Monday, February 11, 2013

Hackers changes tactics spreading of viruses


According to experts, cyber criminals are increasingly using the legal resources to the mass audience.

Cisco introduced its annual report on cyberthreats, which experts said changing tactics hackers and user behavior.

According to the report, to date, most visitors are search engines, websites with video and social networking.

Given this trend among Internet users, cybercriminals are also trying to change the principles of attacks, targeting not pornographic, drug or gambling sites related to "gray" and "black" zones of the Internet, and more resources for the mass audience.

According to a report on the websites of online stores likely to be infected computers is 21 times higher than for downloading pirated software, and search engines are 27 times more dangerous sites with pornographic content. Also, when viewing the online advertising opportunity to "catch" the virus is increased 182 times.


"Attackers are actively adapt to the user's behavior and use new tools to spread malicious content. Thus, today, visit the site can legally carry even greater threat than visiting a site belonging to the "black" or "gray" zone of the Internet. Their network security strategy in the current environment must be built based on the fact that today the Internet there is no trusted website ", - said business consultant Cisco Security Alexey Lukatsky.

According to him, the most dangerous sites are so-called "dynamic content" that "loads the" information from other sources. For example, the functional icon "Like" social networking can be used by hackers to spread malicious content.

By clicking on this icon, to know exactly what will happen, you can not. Perhaps in your account in the social network affect what you like the content that you saw on the page you are viewing. And perhaps the fact that without your knowledge on your PC will be loaded with malicious code. In the case of web-counters, the attacker enough to break once a site that provides mechanisms for the collection of web-statistics, place instead of "counter" malicious program, and it will spread to all the sites that use the web-counter. Since these sites eventually spread malware and computer users who visit the site. And the traditional principles of "white" or "black" list of sites will not help, as the user visits the legitimate site, but the fact that it is loaded from malicious content, the traditional means of web-filtering is not fixed.

Experts also estimate that the most popular type of spread of viruses is their placement on the compromised resource accounting for 83.4% of infections. In second place was the spread of exploits for vulnerabilities in software - 9.8%. Completing the top three malware steals confidential information. They account for 3.4% of attacks.

According to the report, recently hackers often attacked mobile operating systems, adapting them for malware. Thus, in 2012 the number of attacks on mobile operating system Android has grown by 2577%.

Experts also note that the hackers changed the trend of the spread of viruses via spam messages.

So, now, if an e-mail does not contain malicious attachments, that does not mean that it is safe. According to statistics from Cisco, only 3% of the messages to spread the virus, contains an attachment.

The main source of spam in 2012, experts have called India. Despite the fact that Russia is not even in the top five countries with spam are increasingly malicious messages sent in Russian.

Learn more about the Cisco report here.

No comments:

Post a Comment