Global Threat Trends 1H 2010
Transcription
Global Threat Trends 1H 2010
Trend Micro TrendLabs Global Threat Trends 1H 2010 Table of Contents Threat Trends 4 Email Threat Trends 5 Web-Based Threat Trends 8 File-Based Threat Trends 9 Cybercrime and Botnets 10 Underground Economy 12 High Profile Incidents of 1H2010 12 Vulnerabilities 15 Trend Micro Technology and Protection 16 Smart Protection Network 16 Solutions and Services 16 Trend Micro Enterprise Security 16 Trend Micro SecureCloud 16 Trend Micro Worry-Free Business Security 16 Trend Micro Titanium 17 Advice for Businesses Adopting Cloud Strategies 17 Advice for Businesses 17-18 Top Tips for End Users 19 About TrendLabs 20 Introduction Cybercrime is now a fully fledged, but highly illegal business. And it’s all about money. As the Underground Economy has grown and flourished, cybercriminals have developed new methods for tricking victims. Their scams are amazingly lucrative, with profits totaling in the billions per year. Many perpetrators hail from Eastern Europe where cybercrime is rampant and considered business as usual. Canadian pharmacy spam, fake antivirus and others are part of a well-organized business model based on the concept of affiliate networking. In the case of cybercrime, products sold via affiliate marketing may be highly profitable, although highly illegal—such as click fraud and selling credit card details. In this report covering January to June 2010, we examine various cybercrime incidents, the criminal’s use of multiple tools such as botnets, and look at threat trends and activity currently causing, and likely to continue to cause the most pain, cost and disruption to connected users across the world. Many threats have evolved in recent times, becoming more silent, and more insidious. Threats are intertwined – meaning almost every threat comprises multiple components for attacking, infecting and compromising data. Components always relate to one or more of the following three vectors – email, web and file. During the first six months of 2010 TrendLabsSM identified Europe as the largest source of spam emails, while Education is the industry most affected by malware compromise. Meanwhile, the US is the primary source of malicious URL’s. Vulnerability exploits are a key asset used by cybercriminals. They buy and sell vulnerability information, exploit code, as well as other types of malware. In the first half of 2010, over 2500 common vulnerabilities and exposures (CVE’s) were recorded. Professional criminals are widely known to be the perpetrators of almost all threats. Botnets are managed and run as an enterprise organization manages its network. Making money is the primary aim. 3 Threat Trends The Trend Micro™ Smart Protection Network™ infrastructure delivers advanced protection from the cloud, blocking threats in real-time before they reach you. Leveraging a unique, cloudclient architecture, it is powered by a global network of threat intelligence sensors, email, Web, and file reputation technologies that work together to dramatically reduce infections. The Smart Protection Network is now seeing 45 billion queries every 24 hours, while it blocks 5 billion threats and processes 2.5 terabytes of data on a daily basis. On average 80 million users are connected to the network each day. This community of users helps enable Trend Micro Smart Protection Network to continue evolving and improving protection in real-time. The following data points, taken from Smart Protection Network and other supporting monitoring systems, provide a comprehensive insight into the threats Trend Micro protected its users against, in the first six months of 2010. 4 Email Threat Trends Spam Spam continued to grow between January and June 2010, albeit with a brief interval during April. Regional Spam Sources - Q2 3% 0% 11% 28% Spam Volume APAC Europe 3,500,000,000 North America 14% South America 3,000,000,000 Unknown 2,500,000,000 Africa 2,000,000,000 1,500,000,000 44% 1,000,000,000 500,000,000 JUN MAY APR MAR JAN FEB 0.00 The most notable change between the first and second quarters of 2010, was the reduction in spam from APAC and the increase in spam from Europe. Countries strongly contributing to the growth in spam from Europe include Germany, UK, Italy and France. Most of the spam tracked during the past six months fall under the following three categories: Commercial (28%), Scams (22%), or Health/Medical (15%). In terms of spam technique, 37% of total samples use HTML, followed by Plain Text (25%) and Short Spam (10%). Spam Technique Distribution HTML 4% 2% 10% RAR/Zip attached 5% 1% 0% XLS attached DOC/TXT attached HTML Inserts 31% APAC 3% Short Spam 6% Europe North America 14% PDF/RTF attached GIF/JPEG attached 3% 0% 14% Image 25% 6% Regional Spam Sources - Q1 Plain Text Salad 37% Others South America Unknown Africa 38% Currently, TrendLabs monitors 38 languages and dialects used in spam. This coverage is continuously being improved to provide increased protection against highly localized spam. More than 95% of spam is in English. For the non-English spam, the top most common languages received are Russian, Japanese, Chinese, Spanish, and French. 5 Email Threat Trends Commercial, Scams and Health/Medical spam made up the vast majority – a total of 65 percent of the total spam tracked in the first half of 2010. Spam Type Distribution The below chart demonstrates the quantity of spam per ASN (Autonomous System Number) in the first six months of 2010. An ASN is allocated to each ISP or organization that manages a large group of IP routing prefixes1. Health/Meds Spam volume by ASN (past 6 months) Stocks 11% Educ/Degree 15% 4% 0% 1% 0% 2% 6% 800.000 600,000 400,000 200,000 0 Jobs Scam Adult/Porn/Dating 9829 45899 12322 3209 24560 9050 20115 3320 27699 18403 3462 7738 2856 3269 25019 5089 9050 3209 24560 12322 45899 9829 APR MAY JUN JAN Others 4% 7% Phishing FEB Malware (attachment) 22% 28% MAR Malware (URL) 6830 Commercial 28573 6849 4766 8167 1267 13184 6799 Financial 5089 25019 3269 2856 7738 3462 6849 4766 8167 1267 13184 6799 6830 18403 27699 3320 20115 28573 Spam volume by ASN (past 6 months) The quantity of spammed messages distributed via botnets is