Jump to content

Recommended Posts

  • ExTS Admin
Posted

Attackers have always preyed on human behavior to distribute malware.

Either they target persons with lower technical skills or gullible users, in the vast majority of cases, it's always our fault when we get infected with malware.

 

In its annual Human Factor 2016 report, security firm Proofpoint detailed a few trends it noticed during the past year in terms of malware distribution across different platforms.

 

Attackers add social media campaigns to their distribution methods

 

http://img.photobucket.com/albums/v708/starbuck50/mobile-apps-and-social-media-join-email-as-malware-main-distribution-channel-501007-3_zpsgny7kxay.png

 

"Attackers moved from technical exploits to human exploitation in 2015," said Kevin Epstein, Vice President of Threat Operations for Proofpoint. "People’s natural curiosity and gullibility is now targeted at an unprecedented scale."

 

During the past year, attackers ditched overly complicated technical exploits and switched back to running high-volume campaigns, mainly through email, but also through social media and infected mobile apps.

 

Proofpoint says that, this past year alone, unsuspecting victims downloaded more than two billion mobile apps infected with data-stealing malware.

 

Even worse, Proofpoint adds that, in the case of 12,000 of these apps, they were hosted on authorized Android app stores, which users generally visited for the sole purpose of staying away from malware.

 

As for other threats, the company is also reporting that, in 74% of all email spam, the malicious payload was one of the multiple variants of the Dridex banking trojan.

 

Campaigns timed to arrive in the morning

 

To make sure their malicious payloads are opened, attackers also timed emails spam campaigns to arrive on the target's local timezone, between 9 and 10 AM.

 

http://img.photobucket.com/albums/v708/starbuck50/mobile-apps-and-social-media-join-email-as-malware-main-distribution-channel-501007-2_zpsfvsejf8g.png

 

http://img.photobucket.com/albums/v708/starbuck50/mobile-apps-and-social-media-join-email-as-malware-main-distribution-channel-501007-6_zpswwkitquk.png

 

Additionally, 74% of all links included in malicious email pointed to phishing sites, not downloadable malware.

Most of the times, these links led to file-sharing sites like Google Drive and Dropbox.

 

On social media, the percentage of phishing links is even bigger, ten times higher than links to downloadable malware.

 

Further, Proofpoint also saw a spike in CEO fraud (or Business Email Compromise) scams.

Attackers focused phishing campaigns and social engineering attacks on one or two persons inside a company, trying to trick them into wiring money to wrong accounts.

 

Since we read our fair share of security reports, most of Proofpoint's findings are in keeping with other studies from other security vendors.

 

http://img.photobucket.com/albums/v708/starbuck50/mobile-apps-and-social-media-join-email-as-malware-main-distribution-channel-501007-4_zpsptwameht.png

 

 

Source:

http://news.softpedia.com/news/mobile-apps-and-social-media-join-email-as-malware-main-distribution-channel-501007.shtml

Member of:

UNITE

  • Replies 0
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...