SlideShare ist ein Scribd-Unternehmen logo
1 von 22
1 | Trend Report Overview Real Security. In Real Time.
Internet Threats
Trend Report
April 2013
2 | Trend Report Overview Real Security. In Real Time.
The following is a condensed version
of the April 2013 Commtouch
Internet Threats Trend Report
You can download the complete report at
http://www.commtouch.com/threat-report-april-2013
Copyright© 2013 Commtouch Software Ltd. Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView
are trademarks, and Commtouch, Authentium, Command Antivirus and Command Anti-malware are
registered trademarks, of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch.
April 2013 Threat Report
Spam Trends
4 | Trend Report Overview Real Security. In Real Time.
 Average 97.4 billion spam emails sent worldwide each day
 In March average rose to 117.8 billion
• March: 78.1 percent of all email were spam, a significant increase
from January when the spam share was as low as 60 percent
Spam levels
5 | Trend Report Overview Real Security. In Real Time.
 Spammers use
current news topics
of the day to lure
recipients into
opening messages or
clicking on links
• Examples: New Pope
election, Cyprus
financial crisis
Event related spam
6 | Trend Report Overview Real Security. In Real Time.
 Re-emergence of pump and dump or penny stock spam
• 43% in Q1
 (part of “other” category)
Spam Topics
7 | Trend Report Overview Real Security. In Real Time.
Origins of spam
Zombie Trends
9 | Trend Report Overview Real Security. In Real Time.
 Not related to spam zombie levels
• Daily levels were basically constant during the attacks
• Reports suggested that the attack was the work of one or more
organizations who resented their inclusion in one or more of the
Spamhaus blocklists
Spamhaus DDoS attack
10 | Trend Report Overview Real Security. In Real Time.
 India still hosts over 12% of the world’s spam sending
zombies
• Zombie distribution was dominated by Asia (the top three and five
out of the top ten), South America (three) and Eastern Europe (two).
Zombie Hotspots
Malware Trends
12 | Trend Report Overview Real Security. In Real Time.
 Q1 average: 973 million malware emails sent each day
• In March, volume rose by 75.1 percent compared to February
 More localized email-malware campaigns
• Eg: Zalando, hotel.de, flugladen.de
Email-attached-malware levels
13 | Trend Report Overview Real Security. In Real Time.
 Single link emails sent from the compromised Yahoo
accounts
 Links lead to compromised websites which redirect to
“distribution sites”
 Distribution sites direct the visitor based on the browser type
 PC visitors sent to diet scam pages
Android targeted attacks (1)
14 | Trend Report Overview Real Security. In Real Time.
 Android visitors sent to
malware download page
 Commtouch’s Antivirus
detects malware:
AndroidOS/NotCom.A
• Acts as a proxy so it’s
able to transmit and
receive network data
through the infected
android device. This
means it can steal all
kinds of sensitive data
sent or received through
the device network
connection
Android targeted attacks (2)
Web Security Trends
16 | Trend Report Overview Real Security. In Real Time.
 The first quarter of 2013 saw extensive use made of the
Blackhole exploit kit.
• The JavaScript on the page scans the visiting system to determine
the versions of popular and operating system software such as
Adobe Flash, Adobe Reader, Java, Windows, and browsers.
• Once the kit has determined that there is vulnerability – for
example, in an older version of Adobe Flash found on the visiting
system – the relevant exploit is loaded allowing the controller to gain
a foothold on the infected system.
• Finally the Blackhole controller, having gained control of the
visitor, can now deliver further malicious content. This could include
a wide range of badware such as fake AV, ransomware, or logging
software to steal banking and Web credentials.
Blackhole exploit kit (1)
17 | Trend Report Overview Real Security. In Real Time.
 A range of emails were used to drive recipients to Blackhole
hosting sites
Blackhole exploit kit (2)
18 | Trend Report Overview Real Security. In Real Time.
Rank Category Rank Category
1 Education 6 Health & Medicine
2 Business 7 Transportation
3 Travel 8 Leisure & Recreation
4 Sports 9
Pornography/Sexually
explicit
5 Entertainment 10 Free Web Pages
 Analysis of which categories of legitimate Web sites were
most likely to be hiding malware pages (usually without the
knowledge of the site owner)
 Education category on top again
Web categories: malware
19 | Trend Report Overview Real Security. In Real Time.
Rank Category Rank Category
1 Free Web Pages Portals 6 Shopping
2 Education 7 Travel
3 Computers & Technology 8 Real Estate
4 Business 9 Streaming Media
5 Sports 10 Health & Medicine
 Analysis of which categories of legitimate Web sites were
most likely to be hiding phishing pages (usually without the
knowledge of the site owner)
 Portals (offering free website hosting) remained at the
highest position
Web categories: phishing
Further Info
21 | Trend Report Overview Real Security. In Real Time.
You can download the complete report at
http://www.commtouch.com/threat-report-april-2013
22 | Trend Report Overview Real Security. In Real Time.
For more information contact:
sales@commtouch.com
888 974 5805 (Americas)
+49 30 5200 560 (EMEA)
+972 9 863 6888 (APAC)
Web: www.commtouch.com
Blog: http://blog.commtouch.com