astronomical. Spam continues to be a vector of choice for criminals owing to the speed of distribution and delivery, the vast target list and relatively low cost of investment when compared to the profit on offer. Spam Volume by Country 800,000,000 700,000,000 600,000,000 500,000,000 400,000,000 300,000,000 JUN APR MAY MAR JAN 100,000,000 0 FEB 200,000,000 USA IND DEU BRA GBR FRA VNM ITA KOR POL ROM RUS NLD ESP UKR COL TWN SAU PRT ISR ARG GRC CAN TUR others As can be seen from the chart above, certain ASNs are working hard to reduce the spam distributed via their networks; however, these efforts seem to be countered by a number of providers not acting to manage the spam problem. One way ISP’s can help combat botnets and spam is by blocking email on port 25—the port responsible for SMTP transfers. Botnet communications use port 25 when sending spam and other junk mail. By blocking port 25 and moving email communications to a different internal port, the spam communications will become ineffective. Generally speaking, users will not notice any direct change, as most use their ISPs’ own servers or free email services from providers like Gmail, Windows Live Hotmail, or Yahoo Mail. As an example of how and why the issue of spam is now overwhelming, according to Trend Micro research, spam now accounts for around 97% of all email in circulation2. In a recent laboratory controlled investigation, the quantity of spam generated by a single bot infested computer in a 24 hour period totaled around 2,553,9403. http://en.wikipedia.org/wiki/Autonomous_System_Number 1 http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis q3_2009_spam_report.pdf 2 3 6 https://blog.trendmicro.com/how-many-spam-can-a-spam-bot-spam/ The following chart shows the total number of spam bot infected computers TrendLabs identified per country. A spam bot is an infected computer controlled by a botnet known to prolifically distribute spam, although it is unlikely to be limited to only this type of activity. Note, that this is not the total number of infected computers – as many bots are not used to distribute spam. • B anca Carige: a commercial Italian bank, including some of its subsidiaries like Cassa di Risparmio di Carrara and Cassa di Risparmio di Savona However, the total number of active spamming IP’s in India and Brazil are well ahead of their closest rival, Germany. In the past 6 months, both India and Brazil have fully emerged as central countries in the cyber criminal landscape. • C assa di Risparmio di Ferrara: a commercial Italian bank 1H10 Total Host Count by Country 25,000,000 • Banca Cesare Ponti: a commercial Italian bank • Banca Sai: a commercial Italian bank • B attle.net: an online gaming service operated by Blizzard Entertainment • C enturyLink: a telecommunications company in the United States • F irstCaribbean International Bank: a Barbados-based bank operating in the Caribbean • iQuebec: a French-language Internet portal • Lottomatica: an Italian gaming company 20,000,000 • Nantahala Bank & Trust Company: an American bank • NCSoft: an online gaming service provider 15,000,000 • Pinnacle Bank: an American bank 10,000,000 • President’s Choice Financial: a Canadian bank • Public Bank Berhad: a Malaysian Bank 0 IND BRA DEU VMN RUS USA ITA GBR UKR SAU COL ESP POL CHN ARG TWN ROM THA TUR SRB GRC PRT IDN PAK others 5,000,000 Phishing Targeted Entities In alphabetical order, the four most popular entities targeted via both phishing email and spoofed sites in the first six months of 2010 were (1)Bank of America, (2)eBay, (3)HSBC, and (4)PayPal . • SCRIGNO for Banca Popolare Di Sondrio: an Italian bank Phishing Techniques Between January and June 2010, phishers continued the trend of explicitly display phishing URLs. This indicates victims still trust that a site is authentic based on more obvious visual clues such as the site’s appearance and use of correct company logos, instead of inspecting the URL address bar. While the majority of the top 10 targeted entities are commercial or financial entities, social media platforms like Facebook and Twitter, as well as MMORPGs like World of Warcraft, were also consistently present. The majority of the new entities being targeted by phishers are local banks in specific countries (e.g., Italy, Malaysia, United States) and online gaming services (see below, in alphabetical order): • Air Academy FCU: a credit union with branches in Colorado • Banca Del Monte di Lucca 7 Web-Based Threat Trends The onslaught of threats using the Web as a means to propagate will increasingly cause challenges for organizations and end users. # Apr May Jun Q2 1 United States United States United States United States 2 China China Ireland China 3 Netherlands Romania China Ireland 4 Germany Germany Romania Romania 5 Romania Japan Japan Germany 6 Japan United Kingdom Germany Japan 7 United Kingdom Netherlands United Kingdom Netherlands 8 Russian Federation Ukraine Netherlands United Kingdom 2,500,000,000 9 Ukraine Russian Federation Russian Federation Russian Federation 2,000,000,000 10 France France Ukraine Ukraine 1,500,000,000 11 Canada South Korea France France 1,000,000,000 12 South Korea Canada South Korea Canada 13 Italy Australia Canada South Korea 14 Australia Italy Sweden Australia 15 Sweden Belgium Belgium Sweden 16 Turkey Sweden Australia Belgium 17 Bahamas Taiwan Latvia Italy 18 Singapore Bahamas Italy Bahamas 19 Czech Republic Singapore Bahamas Latvia 20 Poland Poland Taiwan Taiwan Growth in Malicious URLs 4,000,000,000 3,500,000,000 3,000,000,000 500,000,000 JUN MAY APR MAR JAN FEB 0 Bad Actors vs. Victims Bad Actors refers to the source of malicious URL’s. The United States has consistently been the primary source of malicious URLs, while Japan accessed the greatest number of malicious URLs. Similarly, North America is the top continent that has the most malicious URLs, while Asia is the continent with most victims. Monthly Top 20 Bad Actors by Country Top URLs and Domains Blocked Below is the list of the URLs that consistently appeared in the top 10 for 4-6 months (in no particular order): URL # 8 Jan Feb Mar Description Q1 ad. globe7.com:80/iframe3 (USA) Contains malicious IFRAME code