+ All Categories
Home > Documents > SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation...

SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation...

Date post: 28-Jul-2020
Category:
Upload: others
View: 10 times
Download: 0 times
Share this document with a friend
23
SYMANTEC INTELLIGENCE REPORT OCTOBER 2014
Transcript
Page 1: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

SYMANTEC INTELLIGENCE REPORTOCTOBER 2014

Page 2: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 2

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

CONTENTS

3 Summary

4 TARGETED ATTACKS + DATA BREACHES

5 Targeted Attacks

5 Attachments Used in Spear-Phishing Emails

5 Spear-Phishing Attacks by Size of Targeted Organization

5 Average Number of Spear-Phishing Attacks Per Day

6 Top-Ten Industries Targeted in Spear-Phishing Attacks

7 Data Breaches

7 Timeline of Data Breaches

8 Total Identities Exposed

8 Top Causes of Data Breaches

8 Total Data Breaches

9 Top-Ten Types of Information Breached

10 MALWARE TACTICS

11 Malware Tactics

11 Top-Ten Malware

11 Top-Ten Mac OSX Malware Blocked on OSX Endpoints

12 Ransomware Over Time

12 Malicious Activity by Source: Bots

13 Vulnerabilities

13 Number of Vulnerabilities

13 Zero-Day Vulnerabilities

14 Browser Vulnerabilities

14 Plug-in Vulnerabilities

15 SOCIAL MEDIA + MOBILE THREATS

16 Mobile

16 Mobile Malware Families by Month, Android

17 Mobile Threat Classifications

18 Social Media

18 Social Media

19 PHISHING, SPAM + EMAIL THREATS

20 Phishing and Spam

20 Phishing Rate

20 Global Spam Rate

21 Email Threats

21 Proportion of Email Traffic Containing URL Malware

21 Proportion of Email Traffic in Which Virus Was Detected

22 About Symantec

22 More Information

Page 3: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 3

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Summary

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.

Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources.

The number of spear phishing attacks per day continues to trend downward over the last twelve months, coming in at 45 per day in October. Of the attachments used in such email-based attacks, the .doc attachment type comprised 62.5 percent and .exe attachments made up 14.4 percent. Of the industries attacked, the category of Finance, Insurance, and Real Estate received 28 percent of all spear phishing attempts in the month of October, followed by Manufacturing at 17 percent.

The largest data breach that was disclosed in October took place back in July. This breach had previously been reported; however, we learned this month that the breach resulted in the exposure of identities within 76 million households, plus information on an additional seven million small businesses.

In the Mac threat landscape, OSX.Okaz was the most frequently encountered OSX risk seen on OSX endpoints, making up 28.8 percent of OSX risks. OSX.Okaz is an adware program that may modify browser homepage and search settings.

Finally, Ransomware as a whole continues to decline as the year progresses. However, the amount of crypto-style ransomware seen continues to increase. This particularly aggressive form of ransomware made up 55 percent of all ransomware in the month of October.

We hope that you enjoy this month’s report and feel free to contact us with any comments or feedback.

Ben Nahorney, Cyber Security Threat Analyst [email protected]

Page 4: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 4

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

TAR

GETED

ATTACKS

+ DATA

BR

EACHES

Page 5: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 5

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

At a Glance

• The average number of spear-phishing attacks dropped to 45 per day in October, down from 53 in September.

• The .doc file type was the most common attachment type used in spear-phishing attacks. The .exe file type came in second.

• Organizations with 2500+ employees were the most likely to be targeted in October.

• Finance, Insurance, & Real Estate lead the Top-Ten Industries targeted, followed by Manufacturing.