Weitere ähnliche Inhalte

Mehr von Cyren, Inc

Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeCyren, Inc
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Cyren, Inc
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015Cyren, Inc
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Cyren, Inc
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportCyren, Inc
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeCyren, Inc
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourCyren, Inc
 

Mehr von Cyren, Inc (20)

Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend report
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle Cybercrime
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
 

Kürzlich hochgeladen

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Kürzlich hochgeladen (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Commtouch april 2013 internet threats trend report

  • 1. 1 | Trend Report Overview Real Security. In Real Time. Internet Threats Trend Report April 2013
  • 2. 2 | Trend Report Overview Real Security. In Real Time. The following is a condensed version of the April 2013 Commtouch Internet Threats Trend Report You can download the complete report at http://www.commtouch.com/threat-report-april-2013 Copyright© 2013 Commtouch Software Ltd. Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Commtouch, Authentium, Command Antivirus and Command Anti-malware are registered trademarks, of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch. April 2013 Threat Report
  • 4. 4 | Trend Report Overview Real Security. In Real Time.  Average 97.4 billion spam emails sent worldwide each day  In March average rose to 117.8 billion • March: 78.1 percent of all email were spam, a significant increase from January when the spam share was as low as 60 percent Spam levels
  • 5. 5 | Trend Report Overview Real Security. In Real Time.  Spammers use current news topics of the day to lure recipients into opening messages or clicking on links • Examples: New Pope election, Cyprus financial crisis Event related spam
  • 6. 6 | Trend Report Overview Real Security. In Real Time.  Re-emergence of pump and dump or penny stock spam • 43% in Q1  (part of “other” category) Spam Topics
  • 7. 7 | Trend Report Overview Real Security. In Real Time. Origins of spam
  • 9. 9 | Trend Report Overview Real Security. In Real Time.  Not related to spam zombie levels • Daily levels were basically constant during the attacks • Reports suggested that the attack was the work of one or more organizations who resented their inclusion in one or more of the Spamhaus blocklists Spamhaus DDoS attack
  • 10. 10 | Trend Report Overview Real Security. In Real Time.  India still hosts over 12% of the world’s spam sending zombies • Zombie distribution was dominated by Asia (the top three and five out of the top ten), South America (three) and Eastern Europe (two). Zombie Hotspots
  • 12. 12 | Trend Report Overview Real Security. In Real Time.  Q1 average: 973 million malware emails sent each day • In March, volume rose by 75.1 percent compared to February  More localized email-malware campaigns • Eg: Zalando, hotel.de, flugladen.de Email-attached-malware levels
  • 13. 13 | Trend Report Overview Real Security. In Real Time.  Single link emails sent from the compromised Yahoo accounts  Links lead to compromised websites which redirect to “distribution sites”  Distribution sites direct the visitor based on the browser type  PC visitors sent to diet scam pages Android targeted attacks (1)
  • 14. 14 | Trend Report Overview Real Security. In Real Time.  Android visitors sent to malware download page  Commtouch’s Antivirus detects malware: AndroidOS/NotCom.A • Acts as a proxy so it’s able to transmit and receive network data through the infected android device. This means it can steal all kinds of sensitive data sent or received through the device network connection Android targeted attacks (2)
  • 16. 16 | Trend Report Overview Real Security. In Real Time.  The first quarter of 2013 saw extensive use made of the Blackhole exploit kit. • The JavaScript on the page scans the visiting system to determine the versions of popular and operating system software such as Adobe Flash, Adobe Reader, Java, Windows, and browsers. • Once the kit has determined that there is vulnerability – for example, in an older version of Adobe Flash found on the visiting system – the relevant exploit is loaded allowing the controller to gain a foothold on the infected system. • Finally the Blackhole controller, having gained control of the visitor, can now deliver further malicious content. This could include a wide range of badware such as fake AV, ransomware, or logging software to steal banking and Web credentials. Blackhole exploit kit (1)
  • 17. 17 | Trend Report Overview Real Security. In Real Time.  A range of emails were used to drive recipients to Blackhole hosting sites Blackhole exploit kit (2)
  • 18. 18 | Trend Report Overview Real Security. In Real Time. Rank Category Rank Category 1 Education 6 Health & Medicine 2 Business 7 Transportation 3 Travel 8 Leisure & Recreation 4 Sports 9 Pornography/Sexually explicit 5 Entertainment 10 Free Web Pages  Analysis of which categories of legitimate Web sites were most likely to be hiding malware pages (usually without the knowledge of the site owner)  Education category on top again Web categories: malware
  • 19. 19 | Trend Report Overview Real Security. In Real Time. Rank Category Rank Category 1 Free Web Pages Portals 6 Shopping 2 Education 7 Travel 3 Computers & Technology 8 Real Estate 4 Business 9 Streaming Media 5 Sports 10 Health & Medicine  Analysis of which categories of legitimate Web sites were most likely to be hiding phishing pages (usually without the knowledge of the site owner)  Portals (offering free website hosting) remained at the highest position Web categories: phishing
  • 21. 21 | Trend Report Overview Real Security. In Real Time. You can download the complete report at http://www.commtouch.com/threat-report-april-2013
  • 22. 22 | Trend Report Overview Real Security. In Real Time. For more information contact: sales@commtouch.com 888 974 5805 (Americas) +49 30 5200 560 (EMEA) +972 9 863 6888 (APAC) Web: www.commtouch.com Blog: http://blog.commtouch.com