bid. openx.net:80/json (USA) Known to download TROJ_AGENT variants delivery. adyea.com:80/lg.php (DEU) Known to download worms; sets drives to autoplay by creating autorun.inf in the drives’ root directories dt . tongji.linezing.com:80/tongji.do (CHN) Related to JS_DLOADR.ATF hot1. xgazo.info:80/pic.php (USA) Proxy avoidance site newt1. adultadworld.com:80/jsc/z5/ff2. html (USA) Adult website openxxx. viragemedia.com:80/www/ delivery/afr.php (NLD) Known to host adware 1 United States United States United States United States 2 China China China China 3 Netherlands Netherlands Netherlands Netherlands 4 Russian Federation Germany Germany Germany 5 Germany Russian Federation Romania Russian Federation 6 Romania Japan Japan Romania 7 Japan Romania Russian Federation Japan 8 France France United Kingdom France 9 United Kingdom United Kingdom France United Kingdom 10 Ukraine Canada Canada Canada 11 Bosnia and Herzegovina Ukraine Ukraine Ukraine 12 Canada South Korea South Korea South Korea 13 South Korea Italy Italy Sweden 14 Sweden Sweden Sweden Italy 15 Portugal Poland Australia Poland 16 Poland Turkey Bahamas Bosnia and Herzegovina 17 Italy Australia Turkey Turkey 18 Turkey Czech Republic Poland Australia 19 Australia Taiwan Czech Republic Portugal 20 Israel Panama Panama Czech Republic Below is the list of domains that consistently appeared in the top 10 for 4-6 months (in no particular order): URL Description bid. openx.net (USA) Known to download TROJ_AGENT variants delivery. adyea.com (DEU) Known to download worms; sets drives to autoplay by creating autorun.inf in the drives’ root directories dt. tongji.linezing.com (CHN) Related to JS_DLOADR.ATF hot1. xgazo.info (USA) Proxy avoidance site newt1. adultadworld.com (USA) Adult website openxxx. viragemedia.com (NLD) Known to host adware trafficconverter. biz (USA) Known to be accessed by Conficker/ DOWNAD variants File-Based Threat Trends Unique Samples Added New Malware Creation In order to ensure wide sourcing of malware samples, Trend Micro has its own research and monitoring systems and also collaborates with multiple independent third parties. Included among these independent third parties is AV-test.org. Calculations based upon the total number of unique samples collected in 2009, a new piece of malware is created every 1.5 seconds. Infections according to Industry The chart below clearly indicates that Education as an industry has been hardest hit by infections in the first half of 2010. This is likely owing to the number of students using old and out of date software and security, and possibly visiting suspect websites. These issues compound the challenges related to securing a complex, distributed and diverse infrastructure. Infection breakdown by Industry New Unique Samples Added to AV-Test.org’s Malware Collection Banking Communication/Media 2,000,000 Education NEW 2% 2% 0% 3% 1% 10% 1% Threat Every 1.5 1,500,000 Seconds Forecast 2010-03 2009-11 2010-01 2007-07 2007-09 2009-03 2009-05 2008-11 2009-01 2008-07 2008-09 2008-05 2008-01 Growth 3 Month Median 2008-03 2007-07 2007-09 2007-05 2007-01 2007-03 500,000 TEST Fast-Moving Consumer Goods Financial Food and beverage 4% 2% 0% 0% 6% 0% 4% 1,000,000 0 Energy 1% Government Healthcare Insurance Manufacturing 10% 44% 2% 3% 0% 1% Materials Retail Media Technology Oil and gas Telecommunications Other Transportation Real estate Utilities Infections tracked, by Industry over Time 200,000,000 Utilities Technology Other Materials Healthcare Financial Education *5,! Transportation Retail Oil and Gas Manufacturing Government Fast-Moving Consumer Goods (FMCG) Communications and Media *56! 257! JUN MAY APR 0 MAR 50,000,000 FEB Trojans account for about 60 percent of new signatures created by TrendLabs, and 53 percent of overall detections as of June. Backdoors and Trojan-spyware, often associated defined as crimeware or data-stealing malware, come in second and third places, respectively. However, the majority of Trojans lead to data-stealing malware. 150,000,000 100,000,000 JAN TrendLabs now sees in the region of 250,000 samples each day. However, recent estimates place the number of unique new malware samples introduced in a single day at greater than 60,000 unique samples. Telecommunications Real estate Media Insurance Food and beverage Energy Banking 8.3! 9:;! D.6.:=EE5,B:+A=,C! 9 Cybercrime and Botnets Botnets are the tool of choice for distributing malware, perpetrating attacks and sending slews of spam email. Through these botnets, botnet herders – the Cybercriminals behind the botnets earn millions of dollars in money stolen from innocent computer users. These cybercriminals buy and sell, build partnerships and rent services just as above-board business would; the main difference being the legitimacy and legality of the products, solutions and services they handle. In an effort to help better explain cybercrime, in April 2010, TrendLabs forward looking research group published the following correlation map to provide a pictorial representation of the cybercriminal business model4. CUTWAIL spammed messages contain BREDO variants, therefore it can be assumed that the criminals behind BREDO are paying the criminals behind CUTWAIL to send spam containing BREDO. It is also likely that they are paid per machine infected by the BREDO variant they spammed. Note that these infected machines, which are part of the CUTWAIL botnet, report back to the BREDO botnet master. The same thing happens between ZeuS and BREDO. The criminals behind ZeuS pay the criminals behind BREDO to install their (ZeuS) malware on infected machines. As we all know, ZeuS malware steals bank account information, among other things (e.g., POP3 and FTP accounts). This chart may on the face of it, seem quite complicated, but we can illustrate by using BREDO and CUTWAIL as an example. CUTWAIL How the thread is delivered a.k.a. PUSHDO SPAM ZEUS Pay per Install notorious information stealer BREDO a.k.a BREDOLAB BREOLAB TDSS FAKEAV Approved for rootkit capabilities spamware used to extort money from victims. IT exchange for fake security software SASFIS used to deliver Malware as pay per install or pay per access models WALEDAC KOOBFACE usually found in