2009mliannualreport Final Printresolution
2009mliannualreport Final Printresolution
>PHISHING1
>SUBJECT: CONFIRM YOUR
>ONLINE ACCOUNT DETAILS
>SEXDATING1
>SUBJECT: PAISSIRA
>TEXT/HTML SPAM
>CUTWAIL
>INSTALLER TROJAN
>CIMUZ
>INFORMATION-STEALING TROJAN
>STORM
>MALWARE
>AKA: STORMWORM, NUWAR AND ZHELATIN
STORM is one of the names for the aggressively spreading malware also known as
STORMWORM, DORF, PEACOMM, NUWAR and ZHELATIN. It enabled the formation of one
of the largest botnets in history, once estimated at two million compromised computers
around the world.
>TT.PDF
>TARGETED TROJAN
>DEGREESDIPLOMA5
>SUBJECT: INTERESTED TO OBTAIN
BACHELORS’ DEGREES
>TEXT SPAM
>GHOST
>KEYLOGGER
Keyloggers are a particularly
dangerous type of security threat.
They save all keystrokes on that
computer to a file for later use.
Ghost is even more advanced as it
also saves screenshots and
addresses of websites visited. This
extra information can be used to
easily identify sites that passwords
belong to and then carry out
fraudulent activity using the
accounts.
>TODYNHO
>INFORMATION-STEALING TROJAN
>HUIGEZI
>TARGETED TROJAN
HUIGEZI is a targeted Trojan dropped via a PDF exploit. It spies on audio and
video communications, in addition to web, email, IM and others. It is most
commonly used for industrial espionage.
>PHISHING9
>SUBJECT: FOR YOUR SECUIRTY WE
>DEACTIVATED YOUR CARD ACCOUNT
Some phishes take the approach of claiming that the recipient’s bank account or credit card has
been suspended, ostensibly due to fraudulent activity. To unlock or reactivate the account, the
unsuspecting user is duped into entering their details giving them directly to the phisher.
MESSAGELABS INTELLIGENCE
CONTENTS
1. Executive Summary and Overview 5
2. At A Glance: 2009 in Review 6
3. Spam: Top Threats of 2009 7
3.1. Spam Summary 7
3.2. Brazen Botnets: Lessons Learned From McColo and the Botnet Evolution 7
3.3. How Events in 2009 and Celebrity News Shaped the Spam Landscape 13
3.4. Spam and the Importance of CAPTCHAs 16
3.5. Spam Tactics Including Free Services, Image Spam and Shortened URLs 17
3.6. The Language of Spam 23
3.7. Spam predictions for 2010 29
7. Conclusions 59
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
2. ATA A
2. AT GLANCE:
GLANCE: 20092009 IN REVIEW
IN REVIEW
73 million 5 million
Spam stopped Unique domains hosting malware
60 billion 30 thousand
Threat rates
2009 Email spam intercepted
Global spam rate Top 5 geographies Top 5 verticals By horizontal
107
84.0% 1001-1500
86.9% China 86.0% Retail 85.5% 1501-2.5K
2,465
4,000
New sites with 3,500
web viruses
/day 3,000
2,500
2,000
1,500
Nov
1,000
New sites with spyware 500
Jan Feb Mar Apr May Jun Jul Aug Sep Oct
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
86.9% China
86.3% Marketing/Media
86.0% Retail
84.9%
84.0% 1001-1500
501-1000
85.5% 1501-2500
Min February: 73.3% 86.2% Norway 85.8% Manufacturing 84.2% 2501+
Max May & June: 90.4% Top 5 Geographies Top 5 Verticals By Horizontal
84.1%
86.2% 87.7%
85.3% 81.2%
3.2. Brazen Botnets: Lessons Learned From McColo and the Botnet Evolu-
tion
By the end of 2009, 83.4% of spam originated from botnets, or “robot networks,” as
opposed to approximately 90% of spam that was sent from botnets in 2008. Botnets are
groups of semi-autonomous compromised computers that are all under the control of
cyber criminal organizations. Each botnet varies in size and may contain thousands, tens of
thousands, or even millions of computers that will receive instructions from command and
control channels. Botnets can be very flexible and are often used for a variety of criminal
activities, including distributed denial-of-service (DDoS) attacks, hosting websites and
sending spam emails.
Much of the remainder of spam not sent from botnets originated from compromised mail
servers and webmail accounts created using CAPTCHA-breaking tools.
The sharp drop in spam at the end of 2008 was a result of the widely reported demise of
California-based ISP, McColo in November 2008, after criminal botnet activity was reported
on its networks. In figure 1, it can be seen that after the demise of McColo, it took several
weeks for spam levels to rise again and months, before botnet controllers were able to
return to the same spam volumes as before the ISP was disconnected.
McColo disconnected
80% drop
20%
24 Jan
31 Jan
3 Jan
10 Jan
17 Jan
13 Dec
20 Dec
27 Dec
22 Nov
29 Nov
6 Dec
1 Nov
8 Nov
15 Nov
25 Oct
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
As a result of McColo’s shutdown, one major botnet, Srizbi, completely faded away. Srizbi
until November 2008 had been responsible for as much as 50% of all botnet-related spam.
This left a huge gap in the spam-sending botnet market, which was soon filled by other rival
botnets, including Mega-D (aka Ozdok), Cutwail (aka Pandex) and Rustock. Rustock already
had a large number of bots under its control, but its spam-sending activities had been more
irregular than some other botnets. New botnets came onto the scene in 2009, perhaps to
capitalize on the shift in supply and demand; spammers still wanted to send spam, but the
major botnet resources were simply not available.
By May 2009, spam levels were already exceeding the peaks experienced in 2008. The
dominant botnets at this time had evolved and were by now much more technically sophisti-
cated, harder to detect and less susceptible to disruption.
3.2.1. Harnessing The Power of Botnets
With approximately 89.5 billion unsolicited messages each day being distributed by
compromised computers, understanding who is responsible is always of interest as, much
like the threat landscape, the botnet landscape is ever changing.
Figure 2 highlights the current botnet landscape, outlining which botnets are responsible for
the most spam, or have the largest number of compromised computers under their power.
It is also worth noting that there are two newcomers to this table in 2009, notably Maazben
and Festi.
% of new spam/ spam / estimated
botnet spam new spam/day min bot/min botnet size Country of Infection
Rustock 19% 20,191,511,739 14,021,883 91 540k to 810k Brazil (21%), USA (9%), Poland (7%)
Cutwail 17% 18,417,396,993 12,789,859 59 1100k to 1600k Vietnam (17%), RepKorea(12%), Brazil (10%)
Bagle 16% 17,334,321,383 12,037,723 37 520k to 780k Brazil (12%), Spain (9%), USA (9%)
Bobax 14% 14,589,066,047 10,131,296 49 100k to 160k Spain (12%), Italy (7%), India (7%)
Grum 9% 9,687,625,087 6,727,517 307 580k to 860k Vietnam (18%), Russia (17%), Ukraine (8%)
Maazben 2% 2,161,829,037 1,501,270 93 240k to 360k Romania (17%), Brazil (11%), Saudi Arabia (7%)
Festi 1% 1,353,086,645 939,644 53 140k to 220k Vietnam (31%), India (11%), China (5%)
Mega-D 1% 996,079,588 691,722 46 50k to 70k Vietnam (14%), Brazil (11%), India (6%)
Xarvester 1% 885,682,360 615,057 155 20k to 36k Brazil (15%), Poland (11%), USA (10%)
Gheg 0% 436,044,470 302,809 22 50k to 70k Brazil (15%), Poland (8%), Vietnam (8%)
Unclassified Botnets 3% 2,994,054,378 2,079,204 65 120k to 180k
Other, smaller botnets 0% 439,986,486 305,546 47 130k to 190k
Total BotnetSpam 83% 89,486,684,212 62,143,531 85 3600k to 5400k Brazil (13%), Vietnam (7%), USA (6%)
Non-botnet spam 17% 17,827,092,771 12,379,926
Grand Total 100% 107,313,776,983 74,523,456
General
• The botnet responsible for sending the highest percentage of spam was Mega-D.
