Report: Videos, Installers, Cracks, Social Media Popular Baits Used By Hackers

PandaLabs, the anti-malware laboratory of Panda Security, The Cloud Security Company, has released a study on the nature of malware-infected websites that were blocked by the company's antivirus solutions in Q1 2011.

According to the research, 25 percent of sites used video and multimedia content as bait; 21.63 percent referred to installers or program updates; 16.53 percent claimed to contain cracks and keygens and 16 percent were social media URLs.

A crack is a small software application that serializes a piece of commercial software and enables users to operate any software application. It also enables hackers to illegally modify software, such as remove protectors like the trial/demo version, serial number, CD checks and any other software protection method.

"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims," said Luis Corrons, Technical Director of PandaLabs. "Most of these sites download Trojans onto users' computers without their knowledge. Therefore, a good security solution capable of blocking them proactively is extremely helpful for users who, in most cases, can't distinguish between 'good' and 'malicious' websites." 

eBooks are in fifth place on the list comprising 5.25 percent of occurrences, followed by Peer-to-peer (P2P) downloads and adult content. The ranking rounds out with sites offering software programs, operating systems, browsers, videogames and antivirus software (all of them used in less than three percent of cases).

The three most blocked sites by Panda Security in Q1 2011 were three Brazilian web pages. The first was a video released by the Japanese consulate showing the rescue of a group of tsunami survivors; the second, a video supposedly showing a short circuit causing the death of 15 people; and the third supposedly contains footage of a police officer being fired because of his Internet activities.

"Attackers exploit hot topics and users' morbid curiosity," Corrons said. "Who isn't interested in watching the latest footage of such a devastating natural disaster as Japan's recent earthquake?"

The study shows user preferences in relation to the malware lures used. When taking a look at P2P applications, Panda found that the most popular program is Ares, followed by Torrent and eMule. As for social networks, Facebook tops the list ahead of Messenger, Tuenti and MySpace.

The most searched for operating system is Windows, followed by Mac and Linux. Finally, Explorer still dominates the web browser market, with Firefox and Chrome trailing behind.

"There are no hidden secrets when it comes to finding out if a website is legitimate or not, but it is becoming increasingly complicated for users to differentiate them. Unfortunately, many users don't know if their security system is good enough to protect their systems, which is where a lot of these problems originate," Corrons said.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.