social networking sites 4 10 http://blog.trendmicro.com/spotlighting-the-botnet-business-model/ There is an ongoing cycle of money moving from one place to another. In another example, criminals behind FAKEAV get paid if users buy their fake antivirus programs and they use this money to pay other botnets to spread their programs. At the end of the day, the aim of this succession of infections is to steal money from affected users. Keep in mind that every time a primary botnet downloads another malware, criminals behind the botnet are paid. TrendLabs experts see this cycle continuing, and evolving constantly. Arguably two threats that have had the most impact in the past six months are ZeuS and KOOBFACE. ZeuS ZeuS is primarily a crimeware kit designed to steal users’ online banking login credentials, among other things. It is the handiwork of Eastern European organized criminals that has now entered the underground cybercriminal market as a commodity. ZeuS has proliferated in part due to the availability of these ZeuS toolkits, which allow cybercriminals to rapidly create ZeuS variants in a matter of minutes. Hundreds of new ZeuS variants are seen by Trend Micro every day, and this is not likely to change in the near future. KOOBFACE KOOBFACE has been around since last year, gearing up to become the largest social networking threat to date. In the early part of this year, TrendLabs experts noted that the KOOBFACE gang was continuously updating their botnet: changing the botnet’s architecture, introducing new component binaries, and merging the botnet’s functions with other binaries. They also began encrypting their C&C communications to avoid monitoring and takedown by security researchers and the authorities. KOOBFACE attacks users on several social networking sites, and given the increasing usage across all demographics, the KOOBFACE gang will not likely let go of this money-generating scheme. In fact, it had begun tracking visitors, as evidenced by a short JavaScript code found in the fake video pages the gang has set up. This enables the creators to correlate user activity based on time of day and volume of successful KOOBFACE infections6. A new version of the ZeuS malware has also been encountered in the wild since the start of the year. These new versions, frequently referred to as ZeuS 2.0 versions, have had their behavior changed to become more difficult to detect and remove from systems. In addition, this new version also includes default support for current versions of Windows, where before it had to be acquired as an “upgrade”5. 5 http://us.trendmicro.com/imperia/md/content/us/trendwatch researchandanalysis/zeusapersistentcriminalenterprise.pdf 6 http://us.trendmicro.com/imperia/md/content/us/trendwatch researchandanalysis/web_2_0_botnet_evolution_-_koobface_revisited__may_2010_.pdf 11 Underground Economy During their monitoring, experts from TrendLabs identified the following items and their average price tag, for sale on the underground. Documents Scan Resale Services: Passport/utility bill/statement - $20 Credit card (front and back) - $25 Passport/utility bill/statment - $20 Original docs - starts from $4 Passport - $20 Drivers License - $20 Credit cards - $30 Utility bill - $10 US Credit Card Sales: US credit cards selling: USA /Master Card / VISA Price – $0.80c - $1 each EU credit cards Credit cards: Denmark, Greece, Ireland (Eire), Latvia, Netherlands, Norway, Sweden Price - $3 per card Credit Card Money Cashers Card information input service Person inputs the information of the credit card in online shops, for delivery to the requested address Price - $5 PayPal accounts selling Sell Hacked PayPal accounts Price - 30% of the current balance on the PayPal account High Profile Incidents of 1H2010 Between January and June 2010, there were many high profile threat incidents. The following threat incidents are those we believe had most impact on users and/or the security industry. 1 – The IE and other Zero Day Attacks7 In January, spammed emails loaded with malware files were sent to users and malicious sites were been found to contain hidden JavaScript malware that took advantage of a zero-day vulnerability exploit in Internet Explorer. All versions of Internet Explorer (except v5.01) were affected and the exploit was known to send backdoor Trojans to affected systems. Once executed, these malicious backdoor files stole information which was sent to a remote user. This zeroday vulnerability was subsequently reprogrammed to avoid a security feature in Internet Explorer – forcing Microsoft to release an out-of-band patch (Microsoft Security Bulletin MS10-002) on 21 January. Some reports also suggest that cybercriminals are also launching attacks using recent vulnerabilities found in Adobe Reader and Acrobat. Independent researchers surmised that about 34 companies were affected by what was been described as a “highly sophisticated and targeted attack.” This situation is in line with the Trend Micro prediction that there would be “No global outbreaks, but localized and targeted attacks”. 2 – ZeuS, ZBOT and Kneber ZeuS, Kneber and ZBOT all relate to the notorious ZeuS crimeware. In February, Kneber hit the headlines and shone a spotlight on ZeuS, an established toolkit known to be leveraged by many other threats, it is one of the most dangerous threats online. ZeuS is often mistakenly referred to as a botnet – in fact, ZeuS is made up of many, many small botnets, all linked by their use of the same crimeware. ZeuS may arrive as an attachment or link in a spammed message or be unknowingly downloaded via compromised websites. Most ZeuS botnets target bank-related websites, however, in the first 6 months of 2010, Trend Micro monitored activity including: 7 12 http://threatinfo.trendmicro.com/vinfo/web_attacks/Zero-Day_Internet Explorer_Bug_Downloads_HYDRAQ.html • • • Spam targeting government agencies Phishing attacks that target AIM users ZBOT variants that target the social networking site Facebook In order to defraud victims, the criminals behind this threat generate a list of bank-related websites or financial institutions from which they steal user names, passwords and other sensitive banking information. They harvest credentials such as those used for online shopping, online payment and FTP, and insert extra form elements to legitimate pages (eg. Online banking) that ask for additional information such as PIN numbers. TrendLabs published a comprehensive insight into ZeuS in March 2010 – ZeuS a Persistent Criminal Enterprise8. 