Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

According to Symantec in February 1 email out of 290 was malicious

Symantec announces the release of its February 2011 MessageLabs Intelligence Report. That analysis indicates that, in February, 1 in 290.1 emails (0.345%) were malicious, making this month one of the most prolific periods in simultaneous attacks and in the integration of malware families into attacks based on the Zeus (known as Zbot), Bredolab and SpyEye malware. Also in February, at least 40 malware variants associated with the Bredolab Trojan were observed, representing at least 10.3% of the malware transmitted through emails blocked by MessageLabs Intelligence in February. These latest findings indicate that, contrary to what has been recently thought, Bredolab is still active and the techniques previously associated with the Bredolab malware have become even more widespread among other important malware families. Since the end of January, MessageLabs Intelligence has tracked large numbers of collaborative attacks that have used techniques to target specific, carefully crafted and highly timely users. At the beginning of February, attacks increased in number and these malware families were aggressively used to perform simultaneous attacks using propagation techniques, indicating the likelihood of a common origin of these infected emails.

"It seems that these constant attacks alternate the use of different malware families," says Paul Wood, an analyst at MessageLabs Intelligence. "For example, one day they could be dedicated to specially propagating variants of Zeus (known as Zbot), while another day they could devote themselves to distributing variants of SpyEye. On February 10, these attacks have multiplied further and have been spread simultaneously, using each malware family its own polymorphic packager to better evade the detection of traditional antiviruses."

Although the vast majority of attacks were related to Zeus and SpyEye, many of them share similarities with the well-known Bredolab Trojan, indicating that some of the features associated with Bredolab are also used in Zeus and SpyEye. All of these attacks use a ZIP attachment containing an executable with malicious code. In February, 1.5% of the blocked malware contained attachments with ZIP files and subsequent analysis showed that 79.2% of them were related to the latest wave of attacks by Bredolab, Zeus and SpyEye.

"During the first two weeks of February, MessageLabs Intelligence identified at least four different polymorphic engines that use these packagers on servers to change the code structure of the Zeus, Bredolab and SpyEye malwares and to increase the number of variants of each of them," wood says. "Given the technical difficulties in maintaining this number of polymorphic engines and that each evolves rapidly to generate a huge number of variants in these three families, this is one of the first times that MessageLabs Intelligence has identified malware collaborating on a technical level on a large scale and volume."

Over the past year, malicious executable files have increased in frequency alongside PDF files – the most popular file format for malware distribution. PDFs now account for a larger proportion of the document file types used as attack vectors. In 2009, approximately 52.6% of attacks targeting specific users used PDF files, compared to 65% in 2010, an increase of 12.4%. Despite the decline this month, if the trend continues in the same way it has over the past year, 76% of malware targeting specific users could be used for PDF-based attacks by mid-2011.

- Publicidad -

"Attacks targeting specific PDF-based users have arrived and are not going away. What's more, it is estimated that they will become more dangerous as malware authors continue to innovate in the provision, construction and obfuscation of the techniques necessary for this type of malware," says Wood.

Other highlights:
Spam: In February 2011, the global share of spam in email traffic from new and previously unknown bad sources was 81.3% (1 in 1.23 emails), an increase of 2.7% percentage points since January.


Viruses: The global share of email-borne viruses in email traffic from new and previously unknown bad sources was 1 in 290.1 emails (0.345%) in February, an increase of 0.07% percentage points since January. In February, 63.5% of email-borne viruses contained links to malicious websites, down 1.6% percentage points from January.

Endpoint threats: Threats against terminal devices, such as laptops, PCs, and servers, can penetrate an organization through a variety of mechanisms, including pass-by-visit attacks on infected websites and Trojan and worm attacks that spread by copying to replaceable drives. The most frequently blocked malware scans over the past month indicated that the Sality.AE virus was the most prevalent. Sality.AE spreads through executable files and tries to download malicious files on the Internet.

Phishing: In February, phishing activity was 1 in 216.7 emails (0.462%), an increase of 0.22% percentage points since January.

Web Security: Analyses of Web security activity show that 38.9% of blocked malicious domains were new in February, a decrease of 2.2% percentage points since January. Also, 20.3% of all blocked web-based malware was new in February, down 2.2% percentage points from last month. MessageLabs Intelligence also identified an average of 4,098 new websites per day that host malware and other potentially unwanted programs such as spyware and adware, a 13.7% decrease since January.

Geographic trends:
China received the most spam in February, with a rate of 86.2%.
In the U.S. and Canada, 81.4% of email was spam. Spam levels in the UK were 81.1%.
In the Netherlands, spam accounted for 82.2% of email traffic, while spam levels reached 81.2% in Germany, 81.7% in Denmark and 81.0% in Australia.
Spam levels in Hong Kong reached 82.8% and 80.4% in Singapore. Spam levels in Japan were 78.5%. In South Africa, spam accounted for 81.6% of email traffic.
South Africa remained the country most affected by email-borne malware, with 1 in 81.8 emails blocked as malicious in February.
In the UK, 1 in 139.0 emails contained malware. In the U.S. virus levels were 1 in 713.6 and 1 in 328.8 in Canada. In Germany, virus levels reached 1 in 393.1; 1 in 451.1 in Denmark and 1 in 910.4 in the Netherlands.
In Australia, 1 in 365.8 emails were malicious, and 1 in 455.3 in Hong Kong; in Japan it was 1 in 1,331.0 compared to 1 in 828.9 in Singapore and 1 in 457.0 in China.

Vertical trends:
In February, the sector that received the most spam - with a rate of 84.3% - remained the automotive sector.
The levels of spam in education were 82.6%; 81.7% for the chemical and pharmaceutical sector; 81.4% for IT services; 80.8% for commercial establishments; 80.1% for the public sector and 80.2% for the financial sector.

- Publicidad -

In February, the public/government sector remained the hardest hit by malware, with 1 in 41.1 emails blocked as malicious.
Virus levels in the chemical and pharmaceutical sector were 1 in 458.3; 1 in 394.4 for the IT services sector; 1 in 514.3 for commercial establishments; 1 in 137.2 in education and 1 in 436.9 in the financial sector.

Full report: http://www.messagelabs.co.uk/mlireport/MLI_2011_02_February_FINAL-en.PDF

Sources: CanalPDA e.Security and Symantec MessageLabs

See original.

No thoughts on “According to Symantec in February 1 email out of 290 was malicious”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter