H2 2008 E-Threats Landscape Report
H2 2008 E-Threats Landscape Report
Disclaimer
The information and data asserted in this document represent the current opin-
ion of BitDefender® on the topics addressed as of the date of publication. This
document and the information contained herein should not be interpreted in
any way as a BitDefender’s commitment or agreement of any kind.
Although every precaution has been taken in the preparation of this document,
the publisher, authors and contributors assume no responsibility for errors
and/or omissions. Nor is any liability assumed for damages resulting from the
use of the information contained herein. In addition, the information in this
document is subject to change without prior notice. BitDefender, the publisher,
authors and contributors cannot guarantee further related document issuance
or any possible post -release information.
This document and the data contained herein are for information purposes
only. BitDefender, the publisher, authors and contributors make no warranties,
express, implied, or statutory, as to the information stated in this document.
The document content may not be suitable for every situation. If professional
assistance is required, the services of a competent professional person should
be sought. Neither BitDefender, the document publishers, authors nor the con-
tributors shall be liable for damages arising here from.
The fact that an individual or organization, an individual or collective work, in-
cluding printed materials, electronic documents, websites, etc., are referred in
this document as a citation and/or source of current or further information does
not imply that BitDefender, the document publisher, authors or contributors en-
dorses the information or recommendations the individual, organization, inde-
pendent or collective work, including printed materials, electronic documents,
websites, etc. may provide. Readers should also be aware that BitDefender,
the document publisher, authors or contributors cannot guarantee the accuracy
of any information presented herein after the date of publication, including, but
not limited to World Wide Web addresses and Internet links listed in this docu-
ment which may have changed or disappeared between the time this work was
written and released and the moment it is read.
The readers are entirely responsible to comply with all applicable international
copyright laws arising from this document. Without limiting the rights under
copyright, no part of this document may be reproduced, stored in or introduced
into a retrieval system, or transmitted in any form or by any means (electronic,
mechanical, photocopying, recording, or otherwise), or for any purpose, without
the express written permission of BitDefender.
BitDefender may have patents, patent applications, trademarks, copyrights, or
other intellectual property rights covering subject matter in this document. Ex-
cept as expressly provided in any written license agreement from BitDefender,
this document does not provide any license to these patents, trademarks,
copyrights, or other intellectual property.
Copyright © 2008 BitDefender. All rights reserved.
All other product and company names mentioned herein are for identification
purposes only and are the property of, and may be trademarks of, their respec-
tive owners.
Viorel CANJA
Head of Antimalware Lab
Dragoş GAVRILUŢ
Malware Analyst
Daniel CHIPIRIŞTEANU
Malware Analyst
Vlad VÂLCEANU
Head of Antispam Research
Andra MILOIU
Spam Analyst
Alexandru-Cătălin COŞOI
Antispam Researcher
George PETRE
Spam Intelligence Researcher
Vincent HWANG
Global Director of Product Management
Matei-Răzvan STOICA
Communication Specialist
Răzvan LIVINTZ
Communication Specialist
Table of Contents
E-Threats Landscape Report • 2008’s Second Half ..................................................................... 1
Disclaimer........................................................................................................................................ 2
Authors & Contributors.................................................................................................................. 3
Table of Contents............................................................................................................................ 4
About This Report........................................................................................................................... 5
We Would Like to Hear from You .................................................................................................. 5
Second Half’s Spotlight E-Threats ................................................................................................ 6
Vulnerabilities, Exploits & Security Breaches ......................................................................................... 8
Attacks, Offensives & Malicious Strategies ............................................................................................. 8
Independence Day’s Malware Charge....................................................................................................................... 9
Malware Assault on US Troops in Iran .................................................................................................................... 11
29th E-Threats Olympiad in Beijing .......................................................................................................................... 12
FedEx® did not ship Trojan spyware!....................................................................................................................... 13
Plane Tickets’ Trojan Hijackers ............................................................................................................................... 14
Economic Crisis....................................................................................................................................................... 16
Malware ...................................................................................................................................................... 19
World Top 10 Malware Chart................................................................................................................................... 19
US’ Top 10 Malware Chart ...................................................................................................................................... 22
UK’s Top 10 Malware Chart .................................................................................................................................... 23
Dissemination methods ........................................................................................................................................... 23
E-mail Spam............................................................................................................................................... 25
Spam Media & Techniques ..................................................................................................................................... 25
Spam’s Content ....................................................................................................................................................... 29
“Spam Omelette” ..................................................................................................................................................... 34
Phishing, ID Abuse & Scams ................................................................................................................... 35
Olympic Scams........................................................................................................................................................ 37
Global Risk Breakdown ............................................................................................................................ 38
Predicting 2009’s E-Threats......................................................................................................... 40
BitDefender’s Keep You Safe Guidelines ................................................................................... 42
1
BitDefender defines e-threats as a general term that comprises, but is not limited to, any type of
exploit, malware, virus, worm, bot and botnet, Trojan, backdoor, rootkit, spyware, adware, gray-
ware, rogue security software, phishing, pharming, harvesting, e-mail spamming, etc.