3 - Mariposa Botnet Uses Mariposa, “butterfly” in Spanish, refers to a network of 13 million compromised systems in more than 190 countries worldwide that is managed by a single command-andcontrol (C&C) server in Spain. This botnet has been dubbed as one of the biggest networks of zombie PCs in cyberspace alongside the SDBOT IRC, DOWNAD/ Conficker, and ZeuS botnets. The Mariposa botnet was in existence as early as December 2008, and rose to fame in May 2009. However, in March 2010 came its shutdown and the subsequent arrest of three of its main perpetrators. Typically, botnets carry with them binaries or malicious files that their perpetrators use for various purposes. At the time its notoriety was growing, Trend Micro threat analysts found WORM_AUTORUN.ZRO, a worm retrieved from compromised systems that were found to be part of the Mariposa botnet. This worm has the ability to spread via instant-messaging (IM) applications, peerto-peer (P2P) networks, and removable drives. Some binaries were also capable of spreading by exploiting a vulnerability in Internet Explorer (IE). Just like any other botnet, Dias de Pesadilla (DDP), aka the Nightmare Days Team, used Mariposa to make money. The botnet was being used to steal information such as credit card numbers, bank account details, user names and passwords to social-networking sites, and important files found on affected systems’ hard drives, which cybercriminals may use in a number of ways. Experts also found that DDP stole money directly from banks using money mules in the United States and Canada. Further digging into Mariposa’s business model revealed that its administrators also offered underground services to potential clients. Some of these services included hacking servers to take control, encrypting bots to make them invisible to security applications, and creating anonymous VPN connections to administer bots. More than 200 binaries of the Mariposa botnet have been found in the wild. Among these, users should be most wary of information stealers that compromise not just banking information but also a user’s identity. 4 - Shanghai World Expo as Bait in Cyber Attack At the end of March/beginning April 2010, TrendLabs identified a new attack, using a previously known Adobe exploit. In the attack, emailed messages, purportedly coming from Bureau of Shanghai World Expo, asked recipients to open a file attached to the message, and to update their submitted registration forms. There were indications that the attack was intentionally targeted toward Western journalists in Asia. It is unclear how the details of persons registered to attend the Expo were accessed by the criminals, however it’s worth noting that the World Expo website stated that it expected around 70 million attendee’s to the event this year9. The attachment within the spammed message was a .PDF file that took advantage of a known vulnerability (patched by Adobe in February 2010) in Adobe Acrobat and Reader (CVE-2010-0188). Once successfully exploited, the .PDF file dropped a backdoor program onto the affected system, which in turn enabled attackers to gain full control of a victim’s machine. The method used to exploit this vulnerability, on this occasion, differed from that used previously. Trend Micro researchers identified that the .PDF files had an embedded malicious .TIFF file. This embedded .TIFF file, when processed by vulnerable Adobe products, triggered the vulnerability and the execution of arbitrary code. In this attack, system information such as Computer name, CPU information, OS version, and IP address of the affected system was stolen and sent to a remote server. http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/ zeusapersistentcriminalenterprise.pdf 8 http://threatinfo.trendmicro.com/vinfo/web_attacks/Shanghai_Expo_Spam_Carries_ Backdoor.html 9 13 5 - New, Shortened URLs in IM Spam, Now result in KOOBFACE Malware Cybercriminals are very adept at employing new techniques in order to trick and infect more users. In the middle of April this year, TrendLabs identified attacks of spam over IM, using shortened URL’s for their misdemeanor. The twist to this story is a relationship between spam over IM, BUZUS and KOOBFACE. Most users of instant messenger applications have on various occasions seen attempts to dupe them into clicking on spam received over IM or strange friend requests. It seems the cybercriminals may have also realized that their past techniques may be becoming less effective, and TrendLabs has just recently discovered that these criminals are now using shortened URLs to spam malware. URL-shortening services are normally used to compress long and unreadable URLs into short, bite-sized ones. These short URLs are more portable, and are now generally preferred over the (normally long) actual URLs when sharing news within networks, blogs, Tweets, and other social media tools. URL-shortening services can be used to hide malicious links from view, thereby tricking users into clicking suspicious links. KOOBFACE is a notorious botnet that originally targeted innocent Facebook users. Since then, it has gone on to target other social networks, and so it is not surprising that the criminals behind the threat are looking to new avenues through which to extend their network of compromised machines. KOOBFACE causes so much consternation that TrendLabs has published 3 separate research reports on the subject10. A few of the methods they use are listed below: • • • • Stealing from users directly by convincing them to download, install, and then pay for fake software. Infecting users through malicious links placed in search results – poisoned search results are otherwise known as Black Hat SEO. Delivering a payload of malicious routines or installers that leave additional malware on the infected system. Using social engineering sites such as Twitter, to trick users Unlike most threats, FAKEAV software displays a visual element to the targeted user. This comes in the form of fake user interfaces that universally claim that the system has been infected. Interestingly, FAKEAV has also become localized, with the same “tool” being found in multiple languages, as can be seen in the following screenshot: 6 – FAKEAV, the standard revenue generator11 Throughout the first six months of 2010, FAKEAV (or Rogue Antivirus) continued to be used by cybercriminals as a key revenue generator. Programs designed to look professional, even to the point of offering telephone support services, have been maliciously pushed to innocent users under the pretence of infection and vulnerability. FAKEAV leverages social engineering to capture users’ attention and make threats believable. Cybercriminals use multiple vectors to deliver their threats. 