Shortly after the demise of McColo, Mega-D spam output peaked at 58.3% of
global spam on 1 January 2009. Next highest was Cutwail, which was linked to
46.5% of all spam on 14 May 2009. Third highest was Rustock, which generated
28.6% of global spam on 21 October 2009.
• During 2009, Bagle managed to quadruple the number of bots under its control as
well as its output, as it climbed into the top-3 most heavyweight botnets, based on
percentage of spam, by the end of the year.
Rustock
• Rustock climbed into the top spot at the end of 2009, but had been consistently
among the top 5 botnets based on the percentage of spam distributed throughout
2009. Rustock had frequently taken the approach to send spam at full capacity for
short periods, followed by longer periods of silence, often for days at a time.
• Between August and September 2009, Rustock had between 1.3 million to 2 million
active bots under its control.
• Rustock’s peak spam-sending period for 2009 was between October and November
2009. At that time, Rustock was sending almost three times as much spam per
minute than it had sent in January.
• Rustock had accounted for approximately 10-20% of all spam for much of the year,
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
but by the end of 2009 it had increased its dominance and stabilized its output to
approximately 18% of all spam.
• By the end of 2009, Rustock was mostly sending pharmaceutical and medical
spam.
Cutwail
• Cutwail was always listed in the top-3 spam-sending botnets throughout 2009, and
was comparable in size to Rustock. Both Cutwail and Rustock were unrivalled in
terms of their size.
• Cutwail had retained between 1 million to 1.5 million bots throughout the year.
Botnets frequently experience a turnover of bots over time, and in order to
maintain this level of control, Cutwail had been aggressive in its recruitment.
• Cutwail was linked to the surge in Bredolab malware, and frequently linked to
spoofed greetings card emails containing malicious hyperlinks.
• In 2009, Cutwail was frequently linked to phishing activities, and pharmaceutical
spam and spam touting counterfeit watches.
• Cutwail had its peak of spamming activity between April and June 2009, when it
had sent more than double the volume of spam of rival botnets and was linked
to 46.5% of all spam. By the end of the year, Cutwail had the 2nd largest output
behind Rustock, linked with approximately 17% of all spam.
Bagle
• Bagle has grown from between 100,000 and 200,000 bots in January 2009 to
between 600,000 and 800,000 bots by the end of the year. This represents a four-
fold growth in the number of bots under its control, consistent with its four-fold
increase in spam output over the same period.
• By the end of 2009, Bagle was responsible for approximately 16% of global spam,
just behind Cutwail and Rustock.
• Bagle was almost exclusively sending pharmaceutical or medical spam by the end
of 2009.
Bobax (aka Kraken)
• Bobax, like Bagle, has increased its output over 2009, barely registering in the top
10 botnets in January, and rising to 4th place by the end of the year. The number
of bots involved in sending spam did not increase significantly, with an estimated
80,000 to 120,000 bots, Bobax had increased the rate at which each bot was
sending spam.
• Compared with its output in January, Bobax was sending approximately 10-times
more spam by the end of the year and accounted for approximately 13% of spam,
behind Rustock, Cutwail and Bagle.
• By the end of 2009, Bobax had returned to its pre-McColo spam levels, taking
over a year to recover from the disruption. It was mostly sending spam relating to
counterfeit fashion accessories and watches.
Grum
• Grum had steadily increased its output during 2009, with its busiest period be-
tween June and September, when it was sending more spam than any other botnet
during September, and responsible for approximately 20% of all spam.
• Grum had an estimated 600,000-800,000 bots under its control by the end of
2009, responsible for sending approximately 9% of all spam, predominantly
pharmaceutical in nature.
Maazben
• This new botnet appeared around March 2009 and has not really asserted itself
despite a surge of spam during September and October when it was responsible for
as much as 3% of all spam.
• With approximately 200,000-300,000 bots under its control, Maazben was
responsible for approximately 2% of all spam by the end of 2009, sending mostly
French and German language casino related and gambling spam.
Festi
• Another new botnet that emerged as part of the botnet landscape in August 2009
and underwent a large increase in output during late October 2009 and early
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
10
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
100%
DONBOT FESTI
90%
XARVESTER MAAZBEN
80%
GHEG
70%
RUSTOCK
60%
50%
40%
GRUM
SRIZBI
30% MEGA-D
20%
CUTWAIL
10%
BOBAX
BAGLE
0%
Dec 2008
Sep 2008
Oct 2008
Aug 2009
Oct 2009
Apr 2009
Nov 2008
Jan 2009
Feb 2009
May -2009
Sep 2009
Nov 2009
Jun 2009
Mar 2009
Jul 2009
Figure 4: Contribution of Top 10 botnets to spam in 2009
3.2.2. Cutwail: Botnet Business as Usual
The Cutwail botnet is among the eldest of botnets. Malware linked to the Cutwail botnet was
first identified in January 2007. With between one and two million compromised computers
under its control, Cutwail was perhaps the largest botnet in history at its peak. Cutwail has
been very active in spamming-out emails containing the Bredolab Trojan dropper, which
in turn has been used to deploy other botnet malware, adware and spyware onto victims’
computers. Bredolab is discussed in more detail in the malware section of this report.
Cutwail experienced several hours of downtime on the morning of 5 June 2009, following
another ISP shutdown earlier that week by the U.S. Federal Trade Commission. California-
based ISP Pricewert LLC (also known as 3FN and APS Telecom) allegedly engaged in the
deployment of botnets and the distribution of illegal, malicious and harmful content such as
spam and exploitative images of children. However, this time the Cutwail botnet was able to
recover after only a few hours highlighting the progress that spammers had made since Mc-
Colo’s shutdown just seven months earlier. Clearly, spammers were learning the importance
of having a proper backup strategy for their command and control channels.
Spammers demonstrated this again when Real Host, an ISP based in Riga, Latvia and al-
leged to be linked to command-and-control servers for infected botnet computers, as well as
responsible for malicious websites, phishing websites and “rogue” anti-virus products, was
disconnected by its upstream providers on 1 August 2009. The impact was felt immediately,
as spam volumes dropped briefly by as much as 38% in the subsequent 48-hour period.
Much of this spam was linked to the Cutwail botnet which, at the time was responsible for
approximately 15-20% of all spam. Cutwail’s activity levels fell by as much as 90% when
Real Host was taken offline, but quickly recovered in a matter of days.
3.2.3. Regular Rustock: The Botnet with a Heartbeat
Analysis of the Rustock botnet in the latter part of 2009 revealed some interesting insights
regarding how it settled into a remarkably predictable pattern of spamming. Every day at
0800 GMT (1500 EST) it distributed spam emails, continuing throughout the day, peaking at
about 1200 GMT (0700 EST), and then ceasing spamming at 2400 GMT (1900 EST). It then
rested for about eight hours, before the cycle began again the following day.
As Rustock was one of the most dominant botnets during 2009, responsible for as much
as 19.3% of all spam by the end of the year, the same regular pattern could be observed in
total daily spam patterns for all spam.
11
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
3.6bn
3bn
2.4bn
1.8bn
1.2bn
600m
12
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
member, which in turn are cascaded to the other members that it knows of. As instructions
are received, they are shared with other members along the chain, eventually reaching the
entire botnet. P2P communications are often encrypted or disguised as other legitimate
traffic, such as DNS or HTTP requests.
As we move into 2010, it is expected that botnets will become more autonomous or artifi-
cially intelligent, perhaps even exhibiting the characteristics of swarm intelligence, where
each compromised computer will have built-in self-sufficient coding in order to coordinate
and extend its own survival. This will mean the botnet controllers will have more time to
focus on driving the bots use in spamming and other criminal activities, rather than dedicate
resources to extending the lifecycle of the botnet.
3.2.5. Mega-D and the Zombie Renaissance: Botnets Become Harder to Disrupt
On 4 November, a team of researchers from FireEye3 initiated a series to activities in order
to disrupt and wrestle for control of the Mega-D (Ozdok) botnet. By virtue of a coordinated
effort with several ISPs, the effort was initially hugely successful and the Mega-D botnet
was crippled overnight. This remained the case for a further nine days, but with a twist of
irony, on Friday 13 November, Mega-D effectively rose from the dead and large volumes of
spam were pumped-out again. Further investigation of the traffic showed that 95% of the IP
addresses being used after the resurgence had never before been connected with Mega-D.
This is rather revealing as it suggests that the botnet controllers responsible for Mega-D had
a backup strategy, perhaps a collection of “sleeper” bots that were previously inactive and
had now been activated – possibly another lesson the spammers learned from the McColo
takedown.
3.3. How Events in 2009 and Celebrity News Shaped the Spam Landscape
The global credit crisis and the election of U.S. President Barack Obama provided two major
themes to much of the spam blocked in early 2009. Other events, festivities and news
stories also contributed to many spam themes in 2009, including St. Valentine’s Day on
14 February, St. Patrick’s Day and NCAA March Madness in the U.S. in March; the 4 July
Independence Day in the U.S., the global flu pandemic of H1N1, the fatal crash of Air France
flight 447 as well as the deaths of singer Michael Jackson and actor Patrick Swayze.
3 http://blog.fireeye.com/research/2009/11/smashing-the-ozdok.html
13
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
Figure 8: Malware website with content relating to the death of Michael Jackson
Even before Jackson’s death, news of Farrah Fawcett’s passing precipitated a spate of spam
purporting to relate to her death and later when the death of Patrick Swayze was announced
on 15 September it was only a matter of time before the spammers and cyber criminals used
the opportunity to tailor their output accordingly.
14
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
to include a hyperlink constructed from a search engine query within the body of the email.
When the link is followed it leads the browser to the spammers’ websites.
15
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
to be to sell replica watches, the spammers used both Thanksgiving and Christmas as
themes in their messages. However, they sometimes mixed-up the subjects in the process.
Figure 10: Spam emails with mixed-up Thanksgiving and Christmas themes
Ultimately, these spammers are unlikely to care about such overlap; perhaps the use of both
Thanksgiving and Christmas themes in the same emails doubled their chances of catching
people’s attention. MessageLabs Intelligence identified significant numbers of spam mes-
sages related to Thanksgiving, accounting for approximately 2% of all spam by the end of
November, which was equivalent to more than two billion Thanksgiving-themed spam emails
were in circulation globally each day.
Some particularly keen spammers had already turned their attention to 2010 St. Valentine’s
Day, sending romantic themed emails more than three months in advance. Again sent from
the Cutwail and Rustock botnets, these spam messages relate to pharmaceutical and medi-
cal spam, often linked to the ubiquitous Canadian Pharmacy.
16
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
3.5. Spam Tactics Including Free Services, Image Spam and Shortened
URLs
MessageLabs Intelligence recorded a further rise in spam levels during the first half of 2009,
during April and May when much of this increase was attributed to spam with very little
content other than a subject line and a valid hyperlink or an image.
17 Nov
18 Nov
19 Nov
20 Nov
21 Nov
22 Nov
23 Nov
24 Nov
17
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
giving the appearance of a newspaper article, to try and get past text-based signatures.
18
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
19
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
25%
20%
15%
10%
5%
0%
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov
2009
Figure 17: Chart showing increase of image spam as % of spam over time in 2009
20
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
Image spam activity peaked on 5 April when 56.4% of spam was identified as image spam,
but the average proportion of image spam for all of 2009 was 28.2%.
By June 2009, image spam was again being attached to spam messages, rather than being
hosted remotely and displayed as HTML images. Some of these included background noise
patterns that had been generated in an automated fashion to obfuscate the content from
anti-spam analysis. Almost certainly sent from a botnet, the emails often contained no
hyperlinks, with the spammers’ website names frequently included in the content of the
images.
The technique of using reputable domains in spam emails is employed by spammers in a
bid to evade spam filters that examine the domains of the hyperlinks contained in the email,
and used the knowledge about these domains to make a judgment about the nature of that
email and the likelihood that it contains a spam message.
3.5.3. URL-Shortened Spam and Reputable Domains
During 2009, with the explosion of social networking and micro-blogging services, there
has been a plethora of URL-shortening services available on the Internet, and many do not
require users to register or complete a CAPTCHA in order to use their services.
The use of these free URL redirection services which turn lengthy web addresses into
shortened URLs became increasingly popular with spammers as the newly shortened
URLs also helped to disguise the real destination and help divert any concerns regarding
legitimacy of the link using these reputable domains. URL-shortening services hide the true
website hyperlink by replacing it with the domain of the service followed by a unique key
that redirects the visitor to the original link. Spammers were also able to take advantage of
these free redirection services by including the shortened URL in their spam messages. As
these shortened hyperlinks used reputable legitimate domains, it was harder for traditional
anti-spam filters to identify the messages as spam based on the reputation of the URL
domains.
By mid-2009, many of these services were being abused by spammers operating on many of
the social network and micro-blogging services using fake profiles and posting comments
that link to these redirection domains.
Here are some examples:
hXXp://is.gd/yvzs#cctrtfcphhww.mail.[redux].com
hXXp://is.gd/ymyl#rzsuuyhvcwr.mail.[redux].com
hXXp://is.gd/ymyl#rzsuuyhvcwr.mail.[redux].com
hXXp://tinyurl.com/2572434838#qcgkehbkfuxrn.[redux].com.tw
hXXp://www.x.se/[redux]#slidesilvana
hXXp://tr.im/dv0b#kbdhfhdbl[redux]vnmatq.yuk4a
hXXp://pr.mail.[redux].co.jp/gyao
Note the use of the HTML anchor tag (‘#’) in some of these hyperlinks. This symbol has a
legitimate purpose in HTML hyperlinks, but the spammers take advantage of this fact and
append anchor tags containing random strings of letters and numbers. This approach is in-
tended to confuse anti-spam technology that may rely on fingerprinting the entire URL. The
anchor tag is ignored by the URL shortening service and used here purely for obfuscation. In
total, 1% of shortened URL spam in 2009 used this technique and is seen very occasionally.
