SlideShare a Scribd company logo
1 of 27
Symantec Intelligence Report

    August 2011


Symantec Intelligence              1
The Symantec Intelligence Report
The new Symantec Intelligence Report combines the best
research and analysis from Symantec:
• Symantec.cloud MessageLabs Intelligence Report
• Symantec State of Spam & Phishing Report


The Symantec Intelligence Report integrated report provides the
latest analysis of cyber security threats, trends and insights from
the Symantec Intelligence team




Symantec Intelligence                                                 2
August 2011 Highlights
• Spam – 75.9 percent in August
• Phishing – One in 207.7 emails identified as phishing
• Malware – One in 203.3 emails in August contained malware
• Malicious Web sites – 3,441 Web sites blocked per day
• 34.1 percent of all malicious domains blocked were new in August
• 17.3 percent of all Web-based malware blocked was new in August


• Global Debt Crises News Drives Pump-and-Dump Stock Scams
• Are MBR Infections Back in Fashion?
• Phishing Apple’s iDisk
• Phishing Brazilian Brands
• The Truth Behind the Shady RAT
• Spammers take advantage of Unicode normalisation to hide URLs
• Best Practices for Enterprises and Users


Symantec Intelligence                                                3
Global Debt Crises News Drives Pump-and-Dump Stock
Scams




Symantec Intelligence                                4
Global Debt Crises News Drives Pump-and-Dump Stock
Scams




Symantec Intelligence                                5
Bootup malware




Symantec Intelligence   6
Phishing Apple’s iDisk




   http://******.com/test?authenticate_username=******
   [Domain name and User name removed]

Symantec Intelligence                                    7
Phishing Brazilian Brands

 •       12 hosting sites were used to host 4% of
         the phishing sites on Brazilian brands
 •       Banking made up about 39% of the
         brands targeted
 •       Social networking attacks targeted one
         brand and comprised 61%of the total
 •       0.5% spoofed a major airline
 •       Approximately 64% of the phishing sites
         were created using automated phishing
         toolkits; the remaining 36% were unique
         URLs



http://***.***.***.***/~namo/login011/?accounts/ServiceLogin?
http://***.***.***.***/~namo/login008/?accounts/ServiceLogin?
[IP addresses removed]

     Symantec Intelligence                                      8
The Truth Behind the Shady RAT




                        Example attachment names included:
                        •Participant_Contacts.xls
                        •2011 project budget.xls
                        •Contact List -Update.xls
                        •The budget justification.xls

Symantec Intelligence                                        9
The Truth Behind the Shady RAT




              •    www.comto[REMOVED].com/wak/mansher0.gif
              •    www.kay[REMOVED].net/images/btn_topsec.jpg
              •    www.swim[REMOVED[.net/images/sleepyboo.jpg
              •    www.comto[REMOVED].com/Tech/Lesson15.htm



Symantec Intelligence                                           10
Spammers take advantage of Unicode normalisation to
hide URLs
For example, a spam message contains the following URL:


    Unicode character U+217C ("SMALL ROMAN NUMERAL FIFTY")


http://example․ⅼy/xyz
                        Unicode character U+2024 ("ONE DOT LEADER")




Symantec Intelligence                                             11
Spammers take advantage of Unicode normalisation to
hide URLs




Symantec Intelligence                             12
Spam Rate & Sources
                      13
Additional Spam Metrics
Global Spam Categories

     Category Name                August 2011   July 2011
     Pharmaceutical                    40.0%       47.0%
     Adult/Sex/Dating                  19.0%       14.5%
     Watches/Jewelry                   17.5%         7.5%
     Unsolicited Newsletters           11.5%         7.5%
     Casino/Gambling                     7.0%        3.5%
     Unknown/Other                       2.5%        2.0%
     Degrees/Diplomas                    1.5%        2.5%
     Jobs/Recruitments                   1.0%      10.5%
     Discount Products/Software          0.5%      <0.5%
     Scams/Fraud/419                     0.5%      <0.5%


