- Five Defensive Strategies
"Today’s Internet attacks are organized and designed to steal information and resources* from consumers and corporations. The web is now the primary route by which cybercriminals infect computers. Cybercriminals are planting malicious code on innocent websites. This code then simply lies in wait and silently infects visiting computers.
The scale of this global criminal operation has reached such proportions that Sophos discovers one new infected webpage every 4.5 seconds – 24 hours a day, 365 days a year. In addition, SophosLabs, our global network of threat analysis centers, is sent some 20,000 new samples of suspect code^ every single day.
2008 at a glance
- Biggest malware threats – SQL injection attacks against (legitimate) websites and the rise of scareware (aka "rogue" anti-malware programs)
- New web infections – one new infected webpage
discovered by Sophos every 4.5 seconds (24/7 x 365) - Malicious email attachments – five times more at the
end of 2008 than at the beginning - Spam-related webpages – one new webpage discovered
by Sophos every 15 seconds - New scareware websites – five identified every day
- Top malware-hosting country – US with 37 percent
- Top spam-relaying continent – Asia with 36.6 percent
- Amount of business email that is spam – 97 percent
Injection attack? By exploiting poorly secured legitimate websites hackers have been able to implant malicious code onto them, which then attempts to infect every visitor. One of the reasons the web is so popular is that legitimate websites can attract large numbers of visitors, all of whom are a potential victim.
(This as also known as "poisoning".)
Many well known organizations and brands have fallen victim to this kind of attack during 2008. Both large and small organizations have been targeted.
January 2008: Thousands of websites belonging to Fortune 500 companies, government agencies and schools/universities were infected with malicious code."
* read "money"
^ read "malware"
Folks, this is taken from a whitepaper titled "Security Threat Report 2009" and produced by the IT Security firm Sophos. Some of the emphasis is mine. You can download the document here.
I want to take a moment to thank them for publishing this, and saluting their effort to combat malware an the criminals behind it. In fact, let me go a step further and salute all you whitehats out there. Thank you.
What you can do
1: please read Top 10 things you should do to your computer–updated. It is a checklist, and provides you with the How To's for a (more) secure computer, as well as providing links to important downloads.
2: enable an anti-phishing filter, which can help alert you to poisoned websites before you go there. All modern browsers have a filter built in, and all you have to do is turn it on; or, you can add a toolbar/plug-in such as McAfee's Site Advisor or the excellent WOT.
3: make sure ALL the programs on your computer are patched and up-to-date. The easiest and most effective way to do this (IMHO) is to download and install the PSI (Personal Software Inspector) from Secunia.
4: Never respond to e-mails asking for personal information. Legitimate businesses never contact you about "important issues" via e-mail.
5: Be PARANOID on the Internet. (Use common sense) Think someone can't trace back to you? Guess again; your browser reveals a wealth of information by default. Sound to good to be true? It is. There's no such thing as a "free iPod"... and, no. You did not win the Irish Lottery. Is looking at sexually explicit material simply irresistible? Go to one of those video rental shops that has a back room-- a malware infection can cost you all your data and/or several hundred dollars in cleanup.. and/or many hours of your time..
Folks, the Internet is not Disneyland. Most knowledgeable people refer to it is the "wild, wild, West" (a reference to sheer lawlessness) but I like a different analogy better.. think of it as going into the Big City, and going down to the docks/warehouse district, alone, and at night.
You can do it, but you best be careful.
Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix
Share this post : |
No comments:
Post a Comment