BitDefender Lab Publishes first E-Threats Landscape Report

July 2008


BitDefender▓s ▒Keep You Safe▓ Guidelines also included

Eighty percent of malware distributed worldwide consisted of Trojans according to the E-Threats Landscape Report, the first in a series of comprehensive security threat studies published bv BitDefender╝ Lab. This E-Threats Landscape Report provides a comprehensive overview of the security threats landscape over the last six months, from January to June 2008.

BitDefender▓s security experts analyzed and examined the menaces of the first half of 2008, focusing on software vulnerabilities and exploits, different types of malware, as well as countermeasures, cyber crime prevention and law enforcement.

BitDefender▓s E-Threats Landscape Report concentrates mainly on the first half of 2008, but it also contains facts, data and trends concerning the previously investigated periods, as well as several predictions related to the last half of 2008.

Highlights of BitDefender▓s E-Threats Landscape Report include:
∙ 80 percent of malware distributed worldwide consisted of Trojans
∙ 1/3 of global malware exploited OS▓s and applications▓ vulnerabilities
∙ Text-based spam comprised 70 percent of total unsolicited e-mails
∙ Image spam continued to decline in the first half of 2008
∙ Drugs represented the most advocated content via e-mail spam
∙ 50 percent of phishing attempts forged identification elements pertaining to US financial organizations
∙ Phishers targeted victims from EU states

Malware

BitDefender▓s E-Threats Landscape Report reveals that malware creators concentrated on exploiting systems▓ vulnerabilities via threats mimicking legitimate applications in the first half of 2008.



The World▓s Top 10 Malware list for the first half of 2008 included:

01Trojan.Clicker.CM
02Trojan.Downloader.WMA.Wimad.N
03Trojan.Autorun.EU
04Trojan.FakeAlert.PP
05Trojan.Peed.Gen
06Trojan.Qhost.AKR
07Trojan.HTML.Zlob.W
08Packer.Malware.NSAnti.K
09Trojan.Downloader.SWF.Gida.A
10Exploit.Win32.Mso5-002.Gen

⌠2008▓s malware continues to revolve around profit, mainly financial,■ said Sorin Dudea, Head of BitDefender▓s Antimalware Research Lab. ⌠To ensure gains, cybercriminals need a way to compromise a large number of systems where to deploy as many bots, adware and spyware as possible, with less or no cost at all. The most difficult task is not the malware▓s dissemination but the system▓s infiltration and exposure to other threats. This explains the Trojan horses▓ heavy mass production in the last six months.■



The World▓s Top 10 Malware Distribution Methods for the first half of 2008 included:

01Exploits
02Downloaders
03Malicious Advertising
04Bundle Applications
05Social Engineering Web Sites
06Information Sites
07Autorun Infectors
08File Infectors
09E-email Spam
10Peer-2-Peer

E-Mail Spam

In terms of spam media and techniques, the most notable trend that BitDefender▓s security analysts tracked in the first half of 2008 was the revival of text-based spam, which reached 70 percent, compared to 20 percent during the same period in 2007. Image spam continued its decline in the first half of 2008, ending at 3 percent in June 2008, compared to 60 percent in June 2007.

⌠Plain-text continues to be the most prolific medium for e-mail spam distribution, especially due to its simplicity, reduced size and extreme versatility,■ said Vlad Valceanu, head of BitDefender AntiSpam Research Lab.



The World▓s Top 10 list of E-Mail Spam▓s Featured Content for first half of 2008 included:

01Drugs
02Replica Watches
03Phishing (tool for)
04Pirated Software
05Pornography
06Loans
07Hire & Equipment
08Trojans▓ Spread (tool for)
09Dating
10Diploma

Phishing & ID Abuse

Phishing trends for the first half of 2008 indicated a variation and growth of spoofed banks and targeted clients. Primarily, forged elements belonged to US financial organizations, while the possible victims are now native English speakers who reside in the United States, United Kingdom or Canada. Phishing e-mails continued to be negative, such as account blocking or expiration and account details update for security reasons.



The World▓s Top 10 list of Counterfeit Business Identities in the first half of 2008 included:

01eBay
02Paypal
03Bank of America
04Wachovia
05Fifth Third Bank
06NatWest
07Poste Italiane
08Sparkasse
09Regions Bank
10Volksbank

⌠Spammers and phishers continued to improve their skills in replicating and forging legitimate message characteristics. However, the simple text e-mails proved their efficiency as well, rounding up the total figure of ID theft victims to 50,000 each month,■ said Vlad VБlceanu, Head of BitDefender Antispam Research Lab.

For more information download BitDefender▓s E-Threats Landscape Report.


Share This ON: