70% of malware relates to cyber crime
PandaLabs has published its malware report for the first quarter of 2006, which confirms the new malware dynamic based on generating financial returns. Spyware, Trojans, bots and dialers were the most frequently detected types of malware between January and March 2006.
Read the article HERE.
Read the article HERE.
1 Comments:
You are quoting a report without reading the article yourself. The fraudwar blog you quoted claims to be presenting the conclusion of the Panda Software First Quarter Report. The number seemed off, so I checked.
I downloaded Panda's first quarter report from Panda's site. I printed the PDF page and scanned it to a text document. Per that document, here is what their conclusion really was:
Conclusions
Crimeware, an undeniable reality
There is one prevailing background theme in this first quarterly report: malware authors are not looking for either personal or media fame. Their interest is focused on trying to obtain the maximum economic benefit possible from their knowledge. Evidence to back this assertion is as follows:
1.- Lack of alerts
There are no alerts due to the mass distribution of malware. There is no news of major epidemics, such as those in previous years with LoveLetter, Blaster, Mydoom, Netsky, Bagle and Sasser. Tearec.A continues to be the exception that confirms the rule. This does not mean that malware creation is experiencing a low period of activity. On the contrary, it indicates an intention to conceal what used to be very visible from the general public's eye.
2.- Use of rootkits
From the point of view stated above, it is logical that the use of rootkits in order to conceal evidence of malware inside the computer is increasingly widespread. More worryingly, if possible, is the addition of rootkit functions to already existing families, such as Mydoom, Bagle, bots and Banker Trojans, increasing their risk level.
3.- Market diversification
With regard to platforms affected:
New malWare continues to appear in the most common ptatforms, as well as concept tests in platforms that up until now were not considered prone to attacks: Macintosh, mobile telephones with Java support, RFID tags etc.
As regards methods for obtaining financial gain:
Researching vulnerabitities and exploits for selling them later on the underground market to the
highest bidder. Blackmail due to threats of IT attacks: The million-dollar page.']ansom: make a user's files inaccessible, requesting a monetary sum in exchange for releasing them. Espionage: Capturing confidential data to be used later for one's own benefit. Hiring of botnet, later used to support other criminal activities: sending spam, launch of denial of service attacks, distribution of spyware and
adware etc.
4.- The rise of bots
Botnets follow their own trends. In the past botnets were formed with a large number of zombies, which were far more powerful (average size around 100,000 systems). Current trends point to the hiring of small or medium-sized botnets (up to 10,000 computers).
There may be various reasons for this adjustment in size: on the one hand, wanting the botnet activity to go as unnoticed as possible, and on the other, the difficulty of managing too large a network. The example of the Briz.A network, with its 2,250 botnets and 250 zombies, confirms this trend.
Post a Comment
<< Home