2
See “Remotely Exploitable Vulnerability Found in Windows”, published 23 October 2008, in Mal-
wareCity, accessed last time 22 December 2008, http://www.malwarecity.com/blog/remotely-
exploitable-vulnerability-found-in-windows-243.html.
3
See “Microsoft Releases Out-of-cycle IE Patch – An Issue of Responsibility”, published 12 De-
cember 2008, in MalwareCity, accessed last time 22 December 2008,
http://www.malwarecity.com/blog/microsoft-releases-out-of-cycle-ie-patch-an-issue-of-
responsiblility-314.html.
2008’s Malware distribution via in- 4
See “DEBIAN”, published 03 June 2008, in MalwareCity, accessed last time 22 December 2008,
fected Web sites increased by 4.59 http://www.malwarecity.com/blog/debian-12.html.
times in the last six months. 5
See “BitDefender Protects Against Zero-Day Microsoft Word Bug”, published 11 July 2008, in
BitDefender, accessed last time 22 December 2008, http://news.bitdefender.com/NW778-en--
Source: BitDefender BitDefender-Protects-Against-Zero-Day-Microsoft-Word-Bug.html.
Antimalware Lab 6
See “Disclosure of Major New Web 'Clickjacking' Threat Gets Deferred”, published 17 September 2008,
in MalwareCity, accessed last time 22 December 2008, http://www.malwarecity.com/news/disclosure-of-
For the complete Top 10 list of 2008’s major-new-web-clickjacking-threat-gets-deferred-199.html.
second half most prolific infection 7
See “Attack code published for DNS flaw”, published 24 July 2008, in MalwareCity, accessed last time
mechanisms, see Dissemination
22 December 2008, http://www.malwarecity.com/news/attack-code-published-for-dns-flaw-134.html.
methods. 8
See “What Hides behind the Internet Traffic Conundrum”, published 07 November 2008, in Mal-
wareCity, accessed last time 22 December 2008, http://www.malwarecity.com/blog/what-hides-
behind-the-internet-traffic-conundrum-260.html.
3/4 of the Trojans already include complex updating mechanisms, stealth data
download and upload features, as well as spyware and rootkit capabilities.
The direct consequence is the increase of percentage that malicious Web sites
now hold. The end of 2008 finds World Wide Web malware disseminators in
the first position as infection tools, with 28.35 percent, compared to only 6.17%
in the first half.
Social engineering continued to revolve around behavioral vectors, such as en-
tertainment, curiosity, or empathy, as described in the examples below.
The only suspicious element was the e-mail address (probably automatically
generated) behind the sender’s name, which gave a hint about the malicious
nature of this message.
If followed, the hyperlink directed to a Web page displaying a fake video player
window and a message about one of the largest 4th of July fireworks shows, as
displayed in the image below:
When opened, the Web page automatically tried to run and install a remote access
Java Script with several layers of encrypted data – the Trojan.JS.Encrypted.A. This
Trojan uses an exploit to execute the encrypted shell code.
In addition, when the fake player window was clicked, the Web browser auto-
matically downloaded and installed a file called fireworks.exe (rather than play
a movie). This executable did not hold any compressed or self running multi-
media content, but just another virus – Trojan.PEED.JLV with its own malicious
multiplication and distribution mechanisms.
