Solutionary Research Reveals Cybercriminals Frequently Use UPS, Better Business Bureau Names to Disg

Solutionary Research Reveals Cybercriminals Frequently Use UPS, Better Business Bureau Names to Disguise Phishing Emails Used for Malware Attacks

ID: 189623

Solutionary Security Engineering Research Team (SERT) 2012 Q3 Research Report Reveals That 60 Percent of Malware Can Slip Past Anti-Virus Software


(firmenpresse) - OMAHA, NE -- (Marketwire) -- 10/04/12 -- , the leading pure-play managed security services provider (MSSP), announced today the release of the , the first quarterly research report released by Solutionary's Security Engineering Research Team (). The report provides insights into current malware trends and key tactics used by cybercriminals to execute malware distribution attacks. Research revealed that the UPS and Better Business Bureau (BBB) brands were among the most commonly used by cybercriminals to disguise malware-attack phishing emails, that 92 percent of all malware was mass distributed, and that anti-virus solutions were unable to detect 60 percent of malware in the wild.

"Cybercriminals constantly evolve malware and attack techniques to evade security and gain the most profit from their targets. Sixty percent of the mass-distributed malware we examined can easily slip past anti-virus software, and when that doesn't work, cybercriminals fool email recipients with phishing emails that inject malware into networks and computers at unprecedented rates," said , director of SERT. "Most organizations simply don't have the internal resources needed to keep pace with modern malware attacks. To stay ahead of the threats, protect their brands and defend against breaches they need products, solutions and services that are focused purely on reducing security risks."

SERT research revealed that the majority of mass-distributed malware samples were banking Trojans, malware that uses man-in-the-browser keystroke logging to steal victim's bank account information so that it can later be used to make fraudulent charges. The most common method of delivery used for the banking Trojans was phishing emails claiming to be legitimate -- such as UPS delivery confirmations, BBB complaints, flight ticket confirmations and scanned documents -- that lured victims to compromised websites. Once infected, the victims' browsers were redirected, unbeknownst to them, to a Blackhole Exploit Kit landing page, which then installed additional malware, such as Zeus or Cridex.





"The malware types identified in our report impact enterprises, SMBs, government agencies and consumers," added Kraus. "They leave businesses exposed to data breaches, banks liable for millions in fraudulent charges, and consumers reeling from the impact of identity theft."

The last quarter also produced evidence of a new era in cyber espionage with the rise of advanced, modular toolkits. Flame, first discovered in May 2012, appears to have been written for espionage and has become the model for sophisticated attack toolkits. Gauss, the next toolkit to be identified, targets financial and social-media information for a specific area in the Middle East.

Late in the quarter two other trends were identified by SERT: new Zero-day exploits and increased attacks on the financial sector. The end of August brought the discovery of a Java Zero-day (CVE-2012-4681) in the wild. The exploit downloads a payload executable that resembles a Poison Ivy variant and acts as a remote access tool (RAT), allowing a remote "operator" to control a system. In September two more notably significant Zero-day vulnerabilities were observed, including one that affected Microsoft's Internet Explorer and another that had to do with Java's sandboxing mechanisms. There were also significant issues observed during the month of September regarding attacks against the financial sector. The first was financial transaction fraud conducted using malware, which in some cases was preempted or followed up by Distributed Denial of Service (DDoS) attacks. The other issue observed was DDoS attacks against a significant volume of banking websites, although these highly disruptive attacks appear to be driven by a hacktivist agenda rather than financial theft.



Ninety-two percent of malware analyzed during the quarter was mass distributed

Nearly 60 percent of all malware goes undetected by common anti-virus software

The majority of malware samples analyzed in Q3 were banking Trojans, with Cridex taking the lead at 91 percent

Only 54 percent of the Cridex banking Trojan samples were detected by common anti-virus software at the time of analysis

The Blackhole Exploit Kit continued to be the most popular exploit kit used by cybercriminals

To access a copy of the complete report, please visit .
Visit our blog at .
Follow us on .

Solutionary is the leading pure-play managed security services provider. Solutionary reduces the information security and compliance burden, delivering flexible managed security services that align with client goals, enhancing organizations' existing security program, infrastructure and personnel. The company's services are based on experienced security professionals, global threat intelligence from the Solutionary Security Engineering Research Team (SERT) and the patented, cloud-based ActiveGuard® service platform. Solutionary works as an extension of clients' internal teams, providing industry-leading customer service, patented technology, thought leadership, years of innovation and proprietary certifications that exceed industry standards. This client focus and dedication to customer service enables Solutionary to boast a client retention rate of over 98%. Solutionary provides 24/7 services to mid-market and global, enterprise clients through multiple security operations centers (SOCs) in North America. For more information, visit .



Media Contact:
Joe Franscella
925-271-8201

Weitere Infos zu dieser Pressemeldung:

Themen in dieser Pressemitteilung:


Unternehmensinformation / Kurzprofil:
drucken  als PDF  an Freund senden  Mobivity Announces Two-Year Agreement With Cleveland Cavaliers and the Cavalier Operating Company PremierEquityReports.com: Pazoo Inc. Is a Gem Worth Noticing
Bereitgestellt von Benutzer: MARKETWIRE
Datum: 04.10.2012 - 12:00 Uhr
Sprache: Deutsch
News-ID 189623
Anzahl Zeichen: 0

contact information:
Town:

OMAHA, NE



Kategorie:

Internet



Diese Pressemitteilung wurde bisher 180 mal aufgerufen.


Die Pressemitteilung mit dem Titel:
"Solutionary Research Reveals Cybercriminals Frequently Use UPS, Better Business Bureau Names to Disguise Phishing Emails Used for Malware Attacks"
steht unter der journalistisch-redaktionellen Verantwortung von

Solutionary (Nachricht senden)

Beachten Sie bitte die weiteren Informationen zum Haftungsauschluß (gemäß TMG - TeleMedianGesetz) und dem Datenschutz (gemäß der DSGVO).


Alle Meldungen von Solutionary



 

Werbung



Facebook

Sponsoren

foodir.org The food directory für Deutschland
Informationen für Feinsnacker finden Sie hier.

Firmenverzeichniss

Firmen die firmenpresse für ihre Pressearbeit erfolgreich nutzen
1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z