Symantec Corp. (Nasdaq: SYMC) today released its new Internet Security Threat Report volume XV, which highlights key trends in cybercrime from Jan.1, 2009 to Dec. 31, 2009. In a year bookended by two very prominent Cyber attacks – Conficker in the opening months of the year and Hydraq at the very end – Symantec’s Internet Security Threat Report reveals continued growth in both the volume and sophistication of cybercrime attacks.
“Attackers have evolved from simple scams to highly sophisticated espionage campaigns targeting some of the world’s largest corporations and government entities,” said Johnny Karam, Regional Director – Middle East & North Africa, Symantec. “The scale of these attacks and the fact that they originate from across the world, makes this a truly international problem requiring the cooperation of both the private sector and world governments.”
Regional highlights from this year’s report include:
• The UAE ranked number 18 in EMEA and 36 in the world in 2009 for malicious activity. In comparison to the previous year, the UAE climbed from number 40 to 36 globally. Egypt ranked 15 in EMEA and 31 in the world in 2009, climbing from number 26 globally in 2008. Saudi Arabia ranked number 13 in EMEA and 29 in the world in 2009 for malicious activity. Egypt, Turkey and Saudi Arabia were the top three ranked countries for potential virus infections during 2009, in that order.
• In 2009, Saudi Arabi had the highest number of potential worm infections in EMEA, unchanged from 2008 while The United Arab Emirates and Egypt ranked second and third for potential worm infections in 2009, respectively. These two countries ranked fourth and fifth in 2008, respectively, and their increase in rank for 2009 is attributed to the drop in rank of the United Kingdom and Spain, from second and third in 2008 to sixth and eight in 2009, respectively. The rise of worm activity in the United Arab Emirates and Egypt can be attributed to the previously mentioned connection between worm and virus activity in the region, as both of these countries ranked in the top five for viruses.
• In the EMEA region in 2009, 49 percent of the volume of the top 50 potential infections were classified as worms – an increase from 30 percent in 2008. More specifically, Egypt was the top-ranked country for viruses while Saudi Arabia was the top-ranked country for worms. Worms are malicious programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file.
• Malicious Activity in Saudi Arabia. The second most common malicious code sample causing potential infections in EMEA in 2009 was the Mabezat.B worm. Mabezat spreads through email, removable drives, and network shares protected by weak passwords. It also infects executable files and encrypts data files.
Notable trends highlighted in this year’s report include:
• An increase in the number of targeted threats focused on enterprises. Given the potential for monetary gain from compromised corporate intellectual property (IP), cybercriminals have turned their attention toward enterprises. The report found that attackers are leveraging the abundance of personal information openly available on social networking sites to synthesize socially engineered attacks on key individuals within targeted companies. Hydraq gained a great deal of notoriety at the beginning of 2010, but was only the latest in a long line of such targeted attacks including Shadow Network in 2009 and Ghostnet in 2008.
• Attack toolkits make cybercrime easier than ever. Cybercrime attack toolkits have lowered the bar to entry for new cybercriminals, making it easy for unskilled attackers to compromise computers and steal information. One such toolkit called Zeus (Zbot), which can be purchased for as little as $700, automates the process of creating customized malware capable of stealing personal information. Using kits like Zeus, attackers created literally millions of new malicious code variants in an effort to evade detection by security software.
• Web-based attacks continued to grow unabated. Today’s attackers leverage social engineering techniques to lure unsuspecting users to malicious websites. These websites then attack the victim’s Web browser and vulnerable plug-ins normally used to view video or document files. In particular, 2009 saw dramatic growth in the number of Web-based attacks targeted at PDF viewers; this accounted for 49 percent of observed Web-based attacks. This is a sizeable increase from the 11 percent reported in 2008.
• Malicious activity takes root in emerging countries. The report saw firm signs that malicious activity is now taking root in countries with an emerging broadband infrastructure, such as Brazil, India, Poland, Vietnam and Russia. In 2009, these countries moved up the rankings as a source and target of malicious activity by cybercriminals. The findings from the report suggest that government crackdowns in developed countries have led cybercriminals to launch their attacks from the developing world, where they are less likely to be prosecuted.
Other ISTR Highlights:
• Malicious code is more rampant than ever. In 2009, Symantec identified more than 240 million distinct new malicious programs, a 100 percent increase over 2008.
• Top threats. The Sality.AE virus, the Brisv Trojan and the SillyFDC worm were the threats most frequently blocked by Symantec security software in 2009.
• Downadup (Conficker) still very prevalent. It was estimated that Downadup was on more than 6.5 million PCs worldwide at the end of 2009. Thus far, machines still infected with Downadup/Conficker have not been utilized for any significant criminal activity, but the threat remains a viable one.
• Compromised identity information continues to grow. Sixty percent of all data breaches that exposed identities were the result of hacking. In a sign that this issue is not limited to a few larger enterprises, the Symantec State of Enterprise Security Report 2010 reported that 75 percent of enterprises surveyed experienced some form of cyber attack in 2009.
• Another turbulent year for spam. In 2009, spam made up 88 percent of all e-mail observed by Symantec, with a high of 90.4 percent in May and a low of 73.7 percent in February. Of the 107 billion spam messages distributed globally per day on average, 85 percent were from botnets. The 10 major bot networks, including Cutwail, Rustock and Mega-D now control at least 5 million compromised computers. Throughout 2009, Symantec saw botnet infected computers being advertised in the underground economy for as little as 3 cents per computer.
• Applying security patches continues to be a challenge for many users. The report found that maintaining a secure, patched system became more challenging than ever in 2009. Moreover, many users are failing to patch even very old vulnerabilities. For example, the Microsoft Internet Explorer ADODB.Stream Object File Installation Weakness was published on August 23, 2003, and fixes have been available since July 2, 2004, yet it was the second-most attacked Web-based vulnerability in 2009.