Web Hosting Security

  Home arrow Web Hosting Security arrow New Report Shows Massive Increase in M...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

New Report Shows Massive Increase in Malware Over Last Year
By: wubayou
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 1

    Table of Contents:

    Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article



    Dasient, a company that provides anti-malware solutions, has just released its malware report for the third quarter of 2010. The report's major finding was that the number of websites that became infected with malware during the third quarter was approximately 1.2 million. Not only is that figure quite high, but it is also double the amount of infections found during Dasient's 2009 report for the same three-month period. Perhaps most alarming of all is the fact that some of those infected websites were those of government agencies and other legitimate organizations.

    In 2008 and 2009, Dasient noticed that websites of government agencies were being targeted for malware infections. Many of those sites, such as DC.gov, Govtrip.com, and others, had low monthly page views. In 2010, however, government sites that are viewed by many more web surfers have been hit with infections. The National Institute of Health, the Environmental Protection Agency, and the US Treasury are three examples of widely viewed government sites that have been affected by malware.

    This trend of popular government websites getting infected shows that hackers may be focusing their efforts on seemingly trustworthy and legitimate sites that have much larger viewing audiences. Despite having detected infections previously, some of the government agency websites became re-infected. The National Institute of Health's site was most recently infected in October, marking the fifth time such an event had occurred. Even worse was the State of Alabama's site, which experienced re-infection 37 times.

    The third quarter revealed another malware instance that could have drastic effects on governments, when the Stuxnet Trojan was detected. Stuxnet is a sophisticated Trojan that can sabotage industries critical to a nation's infrastructure, and possibly give its owners access to control equipment in factories and other areas. The sophistication of the Stuxnet virus leads many to believe that it could have only been created with plenty of financial backing. Many also believe it was possibly written by a nation state with plans to spread terrorism on a massive level.

    In terms of malware distribution, Dasient found that hackers used anti-virus scams and drive-by downloads on an increased basis. They also predict that the growing popularity of social networking sites such as Facebook and Twitter will cause such sites to become favored targets for malware distribution. One well-known offender in this realm is the Koobface botnet; it has affected many social networking users. Koobface developers have successfully created attack modules that attempt to spread phony anti-virus software among the networks. The attack modules have been programmed to also post comments on profiles that contain malicious links.

    Another highlight of Dasient's report was its findings on the existence of malvertisements across the Internet. Malvertisements are online advertisements that contain malware or scareware that try to trick users into clicking them to install fake anti-virus software to eliminate infections, and more. During the third quarter of 2010, Dasient estimated that 1.5 million plus malvertisements were served per day, and that the average malvertising campaign had a life expectancy of 11.1 days. The combination of the frequency and the decent life span of malvertisements makes them another solid avenue for malware distribution.

    For more on this topic, visit http://blog.dasient.com/2010/11/normal.html.

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    More Web Hosting Security Articles
    More By wubayou


    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap