Report: Advanced Persistent Threats Increase In April

Symantec Corp. recently announced the publication of its April 2011 MessageLabs Intelligence Report.

This month analysis reveals that targeted attacks intercepted by Symantec.cloud rose to 85 per day, the highest figure since March 2009 when the figure was 107 per day in the run-up to the G20 Summit held in London that year.

Simultaneously, in the aftermath of the Rustock botnet takedown, global spam volumes continued to fall and decreased by 6.4 percentage points since March to 72.9 percent in April. MessageLabs Intelligence also revealed that shortened URLs have become increasingly popular recently, being used to lure people to click on advertising links; a practice known as click-fraud.

In April, 1 in 168.6 emails contained malware and targeted attacks accounted for approximately 0.02 percent of these. This represents an increase of 10.5 percent over a period of six months. The number of targeted attacks blocked each day was approximately 77 in October 2010.

“The trend in targeted attacks suggests there may be a seasonal pattern as the number of targeted attacks always seems to be higher at this time of year,” said Paul Wood, MessageLabs Intelligence Senior Analyst, Symantec.cloud. “As the financial year draws to a close in many countries, it is also possible that the timing is perfect for cybercriminals seeking information about the financial performance of a company, and a carefully crafted attack may be just the means by which they can achieve this.”

Also known as Advanced Persistent Threats (APTs), targeted attacks are frequently delivered by email and designed to breach a specific target for the purpose of industrial espionage.

During April, MessageLabs Intelligence identified 11 automated bots operating on a popular micro-blogging service, posting messages containing shortened URLs and using a variety of techniques to bring these messages to the attention of other users. People clicking on these links are redirected to web sites containing advertising links, which in turn will generate pay-per-click revenue for those sites hosting the banner ads.
 
“There are a number of motivations behind enticing users to follow shortened URLs, the primary one being financial gain,” Wood said. “Although online advertising providers have worked hard to prevent Web sites from being setup purely to profit from advertising revenues, the practice is still prevalent.”

Other report highlights:

  • Spam: In April 2011, the global ratio of spam in email traffic from new and previously unknown bad sources decreased by 6.4 percent percentage points since March 2011 to 72.9 percent (1 in 1.37 emails).
  • Viruses: The global ratio of email-borne viruses in email traffic from new and previously unknown bad sources was one in 168.6 emails (0.593 percent) in April, an increase of 0.114 percentage points since March.
  • Endpoint Threats: The most frequently blocked malware targeting endpoint devices for the last month was the W32.Sality.AE virus. This virus spreads by infecting executable files and attempts to download potentially malicious files from the Internet.
  • Phishing: In April, phishing activity was 1 in 242.2 emails (0.413 percent), an increase of 0.02 percentage points since March.
  • Web security: Analysis of web security activity shows that an average of 2,431 Web sites each day were harboring malware and other potentially unwanted programs including spyware and adware, a decrease of 18.2 percent since March 2011. Thirty three percent of malicious domains blocked were new in April, a decrease of 4.0 percentage points since March. Additionally, 22.5 percent of all web-based malware blocked was new in April, a decrease of 1.9 percentage points since last month.

Geographical Trends:

  • Oman became the most spammed in April with a spam rate of 81.9 percent.
  • In the US 72.8 percent of email was spam and 72.7 percent in Canada and the UK.
  • In The Netherlands, spam accounted for 74.1 percent of email traffic, in Germany 73 percent , 72.4 percent in Denmark and 73.6 percent in Australia.  
  • Spam levels in Hong Kong reached 72.4 percent and 70.3 percent in Singapore. Spam levels in Japan were 68.9 percent.
  • In South Africa, spam accounted for 72.4 percent of email traffic.
  • Luxembourg remained the most targeted by email-borne malware with 1 in 28.9 emails blocked as malicious in April.
  • In the UK, 1 in 86.2 emails contained malware. In the US virus levels were 1 in 311.6 and 1 in 201.8 for Canada. In Germany, virus levels reached 1 in 277.5, 1 in 647.9 in Denmark and 1 in 311.2 for The Netherlands.
  • In Australia, 1 in 271.3 emails were malicious and, 1 in 321.0 for Hong Kong, for Japan it was 1 in 902.9 compared with 1 in 640.0 for Singapore.
  • In South Africa 1 in 68.1 emails contained malicious content.  

Vertical Trends:

  • In April, the most spammed industry sector with a spam rate of 76.5 percent continued to be the Automotive sector.
  • Spam levels for the Education sector were 74 percent, 72.8 percent for the Chemical & Pharmaceutical sector, 72.5 percent for IT Services, 71.8 percent for Retail, 70.9 percent for Public Sector and 72.2 percent for Finance.
  • In April, the Public Sector remained the most targeted industry for malware with 1 in 26.4 emails being blocked as malicious. 
  • Virus levels for the Chemical & Pharmaceutical sector were 1 in 157.4, 1 in 260.4 for the IT Services sector, 1 in 287.6 for Retail, 1 in 87.1 for Education and 1 in 209.5 for Finance.

The April 2011 MessageLabs Intelligence Report provides greater detail on all of the trends and figures noted above, as well as more detailed geographical and vertical trends. The full report is available at http://www.messagelabs.com/intelligence.aspx.

 

Featured

  • Agentic AI Will Revolutionize Cybercrime in 2025 According to New Report

    Malwarebytes, a provider in real-time cyber protection, recently released its 2025 State of Malware report, which reveals insight into the emergence of agentic artificial intelligence (AI), plus the year’s most prominent threats and cybercrime tactics. The report details a significant uptick in the number of known ransomware attacks, the total value of ransoms paid in 2024, and how IT teams can address them. Read Now

  • ESX 2025 Announces Expanded Schedule of Events

    ESX has announced its dynamic 2025 schedule, set to provide an unparalleled experience for professionals in the electronic security and life safety industry. Taking place June 16-19 at the Cobb Galleria Centre, this year’s event features an expanded lineup of educational sessions, hands-on workshops, inspiring main stage speakers, networking opportunities, and an engaging expo floor showcasing the latest technology. Read Now

  • City of New Orleans Launches NOLA Ready Public Safety App Before Super Bowl

    The City of New Orleans Office of Homeland Security and Emergency Preparedness (NOHSEP) is pleased to announce the official launch of the NOLA Ready Public Safety App, powered by Motorola Solutions. This new mobile application is designed to enhance public safety and emergency preparedness for both residents and visitors. All individuals planning to attend major events in New Orleans, including the Super Bowl, Mardi Gras, and other large gatherings, are encouraged to download the app. Read Now

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.