Press Center

August 2009

BitDefender Malware and Spam Survey finds E-Threats Adapting to Online Behavioral Trends

Changes in content and distribution medium found in BitDefender survey

Malware writing has become a full-fledged business √ shaped after corporate models, according to BitDefender╝. Today, BitDefender released the results of its malware and spam survey from January through June 2009, showing HTML newsletter-impersonating spam and web 2.0 phishing attempts witnessing a sharp rise.

Malware Threats in Review

During the first six months of 2009, malware writers have continued their efforts to infect computer users in order to receive direct financial gain and/or to seize control over their machines. According to the report, Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the wild.

While Trojans were the most active e-threats in the last six months, the notorious Downadup Internet worm caused the most damage to users. Downadup managed to infect a record number of worldwide computers (about 11 million) and made headlines of most, if not all, computer magazines and mainstream media. Targeting systems with unpatched MS08-067 vulnerabilities, the worm can send itself to any clean computer it has already infected on the same network and looks to gain access to file shares. Although Microsoft issued an out-of-cycle patch for the vulnerability, the infection is still in the wild, with hundreds of systems compromised on a daily basis.

⌠The Internet is one of the most important communications vehicles √ used for business, schooling and leisure. It has also become a channel for criminals to gain access to a vast number of computer systems, financial data and information,■ said Vlad VБlceanu, Head of BitDefender Antispam Research Lab. ⌠Cybercriminals are not going to stop looking for ways to enhance their e-threats, which is why it is essential for computer users to make sure they have a security solution in place, that can provide them with advanced, proactive protection.■

BitDefender found that during the last six months, the most active countries in terms of spreading malware were China, France and the United States, followed by Romania, Spain and Australia



World▓s Top 10 Malware from January-June 2009

RANKMalware%
1Trojan.Autorun.Inf31
2Win32.Worm.Downadup13
3Trojan.Wimad13
4Trojan.SkimTrim.HTML.A11
5Trojant.Agent.AKXM10
6Trojan.Autorun.AET7
7Worm.Autorun.WHG5
8Packer.Malware.NSAnti.14
9Trojan.Spy.Agent.NXS3
10Trojan.JS.PZB3



Spam Trends in First Half of 2009

In terms of media and techniques, BitDefender analysts determined a continuing trend in text-based spam, which reached 80 percent this year compared to 70 percent for the same period in 2008.

Additionally, image spam increased 150 percent since the first half of 2008. Incorporated via HTML newsletter-impersonating spam, downloadable images are included in a strategy developed by spammers to trick users into accepting images blocked by the email client and, at the same time, to bypass spam filters by slightly modifying the image▓s color palette.

Spam messages advertising pirated/OEM software products also increased dramatically compared to the same period last year. According to the statistics provided by the BitDefender Antispam Research Lab, software spam accounted for about 3 percent of worldwide spam. By June 2009, unsolicited email related to software products became one of the top five spam threats and accounted for 5 percent of the total spam messages sent worldwide.





The Top 10 list for the first half of 2009▓s most advocated content through e-mail spam includes:

1Medicine Spam
2Phishing Links
3Loans/Mortgage
4Malware Attached
5Product Spam/Knockoff
6Software/OEM
7Pornography (non) dating
8Dating Websites
9Employment
10Tie between Academic Diploma and Online Casino


Web 2.0 Malware and the Phishing Landscape

From January through June 2009, phishing messages reached an alarming threshold of 7 percent of the spam messages sent worldwide. As expected, the most receptive countries in terms of phishing are the United States, Canada and the United Kingdom - three English-speaking countries. However, Russia is another significant source of phishing messages, mostly because of its lax legislation regarding cyber-crime, as well as the country▓s current unemployment rate.

The phishing landscape is continuously evolving and morphing, including a rise in web 2.0 phishing techniques. Social network user accounts are key elements for carrying out subsequent attacks to other network users. However, since respectable service providers have tightened security in order to protect their users▓ personal info, attackers have developed fake login pages in an attempt to get genuine user login credentials.

BitDefender Labs have found that most web 2.0 phishing attempts in the first half of 2009 relied on social engineering schemes and speculated user naivety. The Twitter Porn Name scam is a good example. Users were invited to reveal their first pet name, as well as the first street on which they lived. These names are usually employed as backup/security questions. An e-crook possessing a person▓s username along with these ⌠clues■ can easily retrieve a password that he or she can later employ to access the account and send spam, access transactions, or use the account in whatever way necessary to make a profit, including demanding a ransom for release of the hijacked account.

However, phishers▓ favorite targets are constant. On average, the most used identities are related to the financial sector, primarily banks and wire transfer institutions.




The top three counterfeit business identities in the first half of 2009 include:

1Bank of America
2Paypal
3Abbey


BitDefender estimates that more than 55,000 users fall victim to phishing scams each month, totaling an impressive 330,000 victims from January through June 2009. In order to successfully deceive their victims, phishers must impersonate (aka. spoof) the genuine page as accurately as possible. However, while replicating the original webpage is simply a matter of copy-and-pasting, the spam message usually contains misspelled words and/or negligent formatting.

This is not the case with most of the phishing raids targeting Bank of America. Not only is the text impeccably laid out, but the phishing page has also been crafted with an unusual attention to detail, suggesting that the people responsible for the phishing attacks are a highly organized gang of cyber-criminals.

⌠Most importantly, unlike malware, phishing and spam are universal e-threats √ they work on any computer, regardless of their operating systems and security patches," VБlceanu commented. ⌠Extra caution and a highly-rated antimalware solution with antispam, antiphishing and antimalware modules are a must-have for anyone surfing the web.■

For more information on this survey, please visit the BitDefender E- Threats Report page.


* * *

About Bitdefender®
Bitdefender is the creator of one of the world's fastest and most effective lines of internationally certified internet security software. The company is an industry pioneer, introducing and developing award-winning protection since 2001. Today, Bitdefender technology secures the digital experience of around 400 million home and corporate users across the globe.

Recently, Bitdefender won a series of important awards and accolades in the global security industry, including "Product of the Year" by AV-Comparatives, "Best Repair 2012" by AV-Test, "Editor's Choice" and "The Best Antivirus for 2013" by PC Mag, that confirmed the antivirus software’s leadership status among security products.

More information about Bitdefender's products is available from the company's security press room. Additionally, Bitdefender publishes the HOTforSecurity blog, where readers can find stories from the underworld of internet fraud, scams, malicious software - and gossip.


Bitdefender E-Threats Landscape Reports

The purpose of this report is to provide a comprehensive investigation of the threats’ landscape. Bitdefender’s security experts thoroughly analyze and examine the menaces of the each semester, focusing on software vulnerabilities and exploits, different types of malware, as well as countermeasures, cyber crime prevention and law enforcement. The E-Threats Landscape Report concentrates mainly on the latest trends, but it also contains facts and data and concerning the previously investigated periods, as well as several predictions related to the upcoming semesters. This document is primarily intended for IT&C System’s Security Managers, System and Network Administrators, Security Technology Developers, Analysts, and Researchers, but it also addresses issues pertaining to a broader audience, like small organizations or individual users concerned about the safety and integrity of their networks and systems.

H2 2012 E-Threat Landscape Report - Overview

For the first half of the year, zero-day vulnerabilities played an essential role in disseminating malware with exploit packs as a favorite vector of infection. The dangerous zero-day exploit in the Java Runtime Environment (CVE-2012-4681) was documented and proof of concept was added to Metasploit, which became public knowledge before a fix was made available.

As a direct result, three billion devices running Java were vulnerable to remote code exploitation for roughly 48 hours. A second exploit hit in September and targeted Internet Explorer 9. Successful exploitation would allow remote compromise of the system with the installation of the Poison Ivy backdoor. Both zero-day exploits were used in advanced persistent attacks.

2012 saw fluctuations in the amount of junk e-mail as a proportion of e-mail traffic. The year began with a slight decrease in spam e-mails, but spam constantly gained ground towards the middle of the year. According to data gathered from the Bitdefender Antispam lab, the second half saw growth again, with small variations towards the end of 2012. The increase in the number of junk e-mails was nonetheless minor, by only 5%, leading to a rough value of 73% of the total number of e-mails sent worldwide.

Download now the full H2 2012 E Threat Landscape Report (pdf)

Download now the overview H2 2012 E Threat Landscape Executive Summary (pdf)


Archive

2012
Download now H1 2012 E Threat Landscape Report (pdf)

2011
Download now H1 2011 E-Threats Landscape Report - Executive Summary (pdf)
Download now H2 2011 E-Threat Landscape Report (pdf)
Download now H2 2011 E-Threat Landscape Report - Executive Summary (pdf)

2010
Download now H2 2010 E-Threats Landscape Report - Executive Summary (pdf)
Download now H2 2010 E-Threats Landscape Report (pdf)
Download now H1 2010 E-Threats Landscape Report - Executive Summary (pdf)
Download now H1 2010 E-Threats Landscape Report (pdf)

2009
Download now H1 2009 Malware and Spam Review Executive Summary (pdf)
Download now H1 2009 E-Threats Landscape Report (pdf)
Download now H2 2009 Malware and Spam Review (pdf)
Download now H2 2009 E-Threats Landscape Report - Executive Summary (pdf)

2008
Download now H1 2008 E-Threats Landscape Report (pdf)
Download now H2 2008 E-Threats Landscape Report (pdf)

White Papers

Bitdefender e-Guides Series

The Bitdefender e-Guides series is a learning initiative aiming to provide the Bitdefender reader and user community with valuable information about e-threats and the security issues of the IT&C realm, while also offering practical advice and feasible solutions to their on-line defense needs. The Bitdefender security analysts share their knowledge in malware prevention, identification and annihilation, with an emphasis on on-line privacy and different technologies, countermeasures and cybercrime prevention methods.