Symantec Intelligence                                       14
Spam Subject Line Analysis
        August 2011                          No. of   July 2011                       No. of
Rank    Total Spam: Top Subject Lines         Days    Total Spam: Top Subject Lines    Days
1       (blank subject line)                    31    drop me a line                     30
        ED-Meds-Antidepressants-And-Pain        31
2                                                     r u online now?                    30
        Relief-Meds-8O%-OFF
        Buy Advanced Penis Enlargement          31
3                                                     hi darling..                       30
        Pill now, it is selling fast.
        Made of the most potent clinically      31
4                                                     new email                          30
        proven natural herbs.
        Permanently increases length and        31
5       width of your erection. Advanced              found you :)                       30
        Penis Enlargement Pill.
        Advanced Penis Enlargement Pill.        31
6       Permanently increases length and              im online now                      30
        width of your erection.
7       my hot pics :)                          23    my new pics :)                     30
8       found you :)                            23    my new email                       30
9       new pics for you..                      24    my hot pics :)                     30
10      im online now                           23    I'm online now…                    30




Symantec Intelligence                                                                          15
Additional Spam Metrics
Spam URL TLD Distribution

                                           Change
TLD                     August    July
                                         (% points)
.com                     57.6%   54.9%        +2.7
.ru                       7.1%   10.6%         -3.5
.info                    18.4%   18.3%        +0.1
.net                      5.8%    6.2%         -0.4

 Average Spam Message Size

                                           Change
Message Size            August    July
                                         (% points)
0Kb – 5Kb                49.7%   65.1%        -15.4
5Kb – 10Kb               35.2%   21.2%       +14.0
>10Kb                    15.0%   13.7%        +1.3



Symantec Intelligence                                 16
Additional Spam Metrics
Spam Attack Vectors

15%

12%
                                                                               At achment
 9%

 6%

 3%
                                                                      NDR
 0%
    10 Jul      13 Jul   16 Jul   19 Jul   22 Jul   25 Jul   28 Jul   31 Jul      03 Aug    06 Aug   09 Aug



Symantec Intelligence                                                                                 17
Phishing Rate & Sources




                          18
Phishing Rate & Sources
    P h is h in g W e b S it e s L o c a tio n s
                                                          C o u n try                  Ju ly
                                                                                      August         J uJuly
                                                                                                         ne
                                     2
                                                   5      U n it e d S t a t e s     4 9 .8 %      49.5%
                4                3
                                                          G e rm a n y                6 .5 %         6.5%
                    1
                                                          U n i t e d K in g d o m    3 .8 %         3.7%
                                                          C anada                     3 .7 %         3.3%
                                                          R u s s ia                  3 .0 %         2.7%
                                                          F ra n c e                  2 .7 %         3.1%
                                                          B ra z il                   2 .6 %         2.2%
                                                          N e t h e rla n d s         2 .3 %         2.1%
                                                          P o la n d                  1 .6 %         1.7%
                                                          C h in a                    2 .5 %         2.8%

                                                                                                A u g u s t 2 0 11



•     The number of phishing Web sites decreased by 6.75% in August
•     The number of phishing Web sites created by automated toolkits decreased by 18.3%
•     The number of unique phishing URLs decreased by 1.67%
•     Phishing Web sites using IP addresses in place of domain names (e.g.
      http://255.255.255.255), increased by 18.34%
•     Legitimate hosting services accounted for approximately 9% of all phishing sites, a
      decrease of 16.81% since July

•     The number of non-English phishing sites saw an increase of 9.07%
•     The most common non-English languages identified in phishing Web sites during August
      included Portuguese, French, Italian and Spanish.
                                                                                                                     19
Tactics of Phishing Distribution




Symantec Intelligence              20
Organizations Spoofed in Phishing Attacks, by Industry
Sector




Symantec Intelligence                                    21
Virus Rate




             22
Most Frequently Blocked Email Malware
   Malware Name                         % Malware
   Exploit/SuspLink-e958                    7.20%
   W32/Bredolab.gen!eml                     4.90%
   Exploit/SuspLink.dam                     4.34%
   W32/Generic.dam                          2.09%
   W32/Generic-6ac4                         2.06%
   Exploit/MimeBoundary003                  1.69%
   W32/Netsky.c-mm                          1.56%
   Exploit/Link-e88c                        1.47%
   VBS/Generic                              1.36%
   W32/Netsky.P-mm                          1.34%



Symantec Intelligence                               23
New Malware and Spyware Sites Per Day




Symantec Intelligence                   24
Policy, Malware & Potentially Unwanted Programs




Symantec Intelligence                             25
Most Frequently Blocked Malware at the Endpoint
  Malware Name                                                                                                                             % Malware
  W32.Ramnit!html                                                                                                                                      8.68%
  W32.Sality.AE                                                                                                                                        8.44%
  Trojan.Bamital                                                                                                                                       8.10%
  W32.Ramnit.B!inf                                                                                                                                     6.84%
  W32.Downadup.B                                                                                                                                       3.63%
  W32.SillyFDC.BDP!lnk                                                                                                                                 2.59%
  W32.Virut.CF                                                                                                                                         2.58%
  W32.Almanahe.B!inf                                                                                                                                   2.38%
  W32.SillyFDC                                                                                                                                         1.75%
  Trojan.ADH.2                                                                                                                                         1.74%

                        [1] For further information on these threats, please visit: http://www.symantec.com/business/security_response/landing/threats.jsp




Symantec Intelligence                                                                                                                                          26
Where to next?
• Web:
    – www.symanteccloud.com/intelligence
    – www.symantec.com/spam


• Twitter:
    – @symanteccloud




Symantec Intelligence                      27

More Related Content

What's hot (6)

Asia’s social media map and users’ online (june 2010)
Asia’s social media map and users’ online (june 2010)Asia’s social media map and users’ online (june 2010)
Asia’s social media map and users’ online (june 2010)
 
Danis lsssg
Danis lsssgDanis lsssg
Danis lsssg
 
Admob regional traffic growth 2010
Admob regional traffic growth 2010Admob regional traffic growth 2010
Admob regional traffic growth 2010
 
Nielsen亚太SNS研究
Nielsen亚太SNS研究Nielsen亚太SNS研究
Nielsen亚太SNS研究
 
Analyse de 150 pages avec Facebook Login (ex Facebook Connect)
Analyse de 150 pages avec Facebook Login (ex Facebook Connect)Analyse de 150 pages avec Facebook Login (ex Facebook Connect)
Analyse de 150 pages avec Facebook Login (ex Facebook Connect)
 
Analysis of 150 Websites Using Facebook Login
Analysis of 150 Websites Using Facebook LoginAnalysis of 150 Websites Using Facebook Login
Analysis of 150 Websites Using Facebook Login
 

Similar to Symantec Intelligence Report August 2011

Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
Symantec
 
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
McKinley Advisors
 
Ibm advanced analytics platform for m&e
Ibm advanced analytics platform for m&eIbm advanced analytics platform for m&e
Ibm advanced analytics platform for m&e
United Partners
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
Mehul Doshi
 
Delvinia Digital Diseases Presentation Smei
Delvinia Digital Diseases Presentation SmeiDelvinia Digital Diseases Presentation Smei
Delvinia Digital Diseases Presentation Smei
Delvinia
 
Riding Wave Social Networking 24 Mar 2009
Riding Wave Social Networking 24 Mar 2009Riding Wave Social Networking 24 Mar 2009
Riding Wave Social Networking 24 Mar 2009
Erick Caniso
 

Similar to Symantec Intelligence Report August 2011 (20)

2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report
 
2011 October Symantec Intelligence Report
2011 October Symantec Intelligence Report2011 October Symantec Intelligence Report
2011 October Symantec Intelligence Report
 
Create Values from Big Data & Social Media Mash-Up
Create Values from Big Data & Social Media Mash-UpCreate Values from Big Data & Social Media Mash-Up
Create Values from Big Data & Social Media Mash-Up
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 
Gerry McGovern - Earth Experience Design (Camp Digital 2022)
Gerry McGovern - Earth Experience Design (Camp Digital 2022)Gerry McGovern - Earth Experience Design (Camp Digital 2022)
Gerry McGovern - Earth Experience Design (Camp Digital 2022)
 
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
 
Big datamarket022812rv
Big datamarket022812rvBig datamarket022812rv
Big datamarket022812rv
 
2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report
 
Perils of Perception December 2018
Perils of Perception December 2018Perils of Perception December 2018
Perils of Perception December 2018
 
Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
 
5 steps of curation service
5 steps of curation service5 steps of curation service
5 steps of curation service
 
Ibm advanced analytics platform for m&e
Ibm advanced analytics platform for m&eIbm advanced analytics platform for m&e
Ibm advanced analytics platform for m&e
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
 
Turning Social Data Into Strategic Advantage: What Marketers Need to Know
Turning Social Data Into Strategic Advantage: What Marketers Need to KnowTurning Social Data Into Strategic Advantage: What Marketers Need to Know
Turning Social Data Into Strategic Advantage: What Marketers Need to Know
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
 
Brave New World: The End of Survey Research
Brave New World: The End of Survey ResearchBrave New World: The End of Survey Research
Brave New World: The End of Survey Research
 
Delvinia Digital Diseases Presentation Smei
Delvinia Digital Diseases Presentation SmeiDelvinia Digital Diseases Presentation Smei
Delvinia Digital Diseases Presentation Smei
 
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudGraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
 
Riding Wave Social Networking 24 Mar 2009
Riding Wave Social Networking 24 Mar 2009Riding Wave Social Networking 24 Mar 2009
Riding Wave Social Networking 24 Mar 2009
 
How Consumers Engage with Mobile Apps
How Consumers Engage with Mobile AppsHow Consumers Engage with Mobile Apps
How Consumers Engage with Mobile Apps
 

More from Symantec

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Symantec Intelligence Report August 2011

  • 1. Symantec Intelligence Report August 2011 Symantec Intelligence 1
  • 2. The Symantec Intelligence Report The new Symantec Intelligence Report combines the best research and analysis from Symantec: • Symantec.cloud MessageLabs Intelligence Report • Symantec State of Spam & Phishing Report The Symantec Intelligence Report integrated report provides the latest analysis of cyber security threats, trends and insights from the Symantec Intelligence team Symantec Intelligence 2
  • 3. August 2011 Highlights • Spam – 75.9 percent in August • Phishing – One in 207.7 emails identified as phishing • Malware – One in 203.3 emails in August contained malware • Malicious Web sites – 3,441 Web sites blocked per day • 34.1 percent of all malicious domains blocked were new in August • 17.3 percent of all Web-based malware blocked was new in August • Global Debt Crises News Drives Pump-and-Dump Stock Scams • Are MBR Infections Back in Fashion? • Phishing Apple’s iDisk • Phishing Brazilian Brands • The Truth Behind the Shady RAT • Spammers take advantage of Unicode normalisation to hide URLs • Best Practices for Enterprises and Users Symantec Intelligence 3
  • 4. Global Debt Crises News Drives Pump-and-Dump Stock Scams Symantec Intelligence 4
  • 5. Global Debt Crises News Drives Pump-and-Dump Stock Scams Symantec Intelligence 5
  • 7. Phishing Apple’s iDisk http://******.com/test?authenticate_username=****** [Domain name and User name removed] Symantec Intelligence 7
  • 8. Phishing Brazilian Brands • 12 hosting sites were used to host 4% of the phishing sites on Brazilian brands • Banking made up about 39% of the brands targeted • Social networking attacks targeted one brand and comprised 61%of the total • 0.5% spoofed a major airline • Approximately 64% of the phishing sites were created using automated phishing toolkits; the remaining 36% were unique URLs http://***.***.***.***/~namo/login011/?accounts/ServiceLogin? http://***.***.***.***/~namo/login008/?accounts/ServiceLogin? [IP addresses removed] Symantec Intelligence 8
  • 9. The Truth Behind the Shady RAT Example attachment names included: •Participant_Contacts.xls •2011 project budget.xls •Contact List -Update.xls •The budget justification.xls Symantec Intelligence 9
  • 10. The Truth Behind the Shady RAT • www.comto[REMOVED].com/wak/mansher0.gif • www.kay[REMOVED].net/images/btn_topsec.jpg • www.swim[REMOVED[.net/images/sleepyboo.jpg • www.comto[REMOVED].com/Tech/Lesson15.htm Symantec Intelligence 10
  • 11. Spammers take advantage of Unicode normalisation to hide URLs For example, a spam message contains the following URL: Unicode character U+217C ("SMALL ROMAN NUMERAL FIFTY") http://example․ⅼy/xyz Unicode character U+2024 ("ONE DOT LEADER") Symantec Intelligence 11
  • 12. Spammers take advantage of Unicode normalisation to hide URLs Symantec Intelligence 12
  • 13. Spam Rate & Sources 13
  • 14. Additional Spam Metrics Global Spam Categories Category Name August 2011 July 2011 Pharmaceutical 40.0% 47.0% Adult/Sex/Dating 19.0% 14.5% Watches/Jewelry 17.5% 7.5% Unsolicited Newsletters 11.5% 7.5% Casino/Gambling 7.0% 3.5% Unknown/Other 2.5% 2.0% Degrees/Diplomas 1.5% 2.5% Jobs/Recruitments 1.0% 10.5% Discount Products/Software 0.5% <0.5% Scams/Fraud/419 0.5% <0.5% Symantec Intelligence 14
