SlideShare une entreprise Scribd logo
1  sur  19
Internet Threats
      Trend Report


      February 2013
1 | Trend Report Overview   Real Security. In Real Time.
February 2013 Threat Report



                  The following is a condensed version
                   of the February 2013 Commtouch
                     Internet Threats Trend Report

            You can download the complete report at
                 http://www.commtouch.com/threat-report-feb-2013

       Copyright© 2012 Commtouch Software Ltd. Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView
       are trademarks, and Commtouch, Authentium, Command Antivirus and Command Anti-malware are
       registered trademarks, of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch.




2 | Trend Report Overview                                                                         Real Security. In Real Time.
Malware Trends
Android Malware

   178,000 unique samples collected in Jan 2013
   Slight drop from unusual high in December




4 | Trend Report Overview                          Real Security. In Real Time.
Email-attached-malware levels

     Large outbreaks in November/December
          •   Xerox scanner and eFax themes
     Lower than average levels
      since mid-December




5 | Trend Report Overview                     Real Security. In Real Time.
Spam Trends
Spammer tricks

     Spammers continued
      to use phony
      LinkedIn and
      Facebook-like
      notifications
          •   `These were
              supplemented with
              “support center” and
              “notification” emails




7 | Trend Report Overview             Real Security. In Real Time.
Spam levels

     Average daily spam level was 90 billion messages per day
          •   Lowest level was 52 billion
          •   Highest level was 134 billion




8 | Trend Report Overview                               Real Security. In Real Time.
Spam Percentage

     Spam averaged between 71% and 80% of all emails sent
      globally




9 | Trend Report Overview                             Real Security. In Real Time.
Spam Topics Cloud

     Frequently occurring terms printed in proportionally larger
      text




10 | Trend Report Overview                                  Real Security. In Real Time.
Web Security Trends
Harvard University’s Department of Government
  website hosts spam page




                                                  Source:
                                              anchous.info




12 | Trend Report Overview                        Real Security. In Real Time.
Web categories: malware

   Analysis of which categories of legitimate Web sites were
    most likely to be hiding malware pages (usually without the
    knowledge of the site owner)
   Education category on top again

        Rank                   Category   Rank           Category
            1         Education            6     Health & Medicine
            2         Travel               7     Restaurants & Dining
                                                 Streaming Media &
            3         Sports               8
                                                 Downloads
            4         Business             9     Leisure & Recreation
                                                 Pornography/Sexually
            5         Entertainment        10
                                                 explicit



13 | Trend Report Overview                                       Real Security. In Real Time.
Web categories: phishing

   Analysis of which categories of legitimate Web sites were
    most likely to be hiding phishing pages (usually without the
    knowledge of the site owner)
   Portals (offering free website hosting) remained at the
    highest position

        Rank                    Category       Rank            Category
            1         Portals                   6     Restaurants & Dining
            2         Computers & Technology    7     Business
            3         Shopping                  8     Streaming media
            4         Education                 9     Health & Medicine
            5         Fashion & Beauty          10    Travel



14 | Trend Report Overview                                              Real Security. In Real Time.
PayPal phishing

     Uses very long URL
          •   http://service.confirm.p
              aypal.cmd.cgi-
              bin.2466sd4f3e654sqd4
              e6d23sd8ed52s3d24e8
              d4sd8e74ds4d3d.dsqd5
              6d5e8d25s.fdsf456e6d5
              sde8d56s4d.d545d4e84
              d5d.d89d98jhnd9ed.545
              5d57s5656.friponne.fr/
   Easily tricks mobile
    users
   Illustrates need for Web
    security on mobile

15 | Trend Report Overview               Real Security. In Real Time.
Zombie Hotspots
Zombie Hotspots

   India still hosts over 17% of the world’s spam sending
    zombies
   Romania and Columbia dropped out of the top 15
          •   Replaced by US and Taiwan




17 | Trend Report Overview                               Real Security. In Real Time.
You can download the complete report at
                 http://www.commtouch.com/threat-report-feb-2013




18 | Trend Report Overview                                   Real Security. In Real Time.
For more information contact:
                               sales@commtouch.com
                               888 974 5805 (Americas)
                              +49 30 5200 560 (EMEA)
                               +972 9 863 6888 (APAC)

                          Web: www.commtouch.com
                        Blog: http://blog.commtouch.com

19 | Trend Report Overview                                   Real Security. In Real Time.