10 http://us.trendmicro.com/us/trendwatch/research-and-analysis/whitepapers-andarticles/index.html http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/ threatbrief_final.pdf 11 14 Vulnerabilities The scale of this threat has been documented independently. A paper presented at the Ninth Workshop on the Economics of Information Security delved into the online adult industry, but also profiled whether users were running browsers that contained vulnerable plug-ins. Their study12 concluded that a staggering 88.28 percent of users were vulnerable, a sobering number by any reckoning. With these threats in mind, the following looks at key vulnerability statistics related to the first half of 2010. The Trend Micro Threat Encyclopedia14 includes a Security Advisory section in which details of all covered vulnerabilities can be found. Vulnerability Statistics Publicly-known vulnerabilities are commonly referenced by the Common Vulnerabilities and Exposures (CVE) system, which assigns a unique identifier to each vulnerability. In the first half of 2010, a total of 2,552 CVEs were published. This number is slightly below the similar number for the first half of 2009, where a total of 3,086 CVEs were published. However, it should be noted that this does not mean that the vulnerability threat is lessening. Not all vulnerabilities receive a CVE; many vulnerabilities that are privately reported to vendors are not included in the system. 2010 2,500 2,000 1,500 1,000 500 0 CVEs By vendor, Apple had the most CVEs issued in the first half of the year: CVEs 200 Redhat FreeBSD PHP Apache HP Novell Linux Mozilla IBM Sun Cisco CVEs Oracle 180 160 140 120 100 80 60 40 20 0 Adobe Trend Micro receives information about vulnerabilities both publicly and privately. Private vulnerability information is received both from vendors (such as Microsoft), third-party groups such as TippingPoint’s ZeroDay Initiative12, and from the cybercriminal underground. 2009 Apple In addition, servers are coming under increasing fire as well. Assuming well-established server management procedures are in place, vulnerabilities become the best means of trying to execute malware on servers. While this may be more difficult than compromising a single user system, the potential reward is consequently greater as well. 3,500 3,000 Microsoft Vulnerabilities in applications have always been a part of the security landscape, but recent developments towards the Web have made these even more significant. For end users, vulnerabilities have facilitated “drive-by” threats, where all that is necessary to become infected by malware is to visit a website. The website need not be malicious; it may be compromised (via malicious advertisements, or the addition of iframes or Javascript code). This poses a large problem that is not easy to mitigate. While some vendors receive a significant amount of press attention for vulnerabilities, this chart serves as a reminder that the vulnerability threat is far more multipronged than just patching Windows or updating Flash and Acrobat/Reader. In addition, some of the vendors with large numbers of vulnerabilities focus on enterprise software, with correspondingly longer patch cycles that potentially leave users at risk. In addition, the presentation of vulnerability information to the general public leaves much to be desired. While some vendors present vulnerability information publicly in well-organized bulletins, others do so in a more ad hoc manner or hide the information behind paywalls on their websites. This makes proper threat assessment on the part of users–both enterprise and consumer–much more difficult. The overall scale of the threat posed by vulnerabilities and exploits is clearly visible when looking at the number of TROJ_PIDIEF malware seen by Trend Micro in the first half of the year. The PIDIEF malware family is specifically made up of malware that arrives as PDF files, which exploit vulnerabilities in the Acrobat family of products. In the first half of the year, a total of 666 new detection names were added to Trend Micro products. Each detection name represents multiple in-the-wild variants, resulting in a total number of new PDF threats numbering into the thousands – in only six months. http://www.zerodayinitiative.com/ 12 http://weis2010.econinfosec.org/papers/session2/weis2010_wondracek.pdf 13 http://threatinfo.trendmicro.com/vinfo/default.asp?page=1§=SA 14 15 Trend Micro Technology and Protection Smart Protection Network The Trend Micro™ Smart Protection Network™ infrastructure delivers advanced protection from the cloud, blocking threats in real-time before they reach you. By continuously processing the threat intelligence gathered through its extensive global network of honeypots, customers and partners, Trend Micro delivers automatic protection against the latest threats and provides “better together” security, much like an automated neighborhood watch that involves the community in protection of others. Because the threat information gathered is based on the reputation of the communication source, not on the content of the specific communication, the privacy of a customer’s personal or business information is always protected. Trend Micro Smart Protection Network uses patentpending “in-the-cloud correlation technology” with