  • 15. Spam Subject Line Analysis August 2011 No. of July 2011 No. of Rank Total Spam: Top Subject Lines Days Total Spam: Top Subject Lines Days 1 (blank subject line) 31 drop me a line 30 ED-Meds-Antidepressants-And-Pain 31 2 r u online now? 30 Relief-Meds-8O%-OFF Buy Advanced Penis Enlargement 31 3 hi darling.. 30 Pill now, it is selling fast. Made of the most potent clinically 31 4 new email 30 proven natural herbs. Permanently increases length and 31 5 width of your erection. Advanced found you :) 30 Penis Enlargement Pill. Advanced Penis Enlargement Pill. 31 6 Permanently increases length and im online now 30 width of your erection. 7 my hot pics :) 23 my new pics :) 30 8 found you :) 23 my new email 30 9 new pics for you.. 24 my hot pics :) 30 10 im online now 23 I'm online now… 30 Symantec Intelligence 15
  • 16. Additional Spam Metrics Spam URL TLD Distribution Change TLD August July (% points) .com 57.6% 54.9% +2.7 .ru 7.1% 10.6% -3.5 .info 18.4% 18.3% +0.1 .net 5.8% 6.2% -0.4 Average Spam Message Size Change Message Size August July (% points) 0Kb – 5Kb 49.7% 65.1% -15.4 5Kb – 10Kb 35.2% 21.2% +14.0 >10Kb 15.0% 13.7% +1.3 Symantec Intelligence 16
  • 17. Additional Spam Metrics Spam Attack Vectors 15% 12% At achment 9% 6% 3% NDR 0% 10 Jul 13 Jul 16 Jul 19 Jul 22 Jul 25 Jul 28 Jul 31 Jul 03 Aug 06 Aug 09 Aug Symantec Intelligence 17
  • 18. Phishing Rate & Sources 18
  • 19. Phishing Rate & Sources P h is h in g W e b S it e s L o c a tio n s C o u n try Ju ly August J uJuly ne 2 5 U n it e d S t a t e s 4 9 .8 % 49.5% 4 3 G e rm a n y 6 .5 % 6.5% 1 U n i t e d K in g d o m 3 .8 % 3.7% C anada 3 .7 % 3.3% R u s s ia 3 .0 % 2.7% F ra n c e 2 .7 % 3.1% B ra z il 2 .6 % 2.2% N e t h e rla n d s 2 .3 % 2.1% P o la n d 1 .6 % 1.7% C h in a 2 .5 % 2.8% A u g u s t 2 0 11 • The number of phishing Web sites decreased by 6.75% in August • The number of phishing Web sites created by automated toolkits decreased by 18.3% • The number of unique phishing URLs decreased by 1.67% • Phishing Web sites using IP addresses in place of domain names (e.g. http://255.255.255.255), increased by 18.34% • Legitimate hosting services accounted for approximately 9% of all phishing sites, a decrease of 16.81% since July • The number of non-English phishing sites saw an increase of 9.07% • The most common non-English languages identified in phishing Web sites during August included Portuguese, French, Italian and Spanish. 19
  • 20. Tactics of Phishing Distribution Symantec Intelligence 20
  • 21. Organizations Spoofed in Phishing Attacks, by Industry Sector Symantec Intelligence 21
  • 23. Most Frequently Blocked Email Malware Malware Name % Malware Exploit/SuspLink-e958 7.20% W32/Bredolab.gen!eml 4.90% Exploit/SuspLink.dam 4.34% W32/Generic.dam 2.09% W32/Generic-6ac4 2.06% Exploit/MimeBoundary003 1.69% W32/Netsky.c-mm 1.56% Exploit/Link-e88c 1.47% VBS/Generic 1.36% W32/Netsky.P-mm 1.34% Symantec Intelligence 23
  • 24. New Malware and Spyware Sites Per Day Symantec Intelligence 24
  • 25. Policy, Malware & Potentially Unwanted Programs Symantec Intelligence 25
  • 26. Most Frequently Blocked Malware at the Endpoint Malware Name % Malware W32.Ramnit!html 8.68% W32.Sality.AE 8.44% Trojan.Bamital 8.10% W32.Ramnit.B!inf 6.84% W32.Downadup.B 3.63% W32.SillyFDC.BDP!lnk 2.59% W32.Virut.CF 2.58% W32.Almanahe.B!inf 2.38% W32.SillyFDC 1.75% Trojan.ADH.2 1.74% [1] For further information on these threats, please visit: http://www.symantec.com/business/security_response/landing/threats.jsp Symantec Intelligence 26
  • 27. Where to next? • Web: – www.symanteccloud.com/intelligence – www.symantec.com/spam • Twitter: – @symanteccloud Symantec Intelligence 27