Contenu connexe

En vedette

Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015Cyren, Inc
 
Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 

En vedette (17)

Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend Report
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015
 
Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 

Commtouch february 2013 internet threats trend report

  • 1. Internet Threats Trend Report February 2013 1 | Trend Report Overview Real Security. In Real Time.
  • 2. February 2013 Threat Report The following is a condensed version of the February 2013 Commtouch Internet Threats Trend Report You can download the complete report at http://www.commtouch.com/threat-report-feb-2013 Copyright© 2012 Commtouch Software Ltd. Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Commtouch, Authentium, Command Antivirus and Command Anti-malware are registered trademarks, of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch. 2 | Trend Report Overview Real Security. In Real Time.
  • 4. Android Malware  178,000 unique samples collected in Jan 2013  Slight drop from unusual high in December 4 | Trend Report Overview Real Security. In Real Time.
  • 5. Email-attached-malware levels  Large outbreaks in November/December • Xerox scanner and eFax themes  Lower than average levels since mid-December 5 | Trend Report Overview Real Security. In Real Time.
  • 7. Spammer tricks  Spammers continued to use phony LinkedIn and Facebook-like notifications • `These were supplemented with “support center” and “notification” emails 7 | Trend Report Overview Real Security. In Real Time.
  • 8. Spam levels  Average daily spam level was 90 billion messages per day • Lowest level was 52 billion • Highest level was 134 billion 8 | Trend Report Overview Real Security. In Real Time.
  • 9. Spam Percentage  Spam averaged between 71% and 80% of all emails sent globally 9 | Trend Report Overview Real Security. In Real Time.
  • 10. Spam Topics Cloud  Frequently occurring terms printed in proportionally larger text 10 | Trend Report Overview Real Security. In Real Time.
  • 12. Harvard University’s Department of Government website hosts spam page Source: anchous.info 12 | Trend Report Overview Real Security. In Real Time.
  • 13. Web categories: malware  Analysis of which categories of legitimate Web sites were most likely to be hiding malware pages (usually without the knowledge of the site owner)  Education category on top again Rank Category Rank Category 1 Education 6 Health & Medicine 2 Travel 7 Restaurants & Dining Streaming Media & 3 Sports 8 Downloads 4 Business 9 Leisure & Recreation Pornography/Sexually 5 Entertainment 10 explicit 13 | Trend Report Overview Real Security. In Real Time.
  • 14. Web categories: phishing  Analysis of which categories of legitimate Web sites were most likely to be hiding phishing pages (usually without the knowledge of the site owner)  Portals (offering free website hosting) remained at the highest position Rank Category Rank Category 1 Portals 6 Restaurants & Dining 2 Computers & Technology 7 Business 3 Shopping 8 Streaming media 4 Education 9 Health & Medicine 5 Fashion & Beauty 10 Travel 14 | Trend Report Overview Real Security. In Real Time.
  • 15. PayPal phishing  Uses very long URL • http://service.confirm.p aypal.cmd.cgi- bin.2466sd4f3e654sqd4 e6d23sd8ed52s3d24e8 d4sd8e74ds4d3d.dsqd5 6d5e8d25s.fdsf456e6d5 sde8d56s4d.d545d4e84 d5d.d89d98jhnd9ed.545 5d57s5656.friponne.fr/  Easily tricks mobile users  Illustrates need for Web security on mobile 15 | Trend Report Overview Real Security. In Real Time.
  • 17. Zombie Hotspots  India still hosts over 17% of the world’s spam sending zombies  Romania and Columbia dropped out of the top 15 • Replaced by US and Taiwan 17 | Trend Report Overview Real Security. In Real Time.
  • 18. You can download the complete report at http://www.commtouch.com/threat-report-feb-2013 18 | Trend Report Overview Real Security. In Real Time.
  • 19. For more information contact: sales@commtouch.com 888 974 5805 (Americas) +49 30 5200 560 (EMEA) +972 9 863 6888 (APAC) Web: www.commtouch.com Blog: http://blog.commtouch.com 19 | Trend Report Overview Real Security. In Real Time.