Once it penetrates a system, the Trojan copies itself in the OS folder and modi-
fies the Windows® Firewall settings. In addition, it registers the compromised
computer as a peer in its malware network and uses a randomly chosen port to
communicate with the other peers and update its peers’ list.
Peed searches all local disks for e-mail addresses and sends itself as the pre-
viously depicted spam, usually employing the host’s e-mail address. Some of
the possible Subject lines include: “Celebrate Independence”, “Independence
Day Fireworks”, “Amazing 2008 Fireworks”, “Home of the Brave”, etc.
The Web page hosting the piece of malware was simply yet efficiently de-
signed, with a top banner, a simple picture pretending to be a YouTube™
player and some text detailing the alleged US’ operations in Iran. This ap-
proach is being used on large scale, as the spammers rely on a catchy heading
and a link to the piece of malware in order to fuel users’ curiosity and trick them
into compromising their machines.
Upon clicking on either the „movie” or the top banner, the user started the
download process of a binary piece of malware, called iran_occupation.exe.
The file contained the same malicious code employed to infect the users with
the Storm Worm. On the social side, the spam wave targeted the increasingly
worried US citizens looking for fresh news on Iran threatening to burn Tel Aviv
down in response to possible US attacks on its nuclear facilities.
9
See "US Military Actions Used as Decoy to Spread Malware", published 10 July 2008, in BitDe-
fender, accessed last time 22 December 2008, http://news.bitdefender.com/NW772-en--US-
Military-Actions-Used-as-Decoy-to-Spread-Malware.html.
While preparing the download of an alleged movie – which was, in effect, the
disguised executable file name.avi.exe – the Trojan.FakeAlert.AAH sneaked
into the system two more files, corrupting the current wallpaper and displaying
a window that informed the user about a viral detection, as depicted in the im-
age below:
10
See “Beijing E-Threats Olympics: Gold for Spam, Silver for Scams and Bronze for Insecure Inter-
net Connections”, published 22 August 2008, in MalwareCity, accessed last time 22 December
2008, http://www.malwarecity.com/blog/beijing-e-threats-olympics-gold-for-spam-silver-for-scams-
and-bronze-for-insecure-internet-connections-173.html.
To eliminate the (fake) threats, the user was advised to install the “Best Anti-
virus for Windows XP or Vista”. This rogue software claimed to scan and detect
malware or other problems on the computer, while in effect attempted to dupe
the users into purchasing a program that does not keep the threats away, but
opens the door for even more malware.
The rogue this e-mail spam wave introduced via malicious or compromised
Web sites has been already used in other previous spamming campaigns, rely-
ing on different ‘hooks’, like Angelina Jolie’s nude movies, Barack Obama’s
presidential campaign or alleged attacks by U.S. troops in Iran.
However, the attached archive did not hold the purported invoice, but an ex-
tremely dangerous piece of malware, known as Trojan.Spy.ZBot or one of its
many variants, such as Trojan.Spy.Wsnpoem.HA.
This malware was specially engineered to steal sensitive e-banking data. Once
it penetrates a system, it installs in Windows\System32 directory, where it
stores the ntos.exe file and creates the rootkit-hidden wsnpoem folder that it
populates with the encrypted audio.dll and video.dll files (in effect, the two so-
called “DLLs” are used for configuration and storage purposes). It also creates
a registry entry that enables its automatic launch each time Microsoft® Win-
dows® starts up. To harvest the sensitive e-banking details, it injects code into
winlogon.exe and iexplorer.exe processes and downloads one or several files
from a remote server. It employs these files to store the data it gathers by
monitoring the Web browser activity.
11 ® ®
See “BitDefender Uncovers FedEx Spyware”, published 27 August 2008, in MalwareCity, ac-
cessed last time 22 December 2008, http://www.malwarecity.com/news/bitdefender-uncovers-
fedex-spyware-178.html.
“ZBot and its family have an increased damage potential, as they are able to
deactivate the firewall, steal sensitive financial data (such as credit card and
account numbers, as well as login details), make screen shots and create logs
of current working sessions. In addition, it is capable of downloading supple-
mental components and providing a remote e-criminal with the means to ac-
cess the compromised system. Hence, we strongly recommend you not to
open these e-mails and their attachments and to install and activate a reliable
antimalware, firewall and spam filter solution.” said Sorin Dudea, Head of Bit-
Defender Antimalware Research.
With tropical destinations almost out of the picture, but school and work days
approaching at the supersonic speed, probably the same authors behind the
summer spam wave edition thought to give it another try.
12
See "Malware Nets Major U.S. Air Carriers", published 17 September 2008, in BitDefender, ac-
cessed last time 22 December 2008, http://news.bitdefender.com/NW830-en--Malware-Nets-Major-
U.S.-Air-Carriers.html.
Instead of hot July’s JetBlue Airways spoofed identity, autumn brought in the
spotlight other US air companies, such as Delta Air Lines, Virgin America, United
Airlines, Continental Airlines, but also Southwest Airlines, Northwest Airlines,
Midwest Airlines, as well as other operators including cardinal points within their
names. Some counterfeit messages were sent on behalf of operators with a
more exotic resonance: Sun Country Airlines, Spirit Airlines, Allegiant Air, Fron-
tier Airlines, AirTran Airlines, Hawaiian Airlines and Alaska Airlines.
The featured malware included: Trojan.Spy.Zbot.KJ, Trojan.Spy.Wsnpoem.HA
but also the “challenger” Trojan.Injector.CH.
All of them have rootkit components that help them to install and hide them-
selves on the compromised machine either in the Windows or Program Files di-
rectory. They inject code in several processes and add exceptions to the Micro-
soft® Windows® Firewall, providing backdoor capabilities. They all send sensitive
information and listen on several ports for possible commands from the remote
attacker. The Trojans also attempt to connect and download files from servers
with domain names apparently registered in the Russian Federation.
“The Trojans this new malware distribution campaign delivered and the high rate
of infections proved once again not just the cybercriminals ingenuity, but also the
lack of interest the users show in terms of systems’ defense and sensitive data
protection.” said Sorin Dudea, Head of BitDefender Antimalware Research.
Economic Crisis
Probably the most lucrative attacks were those exploiting the current reces-
sion.13 The initial mid-September collapse of major banks and insurance com-
panies foretold not only the upcoming depression, but it was also an obvious
sign for the increased spamming activities that followed. Speculating the gen-
eral concern, which early October turned into global panic as stock markets
around the world crashed, spammers tried to lure recipients by promoting ser-
vices that claimed to eliminate or leverage debts, mortgages, and other fiscal
or loan obligations.
A large spam wave targeting US residents advertised the services of a com-
pany that allegedly offered help to stop home foreclosures. As depicted below,
the message bet on the latest bailout plan announced by President Bush.
13
See “World Financial Crisis Increases Spam Productivity”, published 29 October 2008, in Mal-
wareCity, accessed last time 22 December 2008, http://www.malwarecity.com/blog/world-financial-
crisis-increases-spam-productivity-248.html.
Other spam waves used the economic crisis as a simple decoy for advertising
drugs, pirated software or replicas. The message below, for instance, promoted
the global depression’s antidote – a drug for sexual life improvement.
Finally, one of the most recent spam attempts relied on a multiple combination
of automatically generated and distributed junk e-mails and social networking
profiles. Their purpose was to direct the recipients to Web sites where they al-
legedly could “leave debt behind”.
Malware
This section details the main features and trends concerning malware and mal-
ware dissemination throughout the second half of 2008. The topics here include:
• World Top 10 Malware Chart
• US’ Top 10 Malware Chart
• UK’s Top 10 Malware Chart
• Dissemination methods
Source: BitDefender
Antimalware Lab
In the second half of 2008, Trojan.Clicker.CM continues to hold the top posi-
tion, with its 6.50% (compared to 8.10 percent in the first half) of the infected
computers worldwide. This Trojan displays a significant number of commercial
pop-up windows in the current Web browser’s background instance, trying to
determine the user to click and thus generate profit for advertisements regis-
tered within a pay-per-click system.
Trojan.Exploit.JS.O ranks the second, with 3.54%. This JavaScript allows an
attacker to compromise the system security via ActiveX® or Adobe® Flash®
Player flaws.
Trojan.Exploit.SSX places the third, with 3.34 percent. This malware abuses
vulnerable sites after malicious SQL code injections into their databases. The
result is an invisible iFrame element that redirects the user to an infected Web
site that attempts to download and install several malicious payloads
Trojan.Downloader.Wimad.A, and its 3.26 percent, places fourth, while
Trojan.Downloader.WMA.Wimad.N falls three positions and ends up in De-
cember on the fifth place, being responsible for the infection of 3.14% of sys-
tems (compared to 3.21 percent at the end of the first semester). Usually dis-
tributed via e-mail spam campaigns as a 3.5 MB .wma attachment bearing the
name of some popular artist, the disguised Trojan automatically opens the Web
browser in order to retrieve the “appropriate” codec, which is, in effect, another
piece of adware – Adware.PlayMp3z.A.
Dissemination methods
Although the first 5 malware dissemination methods hold the same distribution
categories, there is a significant difference in terms of percentage and positions
compared to the previous semester.
The last six months of 2008 revealed that malware authors preferred the infected
Web sites as the main distribution channel. Thus, 28.36% of malware reached
users worldwide via Web, compared to only 6.17% in the previous half.
The second position goes to exploits and vulnerabilities, which represent a con-
stant, with their 24.63% (compared to their 30.86 percent in the first semester).
Downloaders also lost ten percent down to 10.45 (20.98% in H1), placing
themselves in the third position.
Social engineering gained almost two percent, up to 8.95 (compared to 7.40%
in the first semester), as a direct consequence of Web 2.0-related e-crime rein-
forcement.
The fifth place goes to bundle and third-party applications, which now hold 7.46
percent, compared to 11.11% in the first six months of 2008.
On the sixth position, file sharing reaches 6.72% - multiplying its percentage by
5.46 times, compared to the first half (when it held only 1.23%).
Autorun infectors set on the seventh place, with 5.22%, after the initial mid-year
percentage of 4.93, while the packers’ category scores 4.48% and ends up on
the eighth position.
Worms and file infectors lost one position and 0.72 percent, ending the year on
the ninth position, just like the e-mail spam, which felt on the last place, with its
0.75%.
The Top 10 list for the first half of 2008’s most prolific dissemination methods
holds:
Source: BitDefender
Antimalware Lab
“End of the year’s malware chart illustrates a significant change with a dou-
ble meaning. On one hand malware creators focused more on Web-
distributed e-threats. On the other hand, the increased number of infected
sites and compromised systems worldwide demonstrates not only the crea-
tivity and efficiency of e-criminals, but also the lack of awareness among
Web surfers. Probably the key factor in preventing security breaches and in-
fections and defending systems should be a better understanding of this
complex phenomenon and a stronger attentiveness on the user's side.” af-
firmed Viorel Canja, Head of BitDefender Antimalware Lab.
Source: BitDefender
Antimalware Lab
E-mail Spam
This section investigates the main features and trends concerning e-mail spam
throughout the second half of 2008. The topics here include:
• Spam Media & Techniques
• Spam’s Content
• “Spam Omelette”
Spam Evolution
100%
90%
80%
70%
E-mail Messages
60%
50%
40%
30%
Legitimate e-mail
20% Other types of spam
10% Attachment spam
Image spam
0% Text spam
Source: BitDefender 2005 2005 2006 2006 2007 2007 2008 2008
Antispam Lab H1 H2 H1 H2 H1 H2 H1 H2
Year
Another interesting trend in the second semester represented the increasing use of
spam delivery confirmation mechanism15. The third quarter of 2008 was placed
under the auspices of several such spam campaigns.
The first technique sought to exploit a common feature in most e-mail clients –
read receipts or notifications. Under normal circumstances, a read receipt confirms
the user has received and read the message. When related to bulk mail, a read re-
ceipt proves that the user’s e-mail address is valid and active.
14
See “When spam metamorphoses into literature…”, published 08 October 2008, in MalwareCity,
accessed last time 22 December 2008, http://www.malwarecity.com/blog/when-spam-
metamorphoses-into-literature-218.html.
15
See “The Inbox-Killer Read Receipts’ Carousel”, published 03 October 2008, in MalwareCity, ac-
cessed last time 22 December 2008, http://www.malwarecity.com/blog/the-inbox-killer-read-
receipts-carousel-214.html.
If the user discovered the trick and did not send the read receipt, there was, how-
ever, a secondary layer of confirmation that spammers added: the reference to a
remotely stored image. E-mail clients traditionally block this type of content. To see
it, users should allow the image to load and thus to confirm they are reading the
message.
Last but not least, if the previous two confirmation schemes failed, the third layer
should have been effective, especially when the users realized they had been
duped and were not aware of the “classic” unsubscribe or opt-out scam. The al-
leged opt-out links did not unsubscribe the recipient from the mailing list, but con-
firmed that his or her address is fully functional and ready to get even more spam.
Spam’s Content
Throughout the second half of 2008, the percentage of various types of e-mail
spam content varied compared to the values of the first six months.
The percentage of pharmaceutical spam has dropped 2% in the last 6 months,
arriving at 49%. This fluctuation was produced by the increasing number in
Trojan spam.
In the last six months of 2008, the number of spam containing infected attach-
For examples of e-mail spam
ments or linking to a page where the user was asked to download a malicious pro-
leading to infected Web pages, gram, has augmented 400%, getting at 10% (from 2.5% in H1 2008). This variation
see Attacks, Offensives & Ma- occurred on the basis of the extending botnets. The attackers made use of impor-
licious Strategies. tant worldwide events as the Olympic Games or the elections in US in order to
reach their target.
The phishing attacks not only keep their ground in the top, but they have also
increased their numbers by 3%, probably following the same ascending trend
in 2009.
The spam selling replica watches dropped in favor of the remaining types of
spam, thus losing 2 percent.
Although for most businesses the global economical crisis brought a period of
recession, for the spam industry the present situation proved to attract increas-
ing profits. The spammers are already using the depression to their advantage
by increasing the number of loan messages.
The number of job employment spam runs has become more frequent, reach-
ing in the second semester 5 percent of total volume (compared to 3% in the
first half of 2008).
As in the first six months, the quantity of pirated software maintains its num-
bers, placing among the top 10 most popular contents, with 3.60 percent.
Dating scam e-mails have increased by 0.5% from the first half of 2008, reach-
ing at the end of December 3 percent. Along the way, new techniques were
employed such as getting in contact through social networks.
The figures for spam advertising pornography have decreased in the last six
months by three percent, reaching 2.90%. It is interesting that some of the Tro-
jan waves appealed to fake pornographic content in order to motivate the user
to access the infected Web sites and compromise systems’ security.
The frequency of gambling spam has increased this semester and stopped at
2.50 percent, surpassing diploma spam, which was the lowest entry in the pre-
vious chart.
The Top 10 list for the second half of 2008’s most advocated content through
e-mail spam includes:
Source: BitDefender
Antispam Lab
”Probably the most important variation in spam’s featured content chart is the
alarmingly increasing percentage of messages employed to spread or lead to
malware. The high amount of potentially hazardous bulk messages disseminat-
ing Trojans multiplied four times its volume, in close connection with the accel-
erated growth of Web-based e-threats.” added Vlad Vâlceanu, Head of BitDe-
fender Antispam Research Lab.
Source: BitDefender
Antispam Lab
“Spam Omelette”
BitDefender’s researchers analyzed a significant amount of spam messages in or-
der to create a visual map with the most frequently used words in bulk messages.
This map is intended to provide visual cues for the understanding of the new
trends in spamming, while providing significant insight to researchers on the cur-
rent spam waves.
The testing methodology is based on the analysis of approximately 7 million spam
messages collected through BitDefender's worldwide network of honeypots.
The Top 10 of the most employed words in e-mail spam16 counts:
1. Email
2. Please
3. Message
4. New
5. Click
6. Offer
7. License
8. Debts
9. Live
10. Marketing
16
See the latest issues of Spam omelette in “The Spam Omelette”, published 28 October 2008, in
MalwareCity, accessed last time 22 December 2008, http://www.malwarecity.com/blog/the-spam-
omelette-245.html; “The Spam Omelette #2”, published 04 November 2008, in MalwareCity, ac-
cessed last time 22 December 2008, http://www.malwarecity.com/blog/the-spam-omelette-2-
255.html; “The Spam Omelette #3”, published 11 November 2008, in MalwareCity, accessed last
time 22 December 2008, http://www.malwarecity.com/blog/the-spam-omelette-3-264.html; “The
Spam Omelette #4”, published 19 November 2008, in MalwareCity, accessed last time 22 Decem-
ber 2008, http://www.malwarecity.com/blog/the-spam-omelette-4-275.html; “The Spam Omelette
#5”, published 26 November 2008, in MalwareCity, accessed last time 22 December 2008,
http://www.malwarecity.com/blog/the-spam-omelette-5-284.html; “The Spam Omelette #6”, pub-
lished 11 December 2008, in MalwareCity, accessed last time 22 December 2008,
http://www.malwarecity.com/blog/the-spam-omelette-6-304.html.
The World’s Top 10 list of most counterfeit bank identities in the second half of
2008 includes:
1. Bank of America
2. Chase Bank
3. Citibank
4. HSBC
5. Halifax Bank
6. Royal Bank of Scotland
7. Regions Bank
8. Abbey
9. Wells Fargo
10. NatWest Bank
17
See "Facebook users, beware of the fake hubs!", published 17 October 2008, in BitDefender,
accessed last time 22 December 2008, http://news.bitdefender.com/NW856-en--Facebook-users-
beware-of-the-fake-hubs.html.
The fake Web site, which reproduced extremely well the genuine Facebook
hub, collected the log in credentials using a PHP script.
"Phishers usually exploit Web 2.0 applications to harvest e-mail addresses, re-
trieve other contact details stored in accounts or post spam messages or mal-
ware disguised behind banner advertising on the legit users’ profiles, channels
or groups." said Vlad Vâlceanu, Head of BitDefender Antispam Research Lab.
Olympic Scams
Beijing games will probably remain in the history of e-threats as one of the
most prolific events in terms of frauds. Due to its intriguing location, majestic
venues and the magnificent spectacle it promised, the 29th Olympiad was
heavily exploited by cybercriminals long before the opening ceremony.
IT Security Specialists and media warned the public about the imminent dan-
gers of e-scams. With flight operators filling their seats to China almost a year
ago, Beijing hotels fully booked since January and Olympic events’ admission
tickets sold out one month ahead of the August opening fireworks, it was no
wonder that e-crooks took advantage of the sport fans’ keen wish to cheer their
favorite athletes.
The two most notorious cases were beijing-tickets2008.com, closed July, 23rd,
and BeijingTiketing.com, shut down early August, after International Olympic
Committee’s and U.S. Olympic Committee’s official complaints.
The World’s Top 10 list of most malware receptive countries in the second half
of 2008 comprises:
Source: BitDefender
Antimalware Lab
Source: BitDefender
Antimalware Lab
“In the case of China, the increase of infections by 6.27 times in the last six
months should definitely be correlated with the major event that the Olympic
Games represented. Still, even without this special occasion, the particular fo-
cus malware creators and disseminators continue to show to China should
make the security industry more aware about this market’s particular require-
ments.” said Sorin Dudea, Head of BitDefender Antimalware Research.
18
Such as Sarbanes-Oxley, in the US, or Basel II and other relevant EU directives: The European
Union’s Financial Services Action Plan (FSAP), The 4th directive Annual Accounts of specific type
of companies (78/660/EEC), The 7th directive Consolidated accounts (83/349/EEC), The 8 th di-
rective of Company Law 1984 (84/253/EEC) and 2006 (2006/43/EC), The Consolidated Admis-
sions and Reporting directive (CARD) (2001/34/EC), The Transparency directive (2004/109/EC),
The Insider Dealing directive (1989/592/EEC) & The Market Abuse directive (2003/6/EC)
The present sensitive economic context will probably offer a prolific realm for
phishing activities, since many financial institutions will be involved in 2009 in
vast merges as well as restructuring processes.
