Friday,29 March, 2024

Subscribe to Newsletter

HOME
  NEWS
  Knowledge Center
 
Knowledge Center

2010 Threats Year In Review: Toolkits Dominated The Cybercriminal Scene

Wannabe cybercriminals were able to execute attacks with impunity and relative ease thanks to toolkits, pre-written software programs designed to steal information, rendering 2010 “The Year of the Toolkit” according to Trend Micro threat researchers. Toolkits proliferated through mass social media sites like Twitter throughout the year.

“While [toolkits] have always been a part of the cybercrime underground, in 2010 they flourished and became an even bigger part of the overall threat landscape,” stated Trend Micro’s 2010 threat round-up report, which can be downloaded here in full. “Toolkits allow cybercriminal attacks to be conducted with far less effort and time, the effects of which can be seen in the explosive growth of threats in 2010.”

United States, India got spammed the most

The crackdown of Spamit operations in October 2010 led to a decline in spam between November-December, a time when holiday spam is usually on the rise.
While overall global spam volume decreased, the U.S. received the most spam with India coming in second, due to the country’s growth in Internet usage and its use of English in most forms of formal communication. The countries that received the least amount of spam were Argentina and Israel.

Europe experienced the highest spike in spam, frequently written in Spanish and most of which were online casino and gambling themed due to the region’s more lenient gambling regulations. And Russia, a country where sending spam is not yet a criminal offense, was the top spam generator during Q4 2010.

Most spam were pharmaceutical and health-care related

If you have an email account, chances are you received plenty of pharmaceutical and other health-related spam, which Trend Micro threat researchers said made up the majority of the spam tracked throughout the year. Throughout 2010, spammers also used email to disguise phishing and malware attacks that hit popular social networking sites, another hotbed for cybercriminals due its prolific communities of users.

United States, China had the most malware infections

More than 80 percent of the top malware that caused the most infections in 2010 arrived via the web. The majority of malicious URLs and, consequently, victims of malware infections in 2010 were found in the U.S. and China. Russia was also a significant source of spam that contained embedded malicious URLs.

Mobile threats target different platforms, both old and new

During the summer of 2010, Trend Micro threat researchers discovered malware targeting the new Android OS and applications. By August 2010, the DroidSMS appeared, a malicious text message sending an application disguised as Windows Media Player. A week later, another application designed to send a user’s GPS location via HTTP POST came to the scene.
Trend Micro also discovered other malware targeting older smartphone OSs like Symbian. Cybercriminals are always on the lookout for any form of monoculture to serve as a large base of possible targets for scams or malware attacks. For example, the growing popularity of Android OS in smartphones, along with the OS’ open source code and vulnerable applications, has already contributed to an increase in attempts that target the OS.

Cloud-based protection from Trend Micro

The Trend Micro™ Smart Protection Network™ provides the infrastructure behind many Trend Micro products and delivers advanced protection from the cloud, blocking threats in real-time before they reach you. By the end of 2010, the Smart Protection Network was seeing 45 billion queries every 24 hours, blocking 5 billion threats and processing 3.2 terabytes of data on a daily basis. On average, 102 million users were connected to the network each day.

The Smart Protection Network uses patent-pending “in-the-cloud correlation technology” with behavior analysis to correlate combinations of web, email and file threat activities to determine if they are malicious. By correlating the different components of a threat and continuously updating its threat databases, Trend Micro has the distinct advantage of being able to respond in real time, providing immediate and automatic protection from email, file and web threats.

For the full threat report, please visit: http://us.trendmicro.com/us/trendwatch/research-and-analysis/threat-reports/index.html



Rate This:

Posted by VMD - [Virtual Marketing Department]


Poll
What is your favourite search engine?
Google
Yahoo
Bing

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks