RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
2010/05/27 10:51:02

The web threats directed to the end user

In the report the web threats directed to the end user including the attacks of SEO, installation of dummy antivirus software by the sophisticated psychological attacks, etc. are studied in detail.

  • Google services (search, Gmail, blogs, groups etc.) head the list of threats that leads to the fact that from here without the knowledge of the end user the malware is loaded and established. They are followed by ThePlanet, the large hosting provider who was often becoming by subject to abuses.
  • End users do not manage to bypass numerous schemes of the psychological attacks. Head this list (13.58%) aggressive technologies of deception by implementation of dummy antivirus software.
  • The researches Zscaler show how it occurs how search systems and why from such threats not so just to get rid are used.
  • Source of 5% of all vulnerabilities of browsers was the linking of the Eleonore exploits, and this digit grows. Zscaler shows what features these or those exploits have and why they are so important for malefactors.
  • Phishing exploits in Facebook and World of Warcraft (WoW) allow hackers to get considerable profit; Zscaler shows how the attacks of SEO and the infected content give to malefactors the chance to achieve the goals.
  • In spite of the fact that such old botnets as Monkif, Torpig, Zeus and Koobface, are widely known, and the organizations in every possible way try to fight with them, they exist and continue to develop actively.
  • Though vulnerabilities of zero day force the large companies to refuse use of the sixth version of Internet Explorer, the level of distribution of this browser which appeared nine years ago remains unacceptably high
  • Many important events which became relevant during the studied quarter period as, for example, a tsunami in Chile, the release iPad Apple and a massive withdrawal of the Toyota models, were used by hackers for the psychological attacks.
  • Most often fair content through the existing global communication channels is requested from the USA, and respectively, the greatest number of harmful content extends from here.
  • Today ten the countries where the greatest number of harmful content on the legitimate websites is mentioned, includes seven countries of Central and South America (Learn, why it and as it can change in the future).
  • Gilbert's curve for the analysis of the Internet shows that despite all reports speaking about deficit of an address space in IPv4 protocol, large volumes of Internet space remain undeveloped.

According to Michael Sutton, the vice president of Zscaler concerning researches in the field of security, "hackers continue to improve methods of the work and as soon as an opportunity appears, they will be able to implement the effective attacks in read minutes". "Applying tactics of Black hat SEO striking the legitimate websites, or distributing a dummy anti-virus software, they use the checked and debugged technicians of the attacks frightening by the efficiency again and again". Throughout the thought he told: "One more output which we can make – matter not only that the attacks become more perfect and purposeful, but also that knowledge of such threats, for example, large botnets, does not allow you to get rid of them".

The report sums up data on activity of hackers for the considered quarter period and also reveals new trends of distribution of the attacks. Complete report version the Situation on the Internet can be received here