Covering topics that range from kids and family's on-line protection, safe social networking and preventing data safety breaches to securing enterprise environments, the e-Guides series is intended for a broad audience of small organizations and individual users concerned about the safety and integrity of their networks and systems. The e-Guides also address issues pertaining to the daily activity of IT&C Systems Security Managers, System and Network Administrators, Security Technology Developers, Analysts, and Researchers.

Safe Blogging Guide

Tips and tricks on how to keep your blog and your identity safe

Safe Blogging Guide

Blogging is one of the most popular forms of written expression on the web, with more than 150 million indexed blogs worldwide. While regular readers are looking for pieces of information and articles, cyber-crooks take a different interest in them. Finding private information and getting cheap storage space for their malware campaigns are only two of the multitude of users they may subject your blog to.

This material covers the basic guidelines for safe blogging and is especially focused on individual blogs that are either self-hosted or provided as a service by major blog providers.



Securing Wireless Networks Guide

Tips and tricks on how to shield your home network from intruders

Securing Wireless Networks Guide

This document is intended for computer users who have deployed or plan to deploy a home wireless network. At a time when wireless communication has become a significant part of our lives, cyber-criminals try to exploit every security breach in the wireless configuration in order to intercept traffic or use the internet connection for illegal purposes.

The following guide will teach you the best practices when using unsecured wireless networks, as well as how to properly configure your home router or access point to prevent others from abusing your network.



Protecting Children On-line Guide

How to secure and defend the digital experience of your kids


This document is intended for family, parents and teachers and its purpose is to help secure the digital activities of kids and teens. In an age when the mass production and accessibility of computers have turned these devices into regular family or household commodities, children get familiar with PCs and Internet from a very fresh age. Despite its obvious communication-related benefits, the WWW can also be a hazardous place for kids, with e-threats directly targeting their age group and their home or school computers.

This e-Guide covers the main risks and dangers for kids on-line, such as cyber-bulling, exposure to inappropriate content, on-line addiction and other harmful online actions, while also focusing on topics such as malware, phishing, ID theft and spam, to which teenagers, just as any other Internet users, are exposed nowadays. A Safety Tips section helps parents and teachers better understand and deal with these issues in relation to the kids.



Silver Surfers On-line Safety Guide

How to protect valuable ideas and assets from cyber-hacking


This document is intended for families and senior citizens and its purpose is to help them browse the web safely and enjoy their on-line activities.

At a first glance, it would appear that senior citizens are exposed to cybercrime just as much as any other inexperienced Internet user, irrespective of their age. However, as this e-Guide shows through several case studies, there are several risks and dangers targeting directly silver surfers, such as pension delivery and fallacious tax paying methods or income-related scams. Examples, tips and advice complement the case studies and provide readers with useful guidelines in their daily on-line routine.



Preventing Data Breaches Guide

How to protect valuable ideas and assets from cyber-hacking


The e-guide was designed to cover the various potential sore points of business data safety, from the matter of the network's physical integrity to the complicated mechanisms of business targeted cybercrime (e.g. banker Trojans, phishing). This material is also intended to match, though not in as much detail as a full-fledged technical description, the features of the various consumer and business oriented Bitdefender solutions to the situations in which they might come in handy to IT administrators.

Consulting this document would be useful in the process of deciding what's best for small to medium-sized networks security and a solid basis for further comparative research on this subject.

Welcome to the Bitdefender Photo Gallery

Bitdefender is the creator of award-winning, internationally certified Internet Security and Antivirus software.

Since its inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal, in many cases leading the way in the best Internet security detection techniques to prevent the spread of malicious threats.

Thanks to its first-class products and state of the art technologies, the company rapidly expanded into a worldwide leader. Bitdefender made its entrance on the international market when opening offices in the UK, USA, Germany, France and Spain, as well as establishing strategic partnerships and a local presence in over 100 countries globally.

By the end of 2009, Bitdefender was protecting millions of users globally and had established trusted use of our technology with household names like IBM and Virgin Media through strategic partnerships.

