Malware Soars As Traditional Phishing Falters

Malware incidents rose by 89 percent in the last three months, while phishing saw a drop of 8 percent over the period, according to a report.

The period also saw an increasing number of large-scale domain hijackings, DNS exploits and other breaches of global targets, causing substantial downtime for companies’ online enterprises. “Zeus malware infection is also an on-going threat, especially with the reemergence of the Avalanche group and their fast flux hosting tactic,” said internet security company, Internet Identity (IID), in its third quarter eCrime Trends Report.

The reappearance of Avalanche is not a surprise and it is apparent that they are now providing their massive botnet as an infrastructure for hire, according to Rod Rasmussen, IID President and CTO. “Cybercriminals are always trying to adapt to the latest security methods and threat awareness, and as an industry we must stay one step ahead of these increasingly sophisticated cyber gangs,” he said in a statement.

Major players fight back

Facebook, Google and Microsoft are some of the global palyers who fought back hard against cyber-thugs this quarter. After the .tk top-level domain showed a 600 percent rise in phishing, Facebook joined the .tk registry, IID, and the Anti-Phishing Alliance of China (APAC) to secure the top-level domain and reduce phishing from that domain by 40 percent. Google de-indexed the entire second-level domain co.cc, a hive of fraudulent activity, blocking 11 million co.cc websites from appearing in its search engine results, while Microsoft took down the Kelihos botnet, a network of 41,000 private computers infected with malicious software capable of sending billions of spam emails per day.

Traditional phishing attacks occur when online fraudsters try to access personal data such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an online exchange, while malware is malicious software installed onto a computer, which enables cybercriminals to access and use that computer for criminal purposes.

The IID report was compiled using data from security and Internet infrastructure organisations including IID, ICANN (Internet Corporation for Assigned Names and Numbers) and APWG (Anti-Phishing Working Group.

Iris Cheerin

Recent Posts

Apple Announces Record Share Buyback, Amid iPhone Sales Decline

Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…

2 hours ago

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

18 hours ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

20 hours ago

LastPass Separates From Parent After Security Incidents

New chapter for LastPass as it becomes an independent company to focus on cybersecurity, after…

22 hours ago

US To Ban Huawei, ZTE From Certifying Wireless Kit

US FCC seeks to ban Chinese telecom firms at centre of national security concerns from…

1 day ago