IMCAFS

Home

trend technology security threats q3 2013

Posted by deaguero at 2020-03-20
all

The original AsiaInfo security was finally released on November 29, 2013 at 13:53:26, reading 1017

Published on November 29, 2013 13:53:26

Copyright notice: This is the original article of the blogger, following CC 4.0 by-sa copyright agreement. Please attach the original source link and this notice for reprint.

According to the third quarter of 2013 security threat report, we found that the web is still the most popular data theft attack carrier. The more Internet services and websites trusted by users are vulnerable to criminals' attacks, the more malware makers continue to use the reputation of legitimate websites and users' trust.

In the third quarter, about 25% of the malicious programs spread through the web were JS (script type files). It is still the main means for hackers or malicious network actors to insert scripts containing malicious code into website page code. These scripts will cause users to connect to other malicious websites and download other malicious programs, or the home page of IE browser is modified, etc. Generally, these scripts take advantage of various vulnerabilities (ie vulnerabilities, or other application vulnerabilities, system vulnerabilities) and users' bad online habits to perform other malicious acts.

Analysis of Web threat file types in the third quarter of 2013

In this quarter, trend technology intercepted 204250860 malicious URL addresses in China.

Generally, these scripts take advantage of various vulnerabilities (ie vulnerabilities, or other application vulnerabilities, system vulnerabilities) and users' bad online habits to conduct other malicious behaviors.

. exe is still a large proportion of Web threat file types, and enterprise users are advised to control some types of file downloads at the gateway.

 

The distribution of Web threat domain names in the third quarter of 2013

Q3 2013 TOP10 malicious URL

Ranking of malicious URLs in China blocked by WRS in Q3 2013

Web threat domain name in the third quarter

Distribution of malicious domain names in China in the third quarter of 2013

In the third quarter, the distribution of malware domain names in the top-level domains is shown in the figure above, among which 74.3% of the sites use. Com,. Net,. CN domain names. The number of malicious pages under. COM domain name is the largest.

Analysis of phishing objects of Web threat phishing websites in the third quarter of 2013

Phishing website counterfeiters in China in the third quarter of 2013

According to the data of phishing websites captured by trend technology in the third quarter of 2013, online payment websites, as well as financial and securities institutions, which can directly bring economic benefits to phishing website manufacturers, are still the most popular phishing targets for phishers. The phishing websites of bank online payment are also very lifelike and can't be defended.

Remind users to be careful when making any transactions on the Internet. Especially when shopping through Taobao, try not to click the URL in the chat window to enter the payment page.

Apple's new product launch has led to a proliferation of related phishing websites

      

Remind users to be careful when making any transactions on the Internet. Especially when shopping through Taobao, try not to click the URL in the chat window to enter the payment page.

Ranking of file types used by harpoon phishing emails in targeted attacks

 

In order to avoid the detection of security products and institutions, phishing websites block access to some addresses by blocking IP and other means, which makes it more difficult to detect phishing websites. It also shows that phishing websites tend to use spear attack and become more targeted.

For websites unable to identify malicious or not, you can go to the security query page of trend technology website to query:

http://global.sitesafety.trendmicro.com/index.php

Vulnerability attack threat in Q3 2013

           

Vulnerability detection in China in the third quarter of 2013

Vulnerability introduction link

Tip: a small method to confirm the successful installation of the patch. Start - run and enter CMD to enter the DOS interface. Enter systeminfo to check

Number of Botnet connections in the third quarter of the world

Our technical experts point out that nowadays hackers are trying to lead the victims directly into their traps, attack search results and web sites, so that they can achieve their goals more easily and effectively. Today's hybrid threats include not only legitimate websites under attack, but also making full use of users' trust in search engines and online interaction between users and their relatives and friends.

577 original articles published, 5 praised, 1.05 million visitors+