behaviour analysis to correlate combinations of web, email and file threat activities to determine if they are malicious. By correlating the different components of a threat and continuously updating its threat databases, Trend Micro has the distinct advantage of being able to respond in real time, providing immediate and automatic protection from email, file and Web threats. Another key component of the Trend Micro Smart Protection Network is integrated Smart feedback that provides continuous communication between Trend Micro products as well as the company’s 24/7 threat research centers and technologies in a two-way update stream. Each new threat identified via a single customer’s routine reputation check, for example, automatically updates all of Trend Micro’s threat databases around the world, blocking any subsequent customer encounters of a given threat. Further information and benchmarks for Trend Micro Smart Protection Network can be found in the Core Technologies area of TrendWatch15. Solutions and Services Trend Micro™ Enterprise Security Trend Micro Enterprise Security is a tightly integrated offering of content security products, services, and solutions that take full advantage of the Trend Micro Smart Protection Network™. Optimized to deliver immediate protection, Trend Micro Enterprise Security also dramatically reduces the cost and complexity of security management. For further information about Trend Micro Enterprise Security, visit the Enterprise section of trendmicro.com16 Trend Micro SecureCloud™ Now available as a Beta release for early adopters of cloud computing17, Trend Micro SecureCloud is a hosted key-management and data-encryption solution designed to protect and control confidential information that you deploy into public and private cloud-computing environments. Trend Micro Worry-Free Business Security Designed specifically to fit the needs of small businesses, Worry-Free Business Security protects your computers wherever they’re connected—in the office, at home or on the road. Powered by the Trend Micro Smart Protection Network, threats are detected faster to keep your data safe and your protection constantly updated. Further details and the benefits of Trend Micro Worry-Free Business Security can be found on the Small Business section of trendmicro.com18. Trend Micro Titanium Combining easy-to-use security with cloud-client technologies Trend Micro Titanium blocks threats such as infected websites, phishing attacks, viruses and spyware before they can reach a users’ computer. State-of-the-art protection for users’ data is delivered while ensuring that computer performance is not impacted. Details of the Trend Micro Titanium product line can be found at www.trendmicro.com/titanium. http://us.trendmicro.com/us/trendwatch/core-technologies/index.html 15 http://us.trendmicro.com/us/home/enterprise/ 16 http://trendmicro.mediaroom.com/index.php?s=43&news_ item=830&type=current&year=0) 17 http://us.trendmicro.com/us/home/small-business/ 18 16 Advice for Businesses Adopting Cloud Strategies Advice for Businesses In March 2010 the Cloud Security Alliance (CSA) published “Top Threats to Cloud Computing V 1.0”19 to help organizations better understand the risks of cloud computing and to consequently make more informed risk management decisions when adopting cloud strategies. Use effective solutions to protect your business. • To protect your company network, deploy solutions that use cloud-based protection. Technology such as the Trend Micro Smart Protection Network combines Internet-based (“in-the-cloud”) technologies with lighter-weight, clients to help businesses close the infection window and respond in real time before threats can even reach a user’s PC or compromise an entire network. By checking URLs, emails, and files against continuously updated and correlated threat databases in the cloud, customers always have immediate access to the latest protection wherever they connect. With the right approach and security solutions the public cloud can be just as secure as a typical traditional corporate data centre. We recommend that organizations provide their own layers of security in addition to that which is afforded by cloud providers. 1. E ncrypt all sensitive data – the information that is exclusive to, and owned by, your organization. The operating system and applications are less important here – typically in the cloud they are standard images that are simply recycled back to a master image on shutdown. It’s the information proprietary to you, or that you have collected from customers and business partners, which you generally have a legal obligation to protect. 2. E nsure that your Firewall, IPS, and IDS protect each of your virtual machines separately. Particularly in a Public Cloud environment the other virtual machines running on the same physical hardware as you should be considered hostile. The firewall at the cloud providers’ perimeter can’t help you here. 3. O nly decrypt your data within that secure container you’ve established for your virtual machine. Be sure you check for tampering and data stealing malware before decrypting your data. 4. M ake sure that you are in control of the encryption keys – it’s your data! • P hishing poses a significant threat for organizations. Phishing sites can compromise your brand and/or your company’s image as well as your ability to keep your customers’ confidence while conducting business over the Internet. Protect your employees and customers by procuring all brand-related and look-alike domain names. • S tay ahead of the threats by reading security-related blogs and related information pages (i.e., Threat Encyclopedia21, Cloud Security Blog22, TrendLabs Malware Blog23 and social networks such as Twitter24) which can help warn and educate users who might otherwise be drawn to web sites under false pretenses. • E ducate your employees about how cybercriminals lure victims to their schemes; make use of threat information provided on security vendor sites like TrendWatch. • T ry downloading tools such as the Trend Micro Threat Widget to help raise awareness Trend Micro offers two products – Deep Security™ and SecureCloud™ which when layered together can achieve the four recommendations above and counter the threats identified. Deep Security is available and already in widespread use and SecureCloud entered public beta over the summer following successful pilot trials20. 19 http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf http://trendmicro.mediaroom.com/index.php?s=43&news item=830&type=current&year=0 20 http://threatinfo.trendmicro.com/vinfo/default.asp?sect=SA 21 http://cloudsecurity.trendmicro.com/ 22 23 http://blog.trendmicro.com http://twitter.com/trendmicro 24 17 Safeguard your customers’ interests. • Standardize company communications and let your customers know about your email and website policies. This way, you can help your customers better identify legitimate messages. 18 A void sending “phishy”-looking email messages by following these guidelines: Do not request personal information through email. Personalize email when possible. Do not redirect to another domain from the URL provided to customers. Do not rely on pop-up windows for data collection, especially those with no address bars or navigational elements. Do not use instant messaging or chat with customers unless they initiate the communication. Be explicit in the detail of communications that require the immediate action or attention of recipients. Establish and implement effective IT usage guidelines. • Just as you would never leave your front door unlocked when you are not home, you must take the same precautions with your computer system to make sure your business is protected. Protecting your business requires you to educate yourself and your employees about safe cybersecurity practices. A comprehensive set of IT usage guidelines should focus on the following: Prevention. Identify solutions, policies, and procedures to reduce the risk of attacks. Resolution. In the event of a computer security breach, you should have plans and procedures in place to determine what resources you will use to remedy a threat. Restitution. Be prepared to address the repercussions of a security threat with your employees and customers to ensure that any loss of trust or business is minimal and short-lived. Top Tips for End Users Keep your personal computer current with the latest software updates and patches. • A pply the latest security updates and patches to your software programs and OSs and enable automatic updates where possible. Since cybercriminals typically take advantage of flaws in the software to plant malware on your PC, keeping your software current will minimize your exposure to vulnerabilities. Protect yourself and your personal computer. • If you receive an email requesting personal or confidential information, do not respond or provide this information via links or phone numbers in the email. Legitimate organizations such as credit card companies and banks will never request this information via email. • B eware of unexpected or strange-looking emails and instant messages (IMs) regardless of sender. Never open attachments or click links in these emails and IMs. If you trust the sender, scan the attachments before opening. Never provide personal information in your email or IM responses. • D o not provide personal information to unsolicited requests for information. • If it sounds too good to be true, it probably is. If you suspect an email is spam, delete it immediately. Reject all IMs from people whom you do not know. • W hen shopping, banking, or making other transactions online, make sure the website address contains an s as in https:// www.bank.com. You should also see a lock icon in the lower right area of your Web browser. Choose secure passwords. • Use a combination of letters, numbers, and symbols and avoid using your first and last names as your login name. • A void using the same password for all your login needs. Do not use the same password for your banking site that you use for your social networking sites. • Change your password every few months. • R egularly check your bank, credit, and debit card statements to ensure that all transactions are legitimate. • B eware of Web pages requiring software installation. Scan programs before executing them. Always read the end-user license agreement (EULA) and cancel if you notice other programs being downloaded in conjunction with the desired program. 19 About TrendLabs TrendLabs is a multinational research, development, and support center with an extensive regional presence committed to 24/7 threat surveillance, attack prevention, and timely and seamless solutions delivery. With more than 1,000-strong staff of threat experts and support engineers deployed round-the-clock at labs around the globe, TrendLabs enables Trend Micro to: • • • • • Continuously monitor the threat landscape across the globe Deliver real-time data to detect, preempt, and eliminate threats Research and analyze technologies to combat new threats Respond in real-time to targeted threats Help customers worldwide minimize damages, reduce costs, and ensure business continuity TrendLabs has facilities in the following 12 locations: • • • • • • • • • • • • Manila, Philippines (HQ) Arlington, TX, USA Cupertino, CA, USA Lake Forest, CA, USA Shanghai, China Sao Paulo, Brazil Cork, Ireland Paris, France Tokyo, Japan Taipei, Taiwan Marlow, United Kingdom Munich, Germany Note that these facilities can perform all or part of critical Trend Micro services such as technical support, malware analysis and solutions delivery. TrendLabs Locations About Trend Micro: Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch at www.trendmicro.com/go/ trendwatch to learn more about the latest threats. Trend Micro’s flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. Many of these solutions are powered by the Trend Micro™ Smart Protection Network™ infrastructure, a next-generation cloud-client innovation that combines sophisticated cloud-based reputation technology, feedback loops, and the expertise of TrendLabs(SM) researchers to deliver real-time protection from emerging threats. A transnational company, with headquarters in Tokyo, Trend Micro’s trusted security solutions are sold through its business partners worldwide. Please visit www.trendmicro.com.