New Microsoft Security Intelligence Report outlines ‘marketing campaign’ strategies being employed by one group, and related rise in phishing and rogue antivirus softwareThere are sophisticated cybercrime groups who target organizations or individuals using social engineering or rare exploits, and then there are those cybercriminals who use more widely available attack techniques aimed at a wider audience of victims. Those two approaches are the two main ways cybercrime has shaken out, according to a new report released today by Microsoft.And unlike the cybercriminals who wage targeted attacks either for espionage, extortion, or big-ticket theft, the broad-brush attacks are all about pilfering a little money here and there from a lot of victims. These attacks are increasingly being run like marketing campaigns, according to Microsoft’s new Security Intelligence Report (SIR), Volume 10, which encompasses July 2010 through December 2010.
www.darkreading.com/advanced-threats/167901091/security/vulnerabilities/229500134/microsoft-cybercrime-falling-into-two-distinct-camps.htmlCyber scams rife at social networks: Microsoft [AFP]
Social networks are “lucrative hot beds” for cyber scams as crooks endeavor to dupe members of online communities, according to a Microsoft security report released on Thursday.”Phishing” attacks that use seemingly legitimate messages to trick people into clicking on booby-trapped links, buying bogus software, or revealing information rocketed 1,200 percent at social networks last year, it said.
http://www.independent.co.uk/life-style/gadgets-and-tech/cyber-scams-rife-at-social-networks-microsoft-2283510.htmlAlso see:Microsoft Releases Security Intelligence Report: Cybercriminals Increasingly Targeting Consumers [news release]
Today’s release of Microsoft’s Security Intelligence Report volume 10 is our most comprehensive global threat report to date, with in-depth regional threat intelligence for 117 countries from more than 600 million machines worldwide. The report highlights a polarization of cybercriminal behavior and an increasing trend of cybercriminals using “marketing-like” approaches and deception methods to target consumers.Since 2006, we have released 10 volumes of the Security Intelligence Report, providing customers with unparalleled insight into the software threat landscape and guidance to better protect themselves. The threat landscape has changed significantly during those years with advancements in security and privacy technology and general awareness of cybercrime. However, cybercriminals have gotten more sophisticated and continue to evolve their attack methods.Across the threat landscape, we see a definite polarization in terms of criminal behavior. On one side are a small number of sophisticated criminals whose motives vary from large payoffs to targeted attacks. These attackers may have special intelligence about a target’s environment, use customized social engineering to trick the intended victims, or exploit newly-discovered vulnerabilities in software to compromise networks and systems.On the other side, there are those who leverage more accessible attack methods, in some cases originally created by the more skilled cybercriminals, along with social engineering to take a small amount of money from a large number of people. Social engineering tactics include fooling people with rogue security software that pose as legitimate protection products, impersonating friends to steal passwords to online gaming accounts, conducting phishing using social networking as the lure, and tricking users to download adware.From the latest report, we see these attacks being run like marketing campaigns and fake product promotions, especially during significant events that generate a lot of media attention. In the report, there are some key data points that indicate these tactics are on the rise:
- Rogue Security Software – Rogue security software was detected and blocked on almost 19 million systems in 2010, and the top five families were responsible for approximately 13 million of these detections.
- Phishing – Phishing using social networking as the lure increased 1,200 percent – from a low of 8.3 percent of all phishing in January to a high of 84.5 percent in December 2010. Phishing that targeted online gaming sites reached a high of 16.7 percent of all phishing in June.
- Adware – Global detections of adware when surfing websites increased 70 percent from the second quarter to the fourth quarter of 2010. This increase was almost completely caused by the detection of a pair of new Adware families, JS/Pornpop and Win32/ClickPotato, which are the two most prevalent malware in many countries.
Advancements in security and general awareness of threats have a positive impact in protecting the broader online community. According to the National Vulnerability Database, vulnerability disclosures (counted by CVE) in 2010 across the industry are down 16.5 percent from 2009. Additionally, we continue to see that newer products are less susceptible to attack – computers running Windows 7 and Windows Server 2008 R2 showed the lowest infection rates. Overall, machines with more recent and complete service packs installed fared better than those with earlier versions. It’s also notable that Windows 7 operating systems are infected only about half as often as Vista and Vista half as often as Windows XP. This data emphasizes the importance of upgrading to the latest software.Finally, I am pleased to see the rapid the adoption of Microsoft Security Essentials, which surpassed 30 million active subscribers after one year of availability. It continues to grow. This demonstrates a continued proactive approach to security, and we’re proud to welcome all these MSE users to our global family.We continue to advance our security processes, technologies and resources to keep customers protected from the changing threat landscape. However, we know this cannot be done alone. Through collective efforts – such as the sharing of threat intelligence and guidance, software providers making advancements in security protections and customers keeping their systems up to date – we can help minimize cybercrime and create a safer, more trusted computing experience for everyone.