In 2009, the malware production will most likely hold an ascending trend, ex-
ploiting the same Web based capabilities of Trojans, spyware and rootkits. The
end of 2008 already showed a 460% increase in Web-based infections and a
400% augmentation of e-mail spam distributing Trojans. It is certain that many
of the existing e-threat families will suffer significant upgrades and mutations, in
terms of stealth and automation spreading mechanisms.
2009 will also focus on exploiting applications vulnerabilities, via advanced in-
tegrated capabilities, as pointed out by one of the latest password stealing ap-
plications19 that BitDefender’s researchers identified early December. Dis-
guised as a Mozilla® Firefox® additional component,
Trojan.PWS.ChromeInject.A downloads onto the Firefox Plug-ins folder and
gets executed each time the user opens the browser. ChromeInject filters data
sent to over 100 online banking Web sites, which include: bankofamerica.com,
chase.com, halifax-online.co.uk, wachovia.com, paypal.com and e-gold.com.
E-mail spam distributing Trojans aug-
mented 400% in H2 2008.
The login credentials are sent to a Web address similar to [removed]eex.ru,
which could indicate the origin of this e-threat.
Source: BitDefender
Particular attention should be paid to the major growth of Web 2.0 sites and
Antispam Lab
their rapid development. The most targeted Web 2.0 applications in 2009 will
For the complete Top 10 list of 2008's remain the social networks, since most of them derive from the same building
second half most prolific infection pattern or algorithm. Although, apparently, there are several hundred billion
mechanisms, see Dissemination pages, channels or profiles, they can be reduced, in effect, to a single template
methods. that is multiplied and (slightly) customized.
For the complete Top 10 list of 2008's For instance, behind every blog from a blogging platform there is actually the
second half most advocated content same unique architecture (and its security flaws). The first effects appeared in
via e-mail spam, see Spam’s Content.
2005, when Worm.JS.Spacehero.A (also known as the Samy worm) paralyzed
in lest then 24 hours more than a million of MySpace™ users. The last months
brought into spotlight Win32.Worm.KoobFace.A, which affects both Facebook®
and MySpace™ users and proved once again that social networking Web sites
continues to be vulnerable. 2009 will see a rise of mutated or new worms seek-
ing to generate traffic on specific pages containing commercials or to steal
sensitive data, such as contacts lists or login credentials.
Last but not least, smart phones and other intelligent high-end devices with
permanent Internet access can be expected to be targeted in 2009 by the new
generations of mobile malware. OS’s and browsers’ vulnerabilities will continue
to be exploited in the months to come.
19
See “BitDefender Uncovers New Password Stealing Application”, published 03 December 2008,
in BitDefender, accessed last time 22 December 2008, http://news.bitdefender.com/NW900-en--
BitDefender-Uncovers-New-Password-Stealing-Application.html.
• when publishing your e-mail address, use a “munged” (intended alteration of)
e-mail address, such as myaddress[at]domainname[dot]com, instead of using
the @ and . signs.
• use at least two e-mail addresses. Create one e-mail account and use it for
your correspondence with people you know and a second e-mail account for
the websites forms requiring an e-mail address to allow content access.
• avoid typing sensitive personal information (such as user names and pass-
words, social security number, bank account or credit card numbers) from a
computer outside a secured network (like a public Internet Café) or not pro-
tected by a reliable security solution.
®
BitDefender is the creator of one of the industry’s fastest and most effective lines of internationally certified security software. Since our
inception in 2001, BitDefender has continued to raise the bar and set new standards in proactive threat prevention. Every day, BitDe-
fender protects tens of millions of home and corporate users across the globe – giving them the peace of mind of knowing that their
digital experiences are secure. BitDefender solutions are distributed by a global network of value added distribution and reseller part-
ners in more than 100 countries worldwide. For more details about BitDefender’s security solutions, please check www.bitdefender.com.