrzlich hochgeladen

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 

KĂĽrzlich hochgeladen (20)

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 

Symantec Intelligence Report June 2012 Highlights

  • 1. Symantec Intelligence Report June 2012 Symantec Intelligence 1
  • 2. About the Symantec Intelligence Report The Symantec Intelligence report provides the latest analysis of cyber security threats, trends and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this combined report includes data from May and June 2012. Symantec Intelligence 2
  • 3. October 2011 Highlights • 36% of targeted attacks directed at SMBs • Further analysis of W32.Flamer • In-depth look a recently attempted targeted attack • Spam – 66.8 percent (a decrease of 1.0 percentage point since May 2012) • Phishing – One in 467.6 emails identified as phishing (an increase of 0.04 percentage points since May 2012) • Malware – One in 316.5 emails contained malware (an increase of 0.04 percentage points since May 2012) • Malicious Web sites – 2,106 Web sites blocked per day (a decrease of 51.7 percent since October 2011) Symantec Intelligence 3
  • 4. Targeted Attacks in 2012 • Daily targeted attacks increased by a minimum of 24%. • More than 36% of all targeted attacks are aimed at small companies, compared to 18% at the end of 2011. • Direct correlation between a rise in attacks against small companies and a drop in attacks against larger ones. • 45% of all targeted attacks are aimed at the Defense industry. • In four of the top five source countries, their own country is either the first or second-most targeted country. Symantec Intelligence 4
  • 5. Spam Rate & Sources 5
  • 6. Symantec Intelligence ‹#›
  • 7. Additional Spam Metrics Spam URL TLD Distribution Change TLD June May (% points) .com 74.7% 66.6% +8.1 .ru 4.1% 7.5% -3.4 .net 4.6% 5.8% -1.2 .br 2.9% 3.4% -0.5 Average Spam Message Size Change Message Size June May (% points) 0Kb – 5Kb 43.1% 51.1% -8.0 5Kb – 10Kb 33.3% 29.1% +4.2 >10Kb 23.6% 19.8% +3.8 Symantec Intelligence 7
  • 8. Spam Subject Line Analysis June 2012 No. of May 2012 No. of Rank Total Spam: Top Subject Lines Days Total Spam: Top Subject Lines Days 1 Delivery Status Notification (Failure) 28 Save-8O%-0ff-Viagra©-Cia1is©-Levitra© 28 2 Save-8O%-0ff-Viagra©-Cia1is©-Levitra© 28 (blank subject) 30 High-End-Designer-Watch-Replicas-Save- 3 (blank subject) 28 22 THOUSANDS-2012-Models HIGH-QUALITY-ROLEX-REPLICA- 4 My Sexy Pics 28 17 WATCHES&DESIGNER BAGS ADD THREE INCHES TO YOUR MANHOOD 5 0 5 19 NOW! We cant make it ANY EASIER toget LAID 6 16 Order confirmation 8 tonight HIGH-QUALITY-ROLEX-REPLICA- Hey, You Need To Cum Check out My FucBook 7 23 14 WATCHES&DESIGNER BAGS Page! :) 8 look at my photos 13 Undelivered Mail Returned to Sender 30 9 Buy Viagra/Cialis Online! 3 look at my photos 7 10 ENLARGE YOUR MANHOOD 2-4 INCHES 22 Erika Sent You A Message 7 Symantec Intelligence 8
  • 9. Additional Spam Metrics Global Spam Categories Category Name June 2012 May 2012 Adult/Sex/Dating 64.28% 70.16% Pharma 18.76% 19.22% Casino 5.24% 0.88% Jobs 4.72% 3.47% Watches 2.94% 3.45% Software 1.67% 1.78% Degrees 0.47% 0.57% 419/Scam/Lotto 0.27% 0.13% Mobile 0.09% 0.14% Newsletters 0.08% 0.03% Weight Loss <0.01% 0.08% Symantec Intelligence 9
  • 10. Phishing Rate & Sources 10
  • 11. Phishing Rate & Sources 11
  • 12. Tactics of Phishing Distribution Automated Toolkits 55.5% Other Unique Domains 36.9% IP Address Domains 2.8% Free Web Hosting Sites 4.0% Typosquatting 0.8% Symantec Intelligence 12
  • 13. Organizations Spoofed in Phishing Attacks, by Industry Sector Banking 46.1% E-Commerce 34.9% Information Services 15.0% Retail 1.4% Communications 1.1% Telecommunications 0.919% Government 0.439% Retail Trade 0.078% Security 0.048% Insurance 0.019% ISP 0.011% Symantec Intelligence 13
  • 15. Most Frequently Blocked Email Malware Malware Name % Malware W32/Bredolab.gen!eml.k 17.43% W32/Bredolab.gen!eml.j 9.49% Link-Exploit/Spam-3a71 3.82% W32/NewMalware!16a0 3.48% Exploit/Link-generic-ee68 3.22% W32/NewMalware-Generic-a2a1-3477 2.34% HTML/JS-Encrypted.gen 1.69% Trojan.Bredolab 1.56% W32/Bredolab.gen!eml-01cd 1.52% Link-Gen:Variant.Barys.1516.dam 1.43% Symantec Intelligence 15
  • 16. New Malware and Spyware Sites Per Day Symantec Intelligence 16
  • 17. Policy, Malware & Potentially Unwanted Programs Symantec Intelligence 17
  • 18. Most Frequently Blocked Malware at the Endpoint Malware Name % Malware WS.Trojan.H 29.06% W32.Sality.AE 6.81% W32.Ramnit!html 6.01% W32.Ramnit.B 5.61% W32.Downadup.B 3.82% W32.Ramnit.B!inf 3.53% W32.Virut.CF 2.07% Trojan.ADH.2 2.00% W32.Almanahe.B!inf 1.83% Trojan.ADH 1.43% [1] For further information on these threats, please visit: http://www.symantec.com/business/security_response/landing/threats.jsp Symantec Intelligence 18
  • 19. Where to next? • Web: – www.symanteccloud.com/intelligence – www.symantec.com/spam • Twitter: – @symanteccloud Symantec Intelligence 19

Hinweis der Redaktion

  1. x
  2. comprising a phishing attack.