50% traffic fine reduction takes effect    NCM: Rain will continue in Saudi Arabia until the end of April    Crown Prince discusses regional security with UAE and Qatar leaders    King, Crown Prince congratulate Syrian president on Evacuation Day    NEOM launches 'Discover NEOM' China showcase with top industry leaders    Saudi air traffic jumps 26% with a record number of 112 million passengers in 2023 Jeddah airport tops with average 30 flights per hour    EU demands answers on money-for-views version of TikTok    Whistleblower 'would not' put family on Boeing 787 jet    $2.8 billion appeal for three million people in Gaza, West Bank    Al Ain ends Al Hilal's record streak with a 4-2 win in AFC Champions League semi-final    Saudi Pro League postpones Al-Hilal vs. Al-Ahli match; Al-Ahli rejects rescheduling    'Zarqa Al Yamama': Tickets now available for Saudi Arabia's first opera premiering April 25    David Cameron urges Netanyahu to limit Iran response    50,000 Russian soldiers confirmed dead in Ukraine war: BBC    AFC postpones Al Ain vs Al Hilal semi-final match due to weather conditions    Turki Alalshikh announces groundbreaking 5 vs 5 Riyadh Season bout featuring international boxing stars    Riyadh Season becomes official partner of the World Boxing Council    Diriyah Biennale Foundation announces shortlist for AlMusalla Prize, set to revolutionize musalla architecture    Fourth Gulf Film Festival kicks off in Riyadh, scaling up Saudi movie industry Event extends over 5 days with the screening of 29 diverse films    Saudi film 'Norah' selected for Cannes Festival    JK Rowling in 'arrest me' challenge over hate crime law    Trump's Bible endorsement raises concern in Christian religious circles    Hollywood icon Will Smith shares his profound admiration for Holy Qur'an    We have celebrated Founding Day for three years - but it has been with us for 300    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Cybercriminals reinvent methods of malicious attacks
Published in The Saudi Gazette on 11 - 07 - 2008

Trend Micro Incorporated, a global leader in Internet content security, reported on Thursday that cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly ensnare both consumers and businesses, according to the “Trend Micro Threat Roundup and Forecast 1H 2008” report. As a result, the last six months saw an upswing in Web threats, but steady decreases in adware and spyware that are generated by outdated technical methods and can no longer compete with high-level security solutions.
While social engineering tactics such as the Nigerian phishing scam and the Spanish prisoner scam have been around for decades, cybercriminals continue to refresh and modernize this standard form of trickery based on whatever the trend appears to be. For example, the tools and technologies used to create the interactive nature of popular social networking sites have become a land mine for cybercrime. In March, Trend Micro discovered that over 400 phishing kits designed to generate phishing sites were targeting top Web 2.0 sites (i.e. social networking, video sharing and VoIP sites), free email service providers, banks and popular e-Commerce websites.
Recently, a new form of phishing warned potential victims about phishing emails as a way to legitimize that email and then tricked them into clicking on a link that leads to a fraudulent site. Spammers are also recycling old techniques. In February, Trend Micro investigated a voice phishing (a.k.a. “vishing”) attempt. The message appeared convincing, with all links leading to corresponding, legitimate target pages, but included a phony number for recipients to call to reactivate their account, which had been supposedly “placed on hold.” Upon calling the phone number, users were asked for their bankcard number and PIN, unwittingly opening their bank accounts to the phishers.
Malware variants have generally been treated as separate individual threats. Today, profit-motivated Web threats blend various malicious software components into a singular Web threat business model. For example, a cyber criminal sends a message (spam) with an embedded link in the email (malicious URL) or contained in an instant message. The user clicks on the link and is redirected to a Web site where a file (Trojan) automatically downloads onto the user's computer. The Trojan then downloads an additional file (spyware) that captures sensitive information, such as bank account numbers (spy-phishing).
Although seemingly one incident, blended threats are much more difficult to combat and much more dangerous for the user.
The fast-flux technique is an additional example of criminals abusing technology developments. Fast-flux is a domain-name-server (DNS) switching mechanism that combines peer-to-peer networking, distributed command and control, Web-based load-balancing, and proxy redirection to hide phishing delivery sites.
Fast-flux helps phishing sites stay up for longer periods to lure more victims. For example, researchers are challenged to identify malicious Storm domains because developers are using fast-flux techniques to evade detection.
Trend Micro witnessed a dramatic increase in Web threat activity during the first half of 2008. Web threats peaked in March to 50,000,000 from approximately 15,000,000 in December 2007.
On the decline are adware, trackware, keyloggers and freeloaders.
In March 2007, Trend Micro found that approximately 45 percent of PCs were infected by adware; by April 2008, only 35 percent were reportedly infected. In May 2007, approximately 20 percent of PCs were infected by trackware; that number has dropped to less than 5 percent in April 2008. Keyloggers also showed a small, but steady decline with less than 5 percent of PCs being infected (from over 5 percent in September 2007.)
“This is a good example of how cybercriminals are evolving with the times - they're moving away from threats that use old or waning technologies; instead, focusing on the lucrative threats that bring a bigger payload,” said Raimund Genes, chief technology officer of Trend Micro.
The report further noted that high-profile websites became highly targeted.
In early January, several massive SQL injection attacks were launched on thousands of Web pages belonging to Fortune 500 corporations, state government agencies and educational institutions.
The report added that mobile threats are continuing to play a small part in the new threat landscape. In January, Trend Micro discovered malware disguised as a multimedia file that was used to infect older Nokia mobile phones.
Trend Micro report pointed out that cybercriminals are increasingly targeting more affluent users, such as C-level executives who represent a small number of wealthy, high-level individuals in positions of power to gain access to larger bank accounts, login credentials, or even email addresses that span an entire organization.
Though spam volumes decreased briefly at the beginning of 2008 - perhaps a post-holiday break for spammers, its volume spiked in March with a small slip in April, it said. Whenever drops in spam activity occur, Trend Micro researchers interpret this as a sign that spammers are either regrouping to launch a new attack or testing new techniques.
Bots (compromised PCs) spiked from over 1,500,000 in January to over 3,500,000 in February, followed by a dramatic drop in March, the report also noted.
According to research and observations of attacks that have occurred since the beginning of this year, Trend Micro researchers predict the following trends over the next six months:
q Social engineering will remain a key attack method, with more sophisticated tricks evolving. Trend Micro expects cyber criminals to leverage events such as the Summer Olympics, back-to -school shopping, the US election season, soccer and football events, and the holiday season in December.
q Cybercriminals will continue to target newly discovered vulnerabilities in “third-party” software applications, such as QuickTime, RealPlayer, Adobe Flash, etc.
q Crimeware that relies on technical methods that are becoming obsolete, such as dialers and keyloggers, will continue to slowly decline in number. Grayware such as trackware and browser hijackers will also slowly fall off in number as they cannot scale well in an era of million-member botnets.
q Spam volume will continue to rise exponentially with average daily spam volumes predicted to increase by 30- to 50 billion messages per day. Spam and phishing will rise in August to correspond with back-to-school activities and the Olympics. A seasonal spike is also expected in November to correspond with the holidays, with spam forecasted to reach 170 to 180 billion messages per day.
q As is occurring now, both spam and phishing will continue to play a part in blended threats. About 0.2 percent - one out of every 500 Web requests-are sent to websites hosted on infected PCs, and this trend is expected to continue.
q Bots and botnets will continue to play an important part in the threat chain for spamming, information stealing, targeted attacks and large-scale attack campaigns. __


Clic here to read the story from its source.