Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

Security

Security Report Sees Malware Continued Growth


According to a just-released security report from IBM, the volume and sophistication of malware continues to increase, at least when comparing the first half of 2007 with the first half of 2006. To date in 2007, IBM Internet Security Systems (ISS) X-Force research and development has identified and analyzed more than 210,000 new malware samples, exceeding the total number of malware samples observed in 2006.

The report, entitled Cyber Attacks on the Rise: IBM X-Force 2007 Midyear Report states that Trojans (seemingly legitimate files that are actually malware) comprise the most voluminous category of malware so far in 2007, accounting for 28 percent of all malware, in contrast to 2006 when Downloaders was the most common category. A Downloader is a low-profile piece of malware that installs itself so that it can later download and install a more sophisticated malware agent.

The use of Web exploit obfuscation continues to rise in 2007 in an attempt to make it difficult for signature-based intrusion detection and prevention products to detect attacks. In 2006, X-Force data reported that approximately 50 percent of Web sites hosting exploit material designed to infect browsers were obfuscating, or camouflaging, their attack. In the first half of 2007, that number reached 80 percent.

An unexpected trend in the report is that, for the first time, spam message size decreased instead of continuing on a linear growth pattern. This decrease corresponds with a decrease in image-based spam. Since mid-2005, image-based spam has been one of the biggest anti-spam challenges, but in the first half of 2007, the percentage of image-based spam declined to the level of mid-2006, at just over 30 percent. At the end of 2006, image-based spam accounted for more than 40 percent of spam messages.

"The decrease in spam message size and image-based spam is a result of spammers adopting and experimenting with newer techniques, such as PDF- and Excel-based spam, as a means to more successfully evade detection by anti-spam technologies," said Kris Lamb, director of X-Force for IBM Internet Security Systems.

The X-Force report also discusses the several key security statistics for the first half of 2007, among others:

  • January has so far been the busiest month of the year for vulnerabilities, with 600 disclosures.
  • Spain has taken South Korea's place as the highest source of phishing e-mails, accounting for 17.9 percent of the worldwide volume.
  • The percentage of vulnerabilities that can be exploited remotely has grown in the first half of 2007 to 90 percent versus 88 percent in 2006.
  • The percentage of vulnerabilities that allow an attacker to gain access to the host after successful exploitation has also risen slightly to 51.6 percent from 50.6 percent in 2006.
  • Currently, about 10 percent of the Internet consists of unwanted content such as pornography, crime, adult or socially deviant material.

For the remainder of 2007 and into 2008, X-Force expects to observe a lack of exponential growth in vulnerabilities disclosed, the continued growth of targeted and boutique malware such as Trojans and a continued rise in obfuscation techniques for Web-based threats.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.