User behaviour drives broader malware attacks

Wednesday, 31 March, 2010

Blue Coat Systems has published its annual Blue Coat Web Security Report for 2009 that provides a comprehensive analysis of user behaviour in relation to web-based threats and specifically examines where users encountered malware on the internet.

Based on data collected from the Blue Coat WebPulse service, the report concludes that the overwhelming popularity of social networking services and changes in online user behaviour are driving broader attack strategies, including complex blended threats, faster malware life cycles and search engine manipulation.

The key findings include:

  • Malware adapts with rapid lifecycles: The average lifespan of malware dropped to two hours in 2009, from as many as seven hours in 2007, as cybercriminals responded to the increasing use and effectiveness of URL filtering at blocking malware sources. As a result of this faster malware life cycle, defences that require patches and downloads are unable to keep pace.
  • Social networking leads internet access activity: Social networking sites led internet access activity in 2009 and accounted for 25% of activity among the top 10 URL categories for 2009. Increased reliance on social networking for communication also meant less reliance on web-based email, which dropped in popularity from fifth place in 2008 to ninth place in 2009.
  • Exploiting user trust drives most common threats: The two most common web-based threats in 2009 - the fake antivirus software and the fake video codec - both exploited user trust in the internet, search engines and social networks. These were not the ‘drive-by’ attacks of recent years, nor did they require a vulnerability to exploit other than human behaviour.
  • Malware lurks on unexpected sites: Online storage and software download sites were the most frequent hiding places for web-based malware in 2009. The number of online storage sites grew 200% over the prior year and this growth, coupled with the nature of the service, makes them an ideal and easily accessible malware storage location.
  • Advanced spyware drives increase in malware and phone-home sites: The number of malware sites (sites that store malware for download on victims’ computers) nearly doubled in 2009, but more surprising is the 500% increase in the number of malware effects sites (phone-home sites that collect data from an infected computer). This is largely attributable to the emergence of advanced spyware that generates multiple URLs for possible activity, increasing the likelihood that one or more of the URLs will remain undiscovered long enough for cybercriminals to retrieve stolen information.
  • Real-time analysis needed: The changing threat landscape is driving the evolution to a hybrid defence that unites traditional web gateways with cloud-based intelligence that can provide real-time analysis and ratings and be extended to remote users.

The information in the report is based on an analysis of data collected from the Blue Coat WebPulse service, a cloud-based collaborative defence that unites 62 million users to provide on-demand security intelligence and real-time ratings for 17 languages.

Chris Larsen, Senior Malware Researcher at Blue Coat Systems, said, ”The increasing use of link farms to manipulate search engine results and prey on the trust users have in their internet experience drove many of the malware exploits we saw in 2009 and are continuing to see in 2010. To provide comprehensive protection in the face of these threats, enterprises need not only a layered defence but also better user education.

“The web is growing too fast in all directions for human raters or even web crawlers to manage. It is turning into a war of machines, and the best defences are able to leverage the strength-in-numbers principle to protect users.”

Andreas Antonopoulos, Senior Vice President and founding partner of Nemertes Research, said, “The battlefield for information security against identity theft and cybercrime is the web. The web, and especially social media, is where the apps are, where the eyeballs are and, therefore, where the attacks are. As today’s threats move too fast for ‘patch and distribute’ strategies, enterprises must adapt and deploy defences that are scalable, real time and community intelligence based to protect employees regardless of location.”

Related News

CrowdStrike to buy Adaptive Shield

CrowdStrike is augmenting its SaaS security capabilities through the acquisition of Israeli-based...

LockBit named nastiest malware of 2024

LockBit, a ransomware malware known to have been used to attack Australian targets, has been...

Extreme Networks launches ZTNA solution

Extreme Networks' new ExtremeCloud Universal ZTNA solution combines cloud network access...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd