A look back at 2010 by researchers at Websense revealed that a mix of better tactics and black hat search engine optimisation (SEO) laid the foundation for a dramatic jump in malicious sites for the year.
In the “Websense 2010 Threat Report“, researchers had mostly bad news for users – the number of malicious sites increased 111.4 percent between 2009 and 2010. Nearly 80 percent of all malicious sites are compromised legitimate Websites, a statistic Websense senior manager of security research Patrik Runald called “a huge number”.
Search engine optimisation by attackers has not helped the situation. According to the company, Web users searching for breaking news have a 22.4 percent chance of being lured to a malicious site – more than those searching for adult content, who have a 21.8 percent chance.
“The earthquakes in Haiti and Chile, [actor] Corey Haim’s death, and the World Cup of Soccer [FIFA World Cup] were just a few examples of cleverly manipulated search engine results steering people to bogus links that rated higher than legitimate results,” according to the report. “Similar to what we found in 2009, the botnets behind these campaigns are being repurposed once the illegitimate campaign has been removed from the search engine results.”
“Many of the 2010 SEO attacks were blended in nature, with a second component consisting of rogue AV [antivirus],” the report continued. “Both approaches used bogus AV campaigns offering free health scans that identified fake infections. Upon notification of a fake virus, users were prompted to download a free “antivirus” software where a second scan asked them for their credit card information to remove the fake malware.”
Researchers said they expect to see more black hat SEOs combined with rogue antivirus and email containing data-stealing components in the coming 12 months. For 2010, shopping remained the leading topic of spam, compromising 12 percent. The next 10 percent contained “pump-and-dump” spam – where spammers buy shares in a little-known company, hype it up by email and, when the price starts to rise, sell the shares at a profit.
According to the report, the US was the number one country hosting crimeware and phishing sites in 2010.
“Stable servers and good Internet connections are two reasons,” Runald said. “While it is easy to think that a lot of the stolen data is sent to servers in eastern European or Asian countries, the fact is that the attackers need stable systems just like the rest of us. And the US is definitely up there in terms of stability, so it’s logical that it’s one of the most popular hosting countries. That doesn’t mean, of course, that the attackers are based in the US.”
To settle US federal and state claims over multiple data breaches, Marriott International agrees $52…
ByteDance's TikTok is laying off up to 500 employees as it moves to greater use…
In this episode, we uncover why most organisations aren’t ready to harness generative AI. We…
Mixed reactions as Elon Musk hypes $30,000 'self driving' robotaxi called Cybercab, as well as…
AMD unveils new AI and data centre chips as it seeks to improve challenge to…
AT&T and Verizon among US broadband providers reportedly hacked to target American government wiretapping platform
View Comments
Remember of course that Websense have a vested interest in reporting ever increasing dangers.
I’d trust an independent review far more.
Furthermore their alogorithms used to detect sites are of course confidential and are sometimes far too broad in identifying rogue sites.
Just this morning websense blocking access to a clients site – http://www.positiveactiongroup.org. The Websense website has steadily rejected my attempts to register and correct their view of that website.