Report: Advanced Persistent Threats Increase In April

Symantec Corp. recently announced the publication of its April 2011 MessageLabs Intelligence Report.

This month analysis reveals that targeted attacks intercepted by Symantec.cloud rose to 85 per day, the highest figure since March 2009 when the figure was 107 per day in the run-up to the G20 Summit held in London that year.

Simultaneously, in the aftermath of the Rustock botnet takedown, global spam volumes continued to fall and decreased by 6.4 percentage points since March to 72.9 percent in April. MessageLabs Intelligence also revealed that shortened URLs have become increasingly popular recently, being used to lure people to click on advertising links; a practice known as click-fraud.

In April, 1 in 168.6 emails contained malware and targeted attacks accounted for approximately 0.02 percent of these. This represents an increase of 10.5 percent over a period of six months. The number of targeted attacks blocked each day was approximately 77 in October 2010.

“The trend in targeted attacks suggests there may be a seasonal pattern as the number of targeted attacks always seems to be higher at this time of year,” said Paul Wood, MessageLabs Intelligence Senior Analyst, Symantec.cloud. “As the financial year draws to a close in many countries, it is also possible that the timing is perfect for cybercriminals seeking information about the financial performance of a company, and a carefully crafted attack may be just the means by which they can achieve this.”

Also known as Advanced Persistent Threats (APTs), targeted attacks are frequently delivered by email and designed to breach a specific target for the purpose of industrial espionage.

During April, MessageLabs Intelligence identified 11 automated bots operating on a popular micro-blogging service, posting messages containing shortened URLs and using a variety of techniques to bring these messages to the attention of other users. People clicking on these links are redirected to web sites containing advertising links, which in turn will generate pay-per-click revenue for those sites hosting the banner ads.
 
“There are a number of motivations behind enticing users to follow shortened URLs, the primary one being financial gain,” Wood said. “Although online advertising providers have worked hard to prevent Web sites from being setup purely to profit from advertising revenues, the practice is still prevalent.”

Other report highlights:

  • Spam: In April 2011, the global ratio of spam in email traffic from new and previously unknown bad sources decreased by 6.4 percent percentage points since March 2011 to 72.9 percent (1 in 1.37 emails).
  • Viruses: The global ratio of email-borne viruses in email traffic from new and previously unknown bad sources was one in 168.6 emails (0.593 percent) in April, an increase of 0.114 percentage points since March.
  • Endpoint Threats: The most frequently blocked malware targeting endpoint devices for the last month was the W32.Sality.AE virus. This virus spreads by infecting executable files and attempts to download potentially malicious files from the Internet.
  • Phishing: In April, phishing activity was 1 in 242.2 emails (0.413 percent), an increase of 0.02 percentage points since March.
  • Web security: Analysis of web security activity shows that an average of 2,431 Web sites each day were harboring malware and other potentially unwanted programs including spyware and adware, a decrease of 18.2 percent since March 2011. Thirty three percent of malicious domains blocked were new in April, a decrease of 4.0 percentage points since March. Additionally, 22.5 percent of all web-based malware blocked was new in April, a decrease of 1.9 percentage points since last month.

Geographical Trends:

  • Oman became the most spammed in April with a spam rate of 81.9 percent.
  • In the US 72.8 percent of email was spam and 72.7 percent in Canada and the UK.
  • In The Netherlands, spam accounted for 74.1 percent of email traffic, in Germany 73 percent , 72.4 percent in Denmark and 73.6 percent in Australia.  
  • Spam levels in Hong Kong reached 72.4 percent and 70.3 percent in Singapore. Spam levels in Japan were 68.9 percent.
  • In South Africa, spam accounted for 72.4 percent of email traffic.
  • Luxembourg remained the most targeted by email-borne malware with 1 in 28.9 emails blocked as malicious in April.
  • In the UK, 1 in 86.2 emails contained malware. In the US virus levels were 1 in 311.6 and 1 in 201.8 for Canada. In Germany, virus levels reached 1 in 277.5, 1 in 647.9 in Denmark and 1 in 311.2 for The Netherlands.
  • In Australia, 1 in 271.3 emails were malicious and, 1 in 321.0 for Hong Kong, for Japan it was 1 in 902.9 compared with 1 in 640.0 for Singapore.
  • In South Africa 1 in 68.1 emails contained malicious content.  

Vertical Trends:

  • In April, the most spammed industry sector with a spam rate of 76.5 percent continued to be the Automotive sector.
  • Spam levels for the Education sector were 74 percent, 72.8 percent for the Chemical & Pharmaceutical sector, 72.5 percent for IT Services, 71.8 percent for Retail, 70.9 percent for Public Sector and 72.2 percent for Finance.
  • In April, the Public Sector remained the most targeted industry for malware with 1 in 26.4 emails being blocked as malicious. 
  • Virus levels for the Chemical & Pharmaceutical sector were 1 in 157.4, 1 in 260.4 for the IT Services sector, 1 in 287.6 for Retail, 1 in 87.1 for Education and 1 in 209.5 for Finance.

The April 2011 MessageLabs Intelligence Report provides greater detail on all of the trends and figures noted above, as well as more detailed geographical and vertical trends. The full report is available at http://www.messagelabs.com/intelligence.aspx.

 

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3