Targeted Attacks

Average Number of Spear-PhishingAttacks Per DaySource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

25

50

75

100

125

150

175

200

225

250

OSAJJMAMFJ

2014

DN

54 53 45

20

116

54

141

84 84

54

88

165

Attachments Used in Spear-Phishing Emails

Source: Symantec :: OCTOBER 2014

Executable type October September

.doc 62.5% 52.9%

.exe 14.4% 4.8%

.txt 11.2% 9.1%

.pdf 4.4% 1.0%

.ace 0.7% –

.jpeg 0.2% –

.htm 0.1% –

.dmp 0.1% 9.1%

.scr 0.1% 15.4%

.rtf 0.1% –

Spear-Phishing Attacks by Size of Targeted OrganizationSource: Symantec :: OCTOBER 2014

Organization Size October September

1-250 27.1% 32.5%

251-500 6.6% 8.7%

501-1000 8.9% 8.6%

1001-1500 2.9% 3.7%

1501-2500 11.2% 3.9%

2500+ 43.3% 42.6%

Page 6: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 6

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Top-Ten Industries Targeted in Spear-Phishing AttacksSource: Symantec :: OCTOBER 2014

Mining

Public Administration

Energy/Utilities

Retail

Wholesale

Transportation, Communications,

Electric, Gas

Services - Professional

Services - Non Traditional

Manufacturing

Finance, Insurance & Real Estate

28%

17 14

10 9 9

4 3 2

1

Page 7: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 7

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Data Breaches

At a Glance

• The largest data breach disclosed in October actually took place in July, and resulted in the exposure of at least 76 million identities.

• Hackers have been responsible for 57 percent of data breach-es in the last 12 months.

• Real names, government ID numbers, such as Social Security numbers, and home addresses were the top three types of data exposed in data breaches.

20

40

60

80

100

120

140

160

OSAJJMAMFJ2014

DN

NU

MB

ER O

F IN

CID

ENTS

IDEN

TITI

ES E

XPO

SED

(MIL

LIO

NS)

INCIDENTS IDENTITIES EXPOSED (Millions)

Timeline of Data BreachesSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

147

59

1

78

31.5

1011.72.68.1

130

113

23

5

10

15

20

25

30

35

40

22

29

2725

27

21 20

19

11 11

21

Page 8: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 8

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Top Causes of Data BreachesSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

Insider Theft

Theft or Lossof Computeror Drive

AccidentallyMade Public

Hackers 57%

18%

18%

7%

Numberof Incidents

147

46

46

18

257TOTAL

Total DataBreaches NOVEMBER 2013 — OCTOBER 2014

257

Total IdentitiesExposed NOVEMBER 2013 — OCTOBER 2014

583Million

Page 9: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 9

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Top-Ten Types of Information BreachedSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

Real Names

Gov ID numbers (Soc Sec)

Home Address

Birth Dates

Financial Information

Medical Records

Phone Numbers

Email Addresses

Usernames & Passwords

Insurance

01

02

03

04

05

06

07

08

09

10

69%

44%

43%

40%

33%

28%

20%

21%

16%

8%

MethodologyThis data is procured from the Norton Cybercrime Index (CCI). The Norton CCI is a statistical model that measures the levels of threats, including malicious software, fraud, identity theft, spam, phishing, and social engineering daily. The data breach section of the Norton CCI is derived from data breaches that have been reported by legitimate media sources and have exposed personal information.

In some cases a data breach is not publicly reported during the same month the incident occurred, or an adjustment is made in the number of identities reportedly exposed. In these cases, the data in the Norton CCI is updated. This causes fluctuations in the numbers reported for previous months when a new report is released.

Page 10: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 10

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

MA

LWA

RE TAC

TICS

Page 11: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 11

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Malware Tactics

At a Glance

• W32.Sality and W32.Ramnit variants continue to dominate the top-ten malware list.

• The most common OSX threat seen on OSX was OSX.Okaz, making up 28.8 percent of all OSX malware found on OSX Endpoints.

• Overall ransomware activity has remained low since March of this year. However, crypto-style ransomware continues to increase, making up 55 percent of ransomware in October.

• China and the US where first and second, respec-tively, in October in terms of overall botnet source activity.

Top-Ten MalwareSource: Symantec :: OCTOBER 2014

Rank Name October September

1 W32.Sality.AE 4.1% 4.4%

2 W32.Ramnit!html 4.0% 4.3%

3 W32.Almanahe.B!inf 3.7% 3.7%

4 W32.Ramnit.B 2.7% 2.7%

5 W32.Downadup.B 2.5% 2.3%

6 W32.Ramnit.B!inf 2.1% 2.0%

7 W32.SillyFDC.BDP!lnk 1.4% 2.2%

8 Trojan.Zbot 1.3% 1.2%

9 W32.Virut.CF 1.3% 1.4%

10 W32.Chir.B@mm(html) 1.2% 1.4%

Top-Ten Mac OSX Malware Blocked on OSX EndpointsSource: Symantec :: OCTOBER 2014

Rank Malware Name October September

1 OSX.Okaz 28.8% 7.6%

2 OSX.RSPlug.A 14.0% 26.3%

3 OSX.Keylogger 9.3% 3.6%

4 OSX.Flashback.K 5.4% 8.7%

5 OSX.Klog.A 5.2% 2.9%

6 OSX.Crisis 4.8% 8.7%

7 OSX.Stealbit.B 4.7% 5.3%

8 OSX.Flashback 3.9% 4.0%

9 OSX.Netweird 3.7% 5.2%

10 OSX.Sabpab 2.3% 2.7%

Page 12: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 12

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Malicious Activity by Source: BotsSource: Symantec :: SEPTEMBER 2014

Rank Country/Region Percent

1 United States 26.4%

2 China 11.9%

3 Taiwan 8.2%

4 Hungary 4.8%

5 Italy 4.2%

6 Canada 3.4%

7 Japan 3.0%

8 Brazil 2.8%

9 Poland 2.3%

10 Germany 2.2%

Ransomware Over TimeSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

THO

USA

ND

S

200

400

600

800

1000

OSAJJMAMFJ

2014

DN

861

660

465

342425

156 143230 183 149

95 80

Page 13: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 13

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Number of VulnerabilitiesSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

100

200

300

400

500

600

700

800

OSAJJMAMFJ2014

DN

438

575 600 596

399438

471

542 562 579

473

555

Zero-Day VulnerabilitiesSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

1

2

3

4

5

6

7

8

OSAJJMAMFJ2014

DN

0 0 0 0

22 2

0

5

0

1

4

Vulnerabilities

At a Glance

• There were 596 vulner-abilities disclosed during the month of October.

• There were two zero-day vulnerabilities discovered in October.

• Internet Explorer has reported the most brows-er vulnerabilities in the last 12 months.

• Oracle’s Java reported the most plug-in vulner-abilities over the same time period.

Page 14: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 14

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Browser VulnerabilitiesSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

20

40

60

80

100

OSAJJMAMFJ2014

DN

Opera

Mozilla Firefox

Microsoft Internet Explorer

Google Chrome

Apple Safari

Plug-in VulnerabilitiesSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

10

20

30

40

50

60

70

80Java

Apple

Adobe

ActiveX

OSAJJMAMFJ2014

DN

Page 15: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 15

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

SOCIA

L MED

IA

+ MO

BILE TH

REATS

Page 16: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 16

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Mobile

Mobile Malware Families by Month, AndroidSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

2

4

2

4

2 2

3

5

3

4 4

3

1

2

3

4

5

6

7

8

9

10

OSAJJMAMFJ2014

DN

At a Glance

• There were five Android malware families discov-ered in July.

• Of the threats discovered in the last 12 months, 26 percent are tradi-tional threats, such as back door Trojans and downloaders.

• In terms of social networking scams, 38 percent were fake offer-ings, while 49 percent were manually shared scams.

Page 17: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 17

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Mobile Threat ClassificationsSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

Track User Risks that spy on the individual using the device, collecting SMS messages or phone call logs, tracking GPS coordinates, recording phone calls, or gathering pictures and video taken with the device.

Steal Information This includes the collection of both device- and user-specific data, such as device information, configuration data, or banking details.

Traditional Threats Threats that carry out traditional malware functions, such as back doors and downloaders.

Recon�gure Device These types of risks attempt to elevate privileges or simply modify various settings within the operating system.

Adware/Annoyance Mobile risks that display advertising or generally perform actions to disrupt the user.

Send Content These risks will send text messages to premium SMS numbers, ultimately appearing on the bill of the device’s owner. Other risks can be used to send spam messages.

5

10

15

20

25

30%

AdwareAnnoyance

ReconfigureDevice

SendContent

TraditionalThreats

TrackUser

StealInformation

6%

13%

26%

22%

13%

19%

Page 18: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 18

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Social Media

Social MediaSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

Fake Offers These scams invite social network users to join a fake event or group with incentives such as free gift cards. Joining often requires the user to share credentials with the attacker or send a text to a premium rate number.

Manual Sharing Scams These rely on victims to actually do the work of sharing the scam by presenting them with intriguing videos, fake offers or messages that they share with their friends.

Likejacking Using fake “Like” buttons, attackers trick users into clicking website buttons that install malware and may post updates on a user’s newsfeed, spreading the attack.

Comment Jacking Similar to likejacking, this type of scam relies on users clicking links that are added to comments by attackers. The links may lead to malware or survey scams.

Fake App Users are invited to subscribe to an application that appears to be integrated for use with a social network, but is not as described and may be used to steal credentials or harvest other personal data.

10

20

30

40

50

60

70

80

90

100%

CommentJacking

FakeApps

LikejackingManualSharing

FakeOffering

2% .6%

38%

49%

10%

Page 19: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 19

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

PHISH

ING

, SPAM

+ EMA

IL THR

EATS

Page 20: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 20

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Phishing and Spam

Phishing RateSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

1 in 500

1 in 1000

1 in 1500

1 in 2000

1 in 2500OSAJJMAMFJ

2014

DN

2041

1610

236

306401 478

370

731

395496

1290

1587

At a Glance

• The phishing rate rose in October, at one in 1,610 emails, up from one in 2,041 emails in September.

• The global spam rate was 55.3 percent for the month of October.

• One out of every 329 emails contained a virus.

• Of the email traffic in the month of October, 6.9 percent contained a mali-cious URL.

Global Spam RateSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

10

20

30

40

50

60

70

80

90

100%

OSAJJMAMFJ2014

DN

69 71

62 62

66

59

61 6064 63

58 55

Page 21: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 21

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

Email Threats

Proportion of Email Traffic Containing URL MalwareSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

10

20

30

40

50

60

70

80

90

100%

OSAJJMAMFJ2014

DN

6 71014 16 14

6 3

147 8

3

1 in 50

1 in 100

1 in 150

1 in 200

1 in 250

1 in 300

1 in 350

1 in 400

1 in 450

1 in 500OSAJJMAMFJ

2014DN

Proportion of Email Traffic in Which Virus Was DetectedSource: Symantec :: NOVEMBER 2013 — OCTOBER 2014

351

329

129112

207188

141

234

183

232

351

270

Page 22: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

p. 22

Symantec CorporationSymantec Intelligence Report :: OCTOBER 2014

About Symantec

More Information

• Symantec Worldwide: http://www.symantec.com/

• ISTR and Symantec Intelligence Resources: http://www.symantec.com/threatreport/

• Symantec Security Response: http://www.symantec.com/security_response/

• Norton Threat Explorer: http://us.norton.com/security_response/threatexplorer/

• Norton Cybercrime Index: http://us.norton.com/cybercrimeindex/

Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings – anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company’s more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2013, it recorded revenues of $6.9 billion. To learn more go to www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia.

Page 23: SYMANTEC INTELLIGENCE REPORTdocs.media.bitpipe.com/io_12x/io_120570/item... · Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition

For specific country offices and contact numbers,

please visit our website.

For product information in the U.S.,

call toll-free 1 (800) 745 6054.

Symantec Corporation World Headquarters

350 Ellis Street

Mountain View, CA 94043 USA

+1 (650) 527 8000

1 (800) 721 3934

www.symantec.com

Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners


Recommended