Skip to content

Social Media Portal

SMP » Press Releases

Cyveillance Testing Finds Social Media Sites and Universities Increasingly Targeted by Phishers in the First Half of 2010

Cyveillance (Businesswire) - 11 October 2010

Cyveillance Testing Finds Social Media Sites and Universities Increasingly Targeted by Phishers in the First Half of 2010

Criminals Utilize Abundant Online Information to Carry Out Targeted Social Engineering Schemes

ARLINGTON, Va.--(BUSINESS WIRE)--Cyveillance, a world leader in cyber intelligence, today announced that social media sites and educational institutions were increasingly targeted by phishers who continued to expand the targets of their attacks in the first half of 2010. With greater diversity of attacks, phishing continues to be a global problem, with numerous industries and well over 30 different countries experiencing targeted attacks according to Cyveillance?s ?1H 2010 Cyber Intelligence Report,? which was issued today.

?It is important for employees and organizations to be prepared beyond just implementing traditional security measures; they need to continuously educate individuals in cyber safety best practices in order to proactively protect their companies against attacks.?

While banks and credit unions continue to be the top targets of phishers, social media sites and universities are growing favorites of phishers due to the inherent nature of these users to share personal information. Cyber criminals are gaining access to confidential information through simple searches in order to carry out elaborate social engineering scams. This type of phishing relies on both technology and human interaction by manipulating people to perform actions or divulge further information, resulting in online fraud or identity theft.

?In an age where people are encouraged to share everything from what they had for lunch on Twitter to photos of their weekend on Facebook, cyber criminals are taking advantage of the abundance of information at their fingertips in order to create targeted attacks,? said Panos Anastassiadis, chief operating officer of Cyveillance. ?It is important for employees and organizations to be prepared beyond just implementing traditional security measures; they need to continuously educate individuals in cyber safety best practices in order to proactively protect their companies against attacks.?

Universities are specifically targeted for credentials including name and password information. Phishers use these details to create botnets ? applications that allow unauthorized access to and/or control over a user?s computer in order to help facilitate malicious activity such as spamming or denial of service (DoS) attacks. Alternatively, social media is used as a means to distribute malware in order to reap greater financial benefits. While these avenues are used in different ways, they are both targeting large groups of individuals who are typically more willing to share information and trust online links.

In addition to Cyveillance?s traditional phishing and malware statistics (see below), the report also includes test results identifying how long it takes leading antivirus (AV) software vendors to detect new malware threats as they are initially discovered in real-time and over the course of a thirty day period. When Cyveillance fed active attacks through 13 of the top AV vendor1 offerings, they identified that these solutions initially detect on average less than 19 percent of malware threats. That average detection rate increases to only 61.7 percent after 30 days.

Phishing. During the first half of 2010, Cyveillance detected a total of 126,644 phishing attacks for an average of over 21,000 unique attacks per month with the volume remaining relatively steady throughout the half. The amount of attacks seen monthly is down compared to the second half of the previous year, but the overall volume confirms that the problem of phishing is still easily one of the top threats on the Internet. Cyveillance identifies phishing as a social engineering scam that relies on both technology and human interaction to carry out online fraud and identity theft. The schemes are varied, but typically involve a spoofed (spam) email that mimics an email from a legitimate and respected organization in order to steal personal information, which is then used for online fraud, identify theft or unauthorized network access purposes.

Malware. The majority of malware threats on the Internet continue to originate within the United States. The country leads in almost every significant malware statistical category. Other developed countries such as China, Canada and the United Kingdom do not provide the same volume of threats as the U.S., but still pose significant danger to Internet users. Cyveillance considers malware to be a file or application downloaded from a website or server that exhibits properties that are both involuntary and malicious in nature. There are many types of malware, ranging from ?bot? programs used to launch spam to DoS attacks to keyloggers and backdoor Trojan viruses used for stealing sensitive information or targeting specific SCADA or industrial platform. While all malware presents a threat, the variations used for financial fraud typically cause the most harm to consumers.

All figures and statistics2 in the Cyveillance ?1H 2010 Cyber Intelligence Report? are actual measurements rather than projections based upon sample datasets. The cyber intelligence included in this report includes data collected and analyzed between January 1, 2010 and June 30, 2010. For more information or to download the report, please visit: www.cyveillance.com/cyberintelreport-1H10.

About Cyveillance

Cyveillance, a world leader in cyber intelligence, provides an intelligence-led approach to security. Through continuous, comprehensive Internet monitoring and sophisticated intelligence analysis, Cyveillance proactively identifies and eliminates threats to information, infrastructure, individuals and their interactions, enabling its customers to preserve their reputation, revenues, and customer trust. Cyveillance serves the Global 2000 and OEM Data Partners ? protecting the majority of the Fortune 50, regional financial institutions nationwide, and more than 100 million global consumers through its partnerships with security and service providers that include Blue Coat, AOL and Microsoft. Cyveillance is a wholly owned subsidiary of QinetiQ North America. For more information, please visit www.cyveillance.com or http://www.qinetiq-na.com.

1Vendors tested included Trend Micro, Sophos, McAfee, Kaspersky, F-Secure, Dr. Web, AVG, Nod32, F-Prot, Virus Buster, Norman, eTrust-Vet and Symantec. (Trend Micro is a registered trademark of Trend Micro Incorporated, Cupertino, CA; Sophos is a registered trademark of Sophos PLC, Oxfordshire, England; McAfee is a registered trademark of McAfee, Inc., Santa Carla, CA; Kaspersky is a registered trademark of Kaspersky Labs, London, England; F-Secure is a registered trademark of F-Secure Company, Espoo, Finland; Dr. Web is a registered trademark of Dr. Web Co., Moscow, Russia; AVG is a registered trademark of AVG Technologies, BRNO, Czech Republic; Nod32 is a registered trademark of Nod32 Corporation, Bratislava, Slovakia; F-Prot is a registered trademark of Fisk Software Intl Co, Reykjavik, Iceland; Virus Buster is a registered trademark of Virus Buster, Ltd., Budapest, Hungary; Norman is a registered trademark of Norman Company, Lysaker, Norway, and Symantec is a registered trademark of Symantec Corporation, Mountain View, CA; eTrust-Vet is a registered trademark of CA, Inc., Islandia, NY).

2Cyveillance?s comprehensive monitoring technology continuously sweeps the Internet ? monitoring and collecting information from over 200 million unique domain name servers, 190 million unique websites, 80 million blogs, 90,000 message boards, thousands of IRC/Chat channels, billions of spam emails and more. This approach yields the discovery of more than 100,000 new sites each day.

Contacts

Welz & Weisel Communications

Advertisement

Tony Welz, 703-218-3555
tony@w2comm.com

Read more



Share