21
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
9.3%
9%
8%
7%
6%
5%
4%
3%
2%
1%
0%
4-Oct
2-Aug
9-Aug
13-Sep
20-Sep
27-Sep
11-Oct
18-Oct
25-Oct
12-Apr
19-Apr
26-Apr
12-Jul
19-Jul
26-Jul
14-Jun
21-Jun
28-Jun
16-Aug
23-Aug
30-Aug
1-Nov
8-Nov
3-May
6-Sep
5-Apr
5-Jul
15-Nov
7-Jun
10-May
17-May
24-May
31-May
22
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
By 28 July, 9.3% of all spam included a shortened URL domain, equivalent to more than 10
billion spam messages per day worldwide. The Donbot botnet was responsible for sending
approximately five billion spam messages each day, and was one of the main culprits for
using this technique. Most of these spam runs related to casino, bingo or gambling spam.
By the end of 2009 this technique had become less commonplace, but other major botnets
had also given it a go, including Cutwail, Rustock and Xarvester.
Many of the more popular URL-shortening services were quick to respond in stamping out
this abuse by withdrawing the abused links, but many of the newer, less familiar services
were less responsive and many of these URLs could remain active for several days after the
initial spam runs.
3.5.4. Obfuscation and Information Hiding
Obfuscation is often used inside spam messages to improve their chances of better evad-
ing spam filters, and in 2009 many examples included the use of HTML style tags to hide
random text intended to confuse anti-spam filters. For example:
<STYLE>Ysavu ujkuibito Yna wuc</STYLE>
The text between the HTML STYLE tags is not actually displayed in the email message and
remains hidden from view, but some traditional and perhaps naïve anti-spam filters may be
thrown off the scent by the use of this simple technique. This method has also been used to
break up hyperlink domains, for example:
www.spammerdomain<STYLE>Zowjqs otuwaqito Fodi ahqwu</STYLE>name.cn
In the example above, the text in between the HTML style tags will not be displayed, but
some anti-spam tools may simply strip out HTML tags before performing their analysis and
become confused and may think the domain in this example is ahqwh.name.cn rather
than www.spammerdomainname.cn.
Russian 0.53%
German 0.28%
Chinese 0.10%
95.3%
Japanese 0.05%
English
Spanish 0.05%
Italian 0.04%
23
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
147 spam emails each day during 2009, 2% of which were actually in English, but where the
email subjects were encoded using the Russian character set in order to hide the English
language content. The Russian character set is typically used to encode the Cyrillic alphabet,
however, in these examples it is only used to encode the 26-letter English language Roman
alphabet, such as in the following example:
Subject: Real manliness is renewable at any age √ make sure
yourself.
When viewing the original source code of the email message from the previous example, the
subject is actually comprised as follows:
Subject: =?koi8-r?B?QmVpbmcgd2VhbHRoeSBpcyBhYm91dCBiZWluZyBoZWF
sdGh5IJYgbGVh?==?koi8-r?B?cm4gaG93Lg==?=
Here, the Russian character set is being used by the spammers to hide the true meaning
behind the message. The subject is decoded by the email program and displayed correctly
in English. This unnecessary use of another character set to encode the English language
subject is purely to hide the true content of the subject of the message, and a technique
sometimes used by spammers to avoid content filters that do not decode the character set
in their analysis.
Many examples of this type of spam were sent from the Cutwail botnet. And included some
examples of the Bredolab Trojan in .ZIP file attachments to spam emails purporting to be
originate from major couriers, and contained subjects referring to postal tracking numbers.
There is more information on Bredolab later in this report.
Other non-Latin character sets, such as Japanese and Chinese do not appear to have been
used by spammers in the same way however.
3.6.1. Automated Spam Translation
During 2009, spam levels in countries where English was not the primary language had
increased significantly. Levels in Germany and The Netherlands increased by 13% since the
beginning of the year, with spam now accounting for in excess of 95% of all emails. Mes-
sageLabs Intelligence uncovered one of the tactics that contributed to this increase, the use
of automated translation services to enable multiple language spam runs.
Globally, the majority of spam was in English, and around 5%, (1 in 20) spam messages, was
in a non-English language.
To evaluate the language for recipients in a particular country, MessageLabs Intelligence
analyzed spam blocked for each client country where there were a sufficiently large range of
domains available.
In figure 22, it can be seen that for 2009, Brazil had the highest percentage of spam that
was in the local language, Portuguese (40%), followed by Italy (35%), and China (19%).
Brazil (18%) also has the lowest percentage of English-language spam.
The Baltic states of Sweden, Finland, Norway and Denmark had a very low proportion of
spam in their local language, with between 50 and 60% of spam in English. However, South
Africa had a very high proportion of English-language spam (91%), as does Switzerland,
Thailand and India – all had more than 80% of the spam in English.
Taiwan, China, Hong Kong, Singapore, Indonesia had the highest percentage of Chinese-
language spam, especially China and Taiwan, with between 18 and 20% of spam in Chinese.
Interestingly, nearly everywhere received a small volume of Chinese-language spam.
24
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
25
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
26
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
27
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
One such spam run was estimated to account for less than 1% of all spam at that time and
distributed from a currently unclassified botnet. The run was significantly smaller compared
with some of the more recent spam runs, such as the URL-shortening attacks from Donbot.
Although it was believed that this spam run may have contributed to the DDoS attacks
reportedly targeting the social networking websites, it was believed to be unlikely that this
run alone could have caused the reported disruption, suggesting that there was something
else involved. MessageLabs Intelligence believes that a botnet was also used to conduct the
DDoS attack in parallel with the spam runs, utilizing compromised computers under the
botnet’s control in an automated fashion to repeatedly visit pages of the targeted social
networking websites.
Australia
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23
Australia Local Time (EST) GMT/UTC +10
08 09 10 11 12 13 14 15 16 17 Workday
UK
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23
UK Local Time (GMT)
Workday 08 09 10 11 12 13 14 15 16 17
US
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23
US Local Time East Coast (EST) GMT/UTC -5
28
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
This profile of activity suggested that spammers were predominantly active during the U.S.
working day, and reflected the fact that the most active spammers were based in the U.S.
(according to Spamhaus ROKSO – add reference). From a direct marketing perspective it is
also likely that this time of day would be when the spammers’ largest target audiences are
online and most likely to respond. Understandably, across all regions, spam levels dropped
significantly on Sundays. For all countries examined (except Japan), spam levels dropped
mid-week, with peak activity periods being Mondays and Fridays.
Further analysis revealed that the source of this spam (based on the originating IP address
of the sender) is very much more evenly distributed across the three main regions:
• 34.8% of spam originated from the Americas (21.4% from South America, 13.4% from
North America);
• 31.6% from Europe;
• 27.8% from Asia.