2011 brought a pivotal change in Bitdefender’s company philosophy, as the organization embraced a new corporate identity. It was also a year of success, as the company’s consumer products were the first in years to be voted the #1 choice (in terms of internet security) by three of the most important independent testing organizations in the world.

The new image acts as a binder between the company’s roots and its future. One thing has remained unchanged: Bitdefender’s capacity of delivering top antivirus products. Bitdefender provides the best antivirus solutions using the same award-winning technology for consumers and for corporate networks, from the small business right through to the global enterprise, protecting all endpoints.

The Bitdefender proprietary technologies, based on innovative ideas and leading trends in the information security industry, continue to be internationally recognized as the best Internet security software. The independent organizations which reward our outstanding results through numerous prizes and certifications are: Av-Test.org, Virus Bulletin, ICSA Lab, Checkmark, PC World Top 100, just to name but a few.

Bitdefender strives to constantly develop technology to stay one step ahead in offering our customers the best antivirus detection, combined with flexible usability and performance.

BRAND STORY

Who we are – under the sign of the Wolf

Who are we? We’re a sublime alloy of intelligence, strength and willpower. We have the sharp mind of the wolf and the sleekness of the dragon, the vigilance of the alpha-male and the indestructibility of the snake’s body. We are a unique combination of symbols that fight on Good’s side.

Half wolf. Half dragon. The Dacian Wolf was carried into battle by soldiers defending their territories in ancient times. It created fear in the opposition, and built confidence in those who carried it.

We are now the bearers of this symbol that transcends time. While the battlefield has changed, its spirit lives on. We are the defenders of the new digital world. We are AWAKE, always on guard—protecting more than 400 million users across the globe with our award-winning technologies.

Judging by its looks, the Bitdefender brand avatar borrows the spirit of our fearless ancestors. It also adds a modern layer to our historical heritage, by bringing the Bitdefender quintessence into the equation.
Bitdefender is perfectly adapted to today's combat requirements. It possesses the necessary skills to win the digital warfare that is going on inside computer networks all over the world.

The logo is a sleek, simplified representation of the brand avatar, while "AWAKE" means we’re always on guard, always ready to step in for the safety of the user.

Our purpose

We are here to defend the welfare of all users, no matter the platform, the nature of the user nor the magnitude of the challenge.
We will do whatever it takes to keep computer users safe from harm and help the Good prevail.
Always.

Catalin Cosoi

Catalin Cosoi

Chief Security Strategist

Alexandru Catalin Cosoi is Bitdefender's Chief Security Strategist, tasked with energizing and publicizing the company's technological progress.

Catalin specializes in pattern extraction and recognition technologies, with an accent on neural networks and clustering algorithms. His technical achievements have so far materialized in four granted patents and a series of classification technologies being implemented mostly in Bitdefender software. As a consequence of his interests, he is also pursuing a PhD in natural language processing.

He lists his professional goals as "gaining a Nobel prize and achieving clinical immortality", is married and lives in Bucharest, Romania at the rare times when his job isn't sending him around the globe.

Bogdan Botezatu

Bogdan Botezatu

Sr. e-Threat Analyst

Bogdan Botezatu (born 1983 in Romania) is a computer security expert and editor of HOTforSecurity.com. He has a strong background in computer networking and antimalware research .

Bogdan Botezatu is Senior e-threat analyst for Bitdefender. He has worked for the Romanian provider of innovative antivirus solutions since 2007. His areas of expertise are cyberwarfare , mobile and social networks malware.

As Senior e-threat analyst, he was part of the teams that developed the Bitdefender USB Immunizer and Bitdefender Removal Tools . More than that, he was the author of Malware History , an overview of the most notable developments in the malware landscape, Securing Wireless Networks , that provides tips and tricks on how to shield your home network from intruders, and Safe Blogging Guide , that highlights key recommendations on how to keep your blog and identity safe.

Bogdan Botezatu has spoken at various computer security conferences around the world, including IPEXPO , DefCAMP and international seminars, such as “Current Methods for Combating Cybercrime”, organized by IMPACT Alliance.

Before joining Bitdefender he has activated as system administrator at the Alexandru Ioan Cuza University of Iasi, where he supervised the implementation of IT functions in the educational sector for non-IT-related specialties.

Who to ask? Below you have a list of all of our media representatives who are ready to answer any question you might have.



Marius Buterchi
PR Manager
US
+40 212 063 470
publicrelations[at]bitdefender[dot]com



Catalin Cosoi
Chief Security Strategist
Head of Communications
+40 212 063 470
publicrelations[at]bitdefender[dot]com



Andrei Taflan
Global PR Manager
+40 212 063 470
publicrelations[at]bitdefender[dot]com