29
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
1 in 214.2 Marketing/Media
1 in 218.4 501-1000
1 in 254.1 1001-1500
1 in 181.9 1501-2500
Min September: 1 in 399.2 1 in 225.8 Germany 1 in 242.1 Engineering 1 in 244.5 2501+
1 in 36.9 1 in 143.8
1 in 84.6
1 in 115.5
1 in 286.4
4 http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-070814-5311-
99&tabid=2
5 http://www.symantec.com/connect/blogs/born-4th-july
6 http://www.symantec.com/connect/blogs/trojandozer-kicking-you-while-your-website-down
30
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
65
61
57
56
56
52
49
46
46
46
45
43
41
40
40
38
31
23
Nov 08
Jun 08
Jan 09
Jun 09
Jul 08
Jul 09
May 08
May 09
Feb 09
Mar 09
Apr 08
Oct 08
Apr 09
Oct 09
Aug 08
Sep 08
Dec 08
Nov 09
Aug 09
Sep 09
31
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
with the G20. The email included a .PDF attachment, which if opened would cause a Trojan
downloader to be installed and executed. This would then download further spyware
components onto the target computer.
These targeted attacks began using G20-related topics for social engineering in late Febru-
ary and early March, targeting financial institutions and central banks more intensively
during this period, until early April. The peak of activity began around mid-March, just
before the pre-G20 meeting of key financial stakeholders. It was noted that some attacks
were crafted as replies to actual non-malicious emails, indicating that at least one of the
recipients had already been infected.
Analysis of the types of exploit being employed during 2009 reveal an increase in the use of
.PDF documents as compared with other file types, as can be seen in the chart below.
PDF PPT
XLS
Doc TXT
Other
EXE
Jan 09
Sep 08
Sep 09
Dec 08
Jul 08
Jul 09
Jun 08
Feb 09
Jun 09
Aug 08
Aug 09
Oct 08
Oct 09
Nov 08
Apr 08
Apr 09
May 08
May 09
Mar 09
Figure 29: Types of applications and exploits used in targeted attacks
A typical example of a targeted attack shows how relevant the content can be to the
individual or organization being targeted.
Figure 30: Examples of targeted attack using application exploits in attached documents
In some more sophisticated examples, the target may be approached through an intermedi-
ary who has already been compromised, typically through a small to medium sized business
that may have a supplier relationship with the intended target. Receipt of such an email
from someone with whom the target has already established a rapport makes it much more
difficult to recognize as an attack because of this provenance.
Globally, in the last six months of 2009, Messagelabs Intelligence identified that for clients
that were targeted by these types of attacks, an average of 38 targeted Trojans were blocked
per client, and on average, all clients may expect one targeted attack every two years.
32
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
33
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
Many social networking websites opened-up their APIs to allow for third-party developers in
2009, resulting in a rise in third-party applications appearing on social networking websites.
Many of which are likely to become more targeted by attackers looking for vulnerabilities in
the APIs and also in the websites upon which these applications are being hosted.
Often social networking applications are hosted on legitimate domains outside of the social
network infrastructure itself, and these are expected to come under attack with the injection
of malicious scripts and hidden malicious IFRAME HTML tags.
In 2009, some of the major social networking websites had begun to be targeted with rogue
third-party applications that were designed for harvesting user profile information and to
generate online advertizing revenue.
In 2009, criminals turned to public services such as popular micro-blogging sites to identify
people blogging about their first day in a new job, for example. This would be the prelude to
a social engineering attack via another social network, such as those used mainly by profes-
sionals, where the attacker will masquerade as another employee of the same organization,
perhaps someone from the HR or IT department.
Over a period of time they will build a rapport with the victim in order to understand the
company’s internal security measures and use the information gathered in this way as the
prelude to conducting spear-phishing attacks (e.g. “there’s a problem with your account –
can you click here to reset your password,” or “can you just confirm the URL that was given
to you for the VPN connection?”).
34
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
30%
25%
20%
15%
10%
5%
0%
Oct 26
Oct 26
Oct 26
Oct 26
Oct 26
Oct 26
Oct 26
Oct 26
Oct 26
Oct 27
Oct 27
Oct 27
Oct 27
Oct 27
Oct 27
Oct 27
Oct 27
Oct 27
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
23:00
00:00
01:00
02:00
03:00
04:00
05:00
06:00
07:00
08:00
35
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
30 Sep
28 Feb
30 Jun
31 Jan
31 Dec
31 Aug
31 Jul
31 Oct
30 Apr
30 Nov
31 May
31 Mar
Figure 34: Bredolab Trojan interceptions in email-borne malware
Most of the Bredolab malware interceptions from web browser traffic were from legitimate,
but compromised websites, and from users attempting to download the malware by access-
ing web-based email accounts from their corporate network.
0.4%
0.3%
0.2%
0.1%
0.0%
20 Sep
20 Jul
20 Aug
20 Jun
20 Feb
20 Oct
20 Apr
20 May
20 Mar
36
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
Figure 37: Bredolab and its associated malware hijacking SERP hyperlinks
37
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
A variety of methods are used by the bad guys to lure users to fraudulent websites, relying
heavily on social engineering tactics. Once installed, the rogue security software will typi-
cally display a number of hoax security threats, but will encourage the user into visiting an
associated website in order to purchase the full software license.
In October 2009, Symantec published11 an in-depth analysis of rogue security software pro-
grams and how they could affect users. The report included an overview of these programs,
how they work, their risk implications, various distribution methods and innovative attack
vectors.
38
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
that around 15.9% was from new families of malware being blocked for the first time each
day, as seen in figure 39.
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
Mar Apr May Jun Jul Aug Sep Oct
12 http://www.symantec.com/connect/blogs/breadth-security-issues-2009-stunning
39
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
Website hosting
Users
new malware
Website hosting
Users
new malware
40
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
that their sites generate, but sometimes they will also include drive-by attacks, often using
hidden HTML IFRAME exploits.
Once a domain like this has been used to serve malware to unsuspecting visitors, it is
usually not too long before the domain is recognized by the security community and may
appear in a block-list. Once blocked, steps are then taken to issue a notice and takedown
to the registrar or hosting provider to remove it as a threat from the Internet. However, in
the case of compromised legitimate websites, the legitimate owners should be notified that
their websites have been compromised and be given the opportunity to take appropriate
action to clean up their websites, removing the malware and closing any vulnerability that
was exploited to gain access.
4.6.6. The Importance of Age: Are Older Domains More Difficult to Clean?
How long, on average, does it take for a malicious website to be noticed, removed or
rendered harmless again? The vast majority (over 90%) of domains blocked by the Mes-
sageLabs Hosted Web Security Service (WSS), were taken down or cleaned up within 120
days, or four months. One-third of malicious websites were taken down or cleaned within
seven days and 13% of websites were taken down or cleaned within one day, as seen in
figure 41.
The typical profile of websites that were compromised and being used to serve malware
indicated that they had been registered for more than three months before first being
blocked as hosting malicious content. These may be termed “older” domains. The research
indicated that these domains, when used to host malicious content, actually survived for
a longer period of time than their younger counterparts and would take a relatively long
time to be cleaned. Only 8% of legitimate or older websites were cleaned within one day;
11% within two days; and 21% within one week. Furthermore, 90% of older domains were
cleaned up within 138 days, a very long time when compared with the clean-up rate for
“young” domains.
13% of all blocked domains are taken 29% of all blocked domains are taken 8% of all blocked domains are taken
down; or cleaned within 1 day of down; or cleaned within 1 day of down; or cleaned within 1 day of
being first blocked as malicious being first blocked as malicious being first blocked as malicious
41
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
100%
Over time more than 80% of
malicious domains
are “Old” domains
80%
“Old” domains
60%
80%
40%
“New” Domains
20%
0%
0 30 60 90 120 150 180
Days
Figure 42: Chart showing clean-up lifecycle for website domains linked to malware
Perhaps it is not surprising that with such a small window of opportunity, the bad guys
continue to register many new domains as often as possible. Once activated and serving
malware, it was then only a matter of time before each domain would be taken offline or
cleaned.
4.6.7. The End of “Domain Tasting” and “Domain Kiting” in 2009
It often seemed to take much longer for compromised legitimate websites to be cleaned as
taking down a malicious (“young”) domain would be relatively easy. Finding the malicious
parts of a sometimes large and complex, legitimate and often “older” website, and then
repairing it without causing damage to the operation of the website, is much harder.
Once the compromise has been identified, steps are needed to secure the site against
further attack. Most companies, especially large ones, may have to go through several
stages internally to achieve this. In some cases, the threat may be so deeply knotted within
the structure of the website that it may take website administrators a much longer time to
identify a mitigation strategy and implement it.
With approximately 80% of domains blocked as malicious being legitimate websites, it
is clear to see why attackers preferred to compromise legitimate websites, rather than to
create and register newer, specialized domains to serve the malware. Fundamentally, using
legitimate websites to spread malware potentially extends the lifetime of the malware. In
other words, it seems to take much longer to make these types of websites safe again.
There is also another factor to consider: For a long time, spammers, scammers and malware
distributors have been able to take advantage of a time limit policy called “Add Grace
Period” which allows them to register and then delete a domain at no cost, as long as the
cancellation was within the first five days. This practice is known as “domain tasting.”
Repeated use of “domain tasting” is called “domain kiting,” where domains potentially
remain registered for considerably longer periods without ever being paid for.
In order to combat “domain tasting” and “domain kiting,” in June 2008, ICANN (Internet
Corporation for Assigned Names and Numbers) implemented a couple of measures to
address the problem and would only allow domain registrars to de-register up to 10% of
their total registrations and be fully credited with their costs, but an excessively higher
number of cancellations would result in a penalty being imposed. This meant that U.S. $0.20
would be levied for each domain cancellation over and above the 10% limit, increasing
this penalty to U.S. $6.75 as of July 2009. And in August 2009, ICANN reported a 99.7%
decrease in such deletions between June 2008 and April 2009. Perhaps this finding reflects
the trend described above and goes some way to explaining why malicious domains in 2009
were likely to be older, compromised websites rather than newly registered domains with a
shorter lifespan, as they had been one year previously.
4.6.8. The Rise of Drive-By Malware
The Internet has provided a rich breeding ground for the spread of malware through
drive-by attacks on compromised websites and through fake profiles and phished accounts
on social networking websites. MessageLabs Intelligence analyzed the domains that were
being used to host the majority of malicious content blocked in 2009 and determined how
42
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
much of a factor the age of a domain is in potentially determining the nature of malicious
websites. Malicious domains are domains that were established with the pure intention to
serve malware, or sometimes, legitimate websites that have been compromised in some way
for use as a platform from which the cybercriminals serve their malware. A typical example
of this was found in the spread of the Gumblar malware.
3
Hacker inserts
1 malicious url Users is re-directed
to Bad Web site
Web Bad
site site
2 4
6
Badsite sends ob-
Malware sends private fuscated exploit for
data to Hacker vulnerability on end
user’s system
50%
40%
30%
gumblar.cn
20%
10%
0%
4-Sep
18-Sep
10-Jul
24-Jul
21-Aug
12-Jun
20-Feb
26-Jun
16-Oct
30-Oct
7-Aug
2-Oct
13-Nov
3-Apr
17-Apr
15-May
29-May
1-May
6-Mar
20-Mar
In another example, htaccess.php, the following highly obfuscated script could be found:
43
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
A Gumblar-infected website typically contains a hidden IFRAME tag, which is an often used
tactic to serve-up malicious scripts from other websites. Upon visiting such a site, the
hidden IFRAME will then include malicious scripts that will seek to exploit certain vulner-
abilities on the users’ computers, for example, targeting un-patched versions of a popular
.PDF viewer can result in a drive-by attack.
4.6.9. Black Hat SEO: Increasing Traffic to Compromised Websites
Once hackers take control of compromised websites, they can fool innocent visitors in many
different ways. The black hat (BH) search engine optimization (SEO) techniques are becom-
ing increasingly popular to indirectly target more victims through polluting search engine
result pages (SERPs). This is particularly useful from the bad guys’ perspective as they track
the popular search terms relating to news and current events, they will seek to reference
these popular terms in the BHSEO techniques in order to increase the search engine rank-
ings for their malicious content.
Compromised websites are frequently configured in order to present different content to the
search engines which crawl the websites from that which is presented to real visitors, who
visit the site by following links in SERPs.
Once the website has identified that a visitor is not a search engine crawler, but a real visi-
tor, it would simply redirect them to another website that would be hosting the malware.
Often the owners of a compromised website may be unaware that the BHSEO process relies
on unscrupulous techniques such as link-farming, “doorway” pages and cloaking. These ap-
proaches are very much frowned upon by the search engine providers and once discovered
the website will be penalized in terms of the rankings on those search engines – this may
even result in all references to the legitimate content on the compromised website being
revoked – potentially disastrous for any legitimate business.
4.6.10. Beyond Black Hat SEO: Black Hat Affiliate Marketing
Bad guys can benefit from the hijacked traffic from search engine searches in many
different ways. Apart from the example above to install fake antivirus software or some
other Trojan horse download, another good example of benefiting from Black Hat Search
Engine Optimization (BHSEO) is the Black Hat Affiliate Marketing (BHAM). Similar to BHSEO,
Black Hat Affiliate Marketing does questionable things to make money by injecting affiliate
information into a user’s computer. Typically the normal affiliate marketing works in the
following procedure
1. A visitor views an affiliate webpage or link;
2. The visitor clicks on an affiliate link;
3. The visitor makes a purchase from the affiliate associated merchant within a specific
period since last click.
Using BHAM, affiliates seek to bypass the first two steps by simulating clicks on affiliate
links to automatically place affiliate cookies to the user’s computer. This is called “cookie
stuffing”. As long as the user makes a purchase from any of the affiliate associated
merchants during the valid period of a cookie, the affiliate will get commission from the
merchant. A cookie normally has a given valid period, for example, 30 days. To reward the
affiliate, a customer must make a purchase from the corresponding merchant during that
period when the cookie is still valid.
44
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
To apply cookie stuffing techniques, affiliates often create tiny or zero-size HTML IFRAME
tags containing the affiliate links and then inserting them into compromised web pages
or ad banners. In figure 45, three invisible IFRAMEs are appended to a normal ad banner.
In this case, when the ad banner is loaded, it will load the invisible IFRAMEs and place the
affiliate cookies into the users’ computer without them realizing. This technique is used to
bypass steps 1 and 2 above, in order to simulate a real user clicking on affiliate links.
Figure 46: Example of email with .GIF image that contained hidden JavaScript
Many similar hidden scripts were also found in other files and attachments as well, includ-
ing .PDFs and .PPTs hosted on a number of websites and were indicative that perhaps these
websites had been compromised. In many cases, the hidden JavaScripts were routinely
appended to all files on the compromised site – not only the HTML files. The only way to
45
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
detect the presence of such scripts is by analyzing the content, as the file formats was not
corrupted in the process, therefore the images were still viewable.
Click-thru’s are favored by affiliate referral schemes, and are frequently used as marketing
tools by vendors use to increase the number of visitors and potential sales to a website. Of-
ten an affiliate is paid based on the basis of how many click-thru’s are generated by visitors
from their websites and then a percentage of any subsequent sales made by anyone they
refer to the website within a certain time period. However, many such schemes are prone
to abuse by unscrupulous affiliates, such as in the previous example where compromised
websites were being used and hidden scripts were injected into existing web content.
These cookie stuffing techniques are a way of tricking vendors’ tracking systems into
accepting that an affiliate has referred someone to their websites, when in fact they have
not – often they have only visited a website under the control of the fraudulent affiliate, but
the affiliate then uses deceptive techniques to force the visitor into receiving a cookie for
the vendors website, using the affiliate’s unique ID code.
4.6.12. Analysis of Domain Registrar and CCTLD Locations
Although it is fairly common for some country-code top-level domains (CCTLDs) to be hosted
in other countries that are different to the CCTLD country code, it is certainly a much more
frequent occurrence for newer domains that have been established for malicious purposes.
Based on the IP address of the website for a domain, the location can be determined and for
newer malicious websites that have only been recently registered these are more likely not
to match the CCTLDs for which they are registered.
Top-Level Domain
.cn .in .ru .us .com .info .net
Canada 18.8% 61.6% 11.0%
Cayman Islands 10.1%
China 46.0% 33.3% 18.2% 3.2% 7.2% 1.2% 8.7%
Estonia 4.5%
France 4.8%
Germany 3.2% 6.4%
country domain is hosted in
Figure 47: TLDs and CCTLDs based on the location of the websites linked to malware
For older, more well-established, legitimate websites that have been compromised, this
picture is very different and the CCTLD matches the expected location of the website much
more frequently.
4.6.13. Happy New Malware?
Ten years ago, on 26 March 1999, the notorious Melissa virus was created and released onto
the Internet and became perhaps the very first infamous email virus. Allegedly named after
a lap dancer whom creator David L. Smith met in Florida, Melissa sent an infected email
entitled “Here is that document you asked for ... don’t show anyone else;-)” via Microsoft
Outlook to the first 50 email addresses on the victims’ mailing lists.
Within the first hour of the outbreak, MessageLabs Hosted Email AntiVirus Service inter-
46
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
cepted 208 copies, which were very significant levels at that time. Since then, MessageLabs
Intelligence has tracked 108 different strains and more than 100,000 copies of the virus.
Melissa spread so quickly in the early stages of its outbreak that it overloaded email servers
across the globe, and despite not causing irreparable damage, the virus is widely credited
with laying the foundations for the devastating use of botnets that has since allowed cyber
criminals to spread malware so rapidly and economically. Although not on the same scale
as subsequent mass-mailing viruses such as Sobig or MyDoom, even after 10 years, Melissa
remains a feature on the threat landscape with an average of 10 copies still blocked each
month by MessageLabs Intelligence.
47
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
IM includes some message that will entice the recipient into following the hyperlink that
follows the message. This may read something like, “phewww unbelievable, is that you???
Whoever it is… it is really similar to you lol… ” Of course the recipient may be suspicious,
but they may also be tempted to follow the link, after all it was sent to them by a trusted
friend.
The website asks the visitor to authenticate using their own personal IM user account and
password, and at this point the details are validated such that if false credentials were
presented the login process would fail. At some point later, the same account will then be
used to send spam IM messages, such as in figure 48..
LINK
[…] By using our service/website you hereby fully authorize [redux] to send messages of a
commercial nature via Instant Messages and E-Mails on behalf of third parties via the
information you provide U.S.. This is not a "phishing" site that attempts to "trick" you into
revealing personal information. Everything we do with your information is disclosed here. If you
are under eighteen (18), you MUST obtain permission from a parent or guardian before using our
website/service.
48
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
legitimate marketing approach to their targets. In any case, it probably doesn’t really matter
to the user, because research13 suggests that only 4% of people even read these terms in the
first place and this tactic appears to be tantamount to a phishing expedition.
49
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
is largely irrelevant, as it is the actual user being targeted, not necessarily vulnerabilities
on the machine. Social engineering is already one of the primary attack vectors being used
today, and Symantec estimates that the number of attempted attacks using social engineer-
ing techniques is sure to increase in 2010.
50
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
1 in 325.2
1501-2500
Min February: 1 in 190.4
Max September: 1 in 437.1
1 in 1 in 325.2
1 in 315.4 1 in 179.5
338.3
1 in 244.9
At the end of 2008 and in the early months of 2009, phishing may have appeared more
attractive and potentially lucrative to the bad guys, perhaps in part owing to the follow-on
effect of recent disruption of the McColo ISP and partly because of the increased avail-
ability of phishing toolkits online. Some toolkits, such as the ZeuS toolkit fell into the public
domain and became plagued by hidden backdoor Trojans, whereas before it had been the
preserve of cyber criminals who were trading it on the underground economy. Freely avail-
able web hosting services continued to be used to host many phishing websites, and some
providers became better at identifying and responding to this type of abuse.
The ZeuS toolkit can be used to create highly customized botnets, phishing attacks and
identify theft and other malicious activities. Lowering the barrier to entry, many such
toolkits became more widely available, and often they had hidden backdoor Trojans that
their new users were unaware of, enabling other cyber criminals to capitalize on their use.
Phishing activity over the summer months fluctuated more widely, much of the heightened
activity earlier in the year that was linked to phishing toolkits had declined and fewer phish-
ing attacks targeted social networking websites. However, over the course of the year there
had been a rise in the proportion of phishing attacks in non-English languages, with French
and Italian becoming increasingly popular for these types of attacks. As seen in figure 50,
during the second half of 2009, there was a decline in phishing activity when measured as
a proportion of all malware and phishing combined, over the Summer months, perhaps as
the availability of phishing toolkits declined, returning to normal levels as the year drew to a
close.
51
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
60%
50%
40%
30%
20%
10%
0%
Jun Jul Aug Sep Oct Nov
Figure 50: Trend showing phishing as a proportion of malware and phishing combined
In figure 51, the chart shows that the most frequently targeted industry is the banking and
finance sector, particularly relating to credit-card fraud.
Other
Government
Commerce
Auction / Other Finance
52
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
U.K.) phishing runs. Similar phishing emails purporting to originate from the Australian Tax
Office were also in circulation, masquerading in the same way. In each case, the emails were
essentially identical, using the same templates with only the organization name changed.
Part of the email address was taken from the To: field and used within the body of the email;
the user name to the left of the @ was used in the parts of the email to lend credence to the
legitimacy of the scam.
90%
80%
IRS Phishing as % of all phishing
HMRC Phishing as % of all phishing
70%
60%
50%
40%
30%
20%
10%
0%
Jan 09 Feb 09 Mar 09 Apr 09 May 09 Jun 09 Jul 09 Aug 09 Sep 09 Oct 09
53
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
the issue here is that it is not just an email that can become compromised when someone
divulges those details. Other aspects of a person’s online life may then be susceptible as
well.
Since the widespread reports online and in the media of many users’ webmail account
details ending up in the public domain, the expectation has been to see an increase in spam
emails originating from these accounts. However, MessageLabs Intelligence did not observe
any significant increase in spam originating from the domains identified in these reports.
Figure 53: Advance-fee fraud scam relating to the 2010 Soccer World Cup
54
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
environment. This may include awareness raising, education and internal training to ensure
that employees understand their responsibilities online, especially as many organizations
are embracing social networking and micro-blogging services.
Some businesses may operate with a fairly unrestrictive open policy, where access is not
limited, but guidelines are set that govern what is or is not acceptable. Managing the risks
associated with employee Internet usage plays a vital role in any effective IT security policy.
Often the first measures are to undertake a risk assessment in order to clearly identify what
needs safeguarding, why and what happens if it is not protected adequately. This process
will look closely at the most likely risks facing the business and what action needs to be
taken in order to mitigate them.
The risks from exposure to web-based drive-by attacks have been discussed in this report,
as well as the risks from targeted malware, phishing, spear-phishing and other similar
tactics employed by cyber criminals.
Requirements to protect data extend beyond the potential impact from loss of reputation
and customer turnover, but are also needed to meet the demands of regulatory and legal
requirements. Many countries have enacted data protection legislation and in the U.S. more
than 35 States have enacted security breach notification laws.
In the U.S., the Health Insurance Portability and Accountability Act (HIPAA) calls for severe
civil and criminal penalties for noncompliance, including fines of up to $25,000 for multiple
violations of the same standard in one calendar year and fines as high as $250,000 and/or
imprisonment for up to ten years for the misuse of health information. Similarly, the Gramm
Leach Bliley Act (GLBA) brings stiff penalties, including civil action brought by the U.S.
Attorney General and fines levied to the organization of up to $100,000.
For any size of business, email is one of the organization’s most critical assets. Not only
do employees need access to their email accounts for their day-to-day jobs, but organiza-
tions must also manage historical copies of email correspondence in order to comply with
regulatory and legal requirements in order to conduct efficient e-discovery if required by
the authorities. It is for these reasons that many more companies are seeking reliable email
archiving solutions.
When used properly, encryption can be a powerful tool to help ensure secure delivery and
access to sensitive information. Unfortunately, just because information is encrypted does
not mean it has been approved to leave your organization. Likewise, sensitive information
that is permitted to exit your organization isn’t always encrypted.
It is important to ensure that any solution employed by the business includes features that
enable the monitoring and prevention of the transmission of data in violation of encryption
policies. It is important to have visibility into and control over encrypted information that
hasn’t been approved for external distribution.
5.5.1. Policy Controls for Web Access
To minimize legal risk and to ensure that the Internet and web access can be used as an
effective business tool, organizations need effective tools for monitoring behavior and to
enforce Acceptable Usage Policies that govern distribution of inappropriate content or to
mandate the use of encryption where appropriate. Such policies will govern how employees
are to conduct themselves online, particularly in the use of social networking, blogging and
micro-blogging websites. The most frequently triggered policy rules can be seen in figure
54, based on the time of day the rule was triggered.
streaming media
downloads
chat personals dating
blogs/forums
adult/sexually explicit
games
6 am 7 am 8 am 9 am 10 am 11 am noon 1 pm 2 pm 3 pm 4 pm 5 pm 6 pm
Figure 54: MostAdjusted
frequently
to local blocked
time policy rules by time of day (local time)
55
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
56
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
Brazil 13.9%
United States
of America
India
Russia
Vietnam
Poland
China
Argentina
Romania % of global broadband users
Spain
% of global bot PCs
Italy
United Kingdom
Germany
Mexico
France
Czech Republic
Portugal
Greece
Netherlands
Taiwan
Canada
Japan
Philippines
Australia
Switzerland
Austria
Sweden
Denmark
Malaysia
Norway
Belgium
Figure 55: Chart showing global share of broadband users vs. bots
The most likely countries for broadband users to become infected with a bot are Vietnam,
Brazil, Romania, Argentina, as seen in figure 56. Broadband users in the U.K. are 25% more
likely to be infected with botnet malware than in the U.S.. In Germany broadband users are
33% more likely to become infected than in the U.K., and 70% more likely than users in the
U.S..
57
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
0% 1% 2% 3% 4% 5% 6% 7% 8% 9%
Vietnam
Brazil
Romania
Argentina
Poland
India
Russia
Czech Republic
Portugal
Greece
Spain
Philippines
Mexico
% of broadband users with a bot PC
Italy
United States
of America
Austria
Netherlands
United Kingdom
Taiwan
Switzerland
Malaysia
Denmark
Germany
France
Norway
Sweden
China
Canada
Australia
Belgium
Japan
Figure 56: Chart showing likelihood of broadband users’ exposure to botnet threats
58
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
7. CONCLUSIONS
As this reports shows, the security landscape in 2009 has been shaped predominantly by
the application of botnets to the criminal enterprise, with an evolutionary step-change
taking place in the malware technology used to establish and control them. The shift
towards using standard web-based HTTP protocols, even in some cases with the manipula-
tion of social media content, has made it much harder to disrupt these criminal networks, as
evidenced in the report.
The use of generic malware droppers like Bredolab and Conficker, to “drop” other software
programs, malware and spyware onto victims computers ensures that the bad guys can
remain agile and are able to switch over and adapt their attack vectors and revenue streams
with minimal delay. We have yet to see the full potential of botnets like Conficker, keeping
their cards close to their chest in 2009; it remains to be seen whether their hand will be
played in 2010.
In terms of malware, there were more variants intercepted in 2009, with a 23% increase in
malware variants year-on-year. Greater levels of sophistication and efficiency brought about
larger numbers of spam campaigns in 2009, with over 21 million different types of spam
runs, more than double the amount seen in 2008.
The global financial crisis presented spammers and fraudsters with huge opportunities for
social engineering scams and enabled them to prey on the naïve and more vulnerable mem-
bers of society. World events, festivities and news stories also provided a rich backdrop from
which the spammers and cyber criminals could adapt their themes throughout the year.
Malware and spam in 2009 relied more on the use of the Web than in previous years, as
attacks swung more towards social networking environments, micro-blogging websites
and shortened-URLs, compromised websites and account profiles created using CAPTCHA-
breaking technology were all being used to host spam or malicious content. The use of such
in spam campaigns and malware attacks has been one aspect of this, and the pattern is
expected to continue in 2010 as email will continue to be the primary social engineering tool
for these attacks, and especially for targeted malware attacks.
59
www.messagelabs.com
[email protected]
MESSAGELABS INTELLIGENCE
Credits
Paul Wood
Executive Editor
MessageLabs Intelligence Senior Analyst, Symantec Hosted Services
Dan Bleaken
Malware Data Analyst, Symantec Hosted Services
Mat Nisbet
Malware Data Analyst, Symantec Hosted Services
Jason Zhang
Malware Analyst, Symantec Hosted Services
Nicholas Johnston
Senior Anti-Spam Engineer, Symantec Hosted Services
Martin Lee
Senior Software Engineer, Symantec Hosted Services
Daren Lewis
Analyst, Symantec Hosted Services
About Symantec
Symantec is a global leader in providing security, storage and systems management
solutions to help consumers and organizations secure and manage their information-driven
world. Our software and services protect against more risks at more points, more com-
pletely and efficiently, enabling confidence wherever information is used or stored. More
information is available at www.symantec.com.
60
www.messagelabs.com
[email protected]