Video | Business Headlines | Internet | Science | Scientific Ethics | Technology | Search


Malicious Attacks Focused Toward Trusted Web Sites

Symantec Report Reveals Malicious Attacks Focused Toward Trusted Web Sites
New Internet Security Threat Report Reveals Details on Hackers’ Quest for Private Information

The latest Internet Security Threat Report (ISTR), Volume XIII released today by Symantec Corp. (Nasdaq: SYMC) concludes that the web is now the primary conduit of attack activity, as opposed to network attacks, and that online users can increasingly be infected simply by visiting everyday web sites. The report is derived from data collected by millions of internet sensors, first-hand research and active monitoring of hacker communications and provides a global view of the state of internet security.

In the past, users had to visit intentionally malicious sites or click on malicious email attachments to become a victim of a security threat. Today, hackers are compromising legitimate web sites and using them as a distribution medium to attack home and enterprise computers. Symantec noticed that attackers are particularly targeting sites that are likely to be trusted by end users, such as social networking sites.

Attackers are leveraging site-specific vulnerabilities that can then be used as a means for launching other attacks. During the last six months of 2007, there were 11,253 site specific cross-site scripting vulnerabilities reported on the internet; these represent vulnerabilities in individual web sites. However, only 473 (about 4 percent) of them had been patched by the administrator of the affected web site during the same period, representing an enormous window of opportunity for hackers looking to launch attacks.

Phishing also continues to be a problem. In the last six months of 2007, Symantec observed 87,963 phishing hosts – computers that can host one or more phishing web sites. This is an increase of 167 percent from the first half of 2007. Eighty percent of brands targeted by phishing attacks during the study period were in the financial sector.

The report also found that attackers are seeking confidential end-user information that can be fraudulently used for financial gain and are less focused on the computer or device containing the information. In the last six months of 2007, 68 percent of the most prevalent malicious threats reported to Symantec attempt to compromise confidential information.

Finally, attackers are leveraging a maturing underground economy to buy, sell and trade stolen information. This economy is now characterised by a number of traits common in traditional economies. For example, market forces of supply and demand have a direct impact on pricing. Credit card information, which has become plentiful in this environment, accounted for 13 percent of all advertised goods – down from 22 percent in the previous period and sold for as low as $0.40. The price of a credit card in this underground market is determined by factors such as the location of the issuing bank. Credit cards from the European Union, for example, cost more than those from the United States; this is most likely due to the smaller supply of cards circulating in the E.U. which makes the card more valuable to a criminal. Bank account credentials have become the most frequently advertised item making up 22 percent of all goods and selling for as little as $10.


- In 2007, Symantec detected 711,912 new threats compared to 125,243 in 2006 – an increase of 468 percent; this brings the total number of malicious code threats detected by Symantec to 1,122,311 as of the end of 2007.

- Symantec measured the release of both legitimate and malicious software during a portion of the reporting period and found that 65 percent of the 54,609 unique applications released to the public were categorised as malicious. This is the first time Symantec observed malicious software outpacing legitimate applications.

- Theft or loss of a computer or other device made up 57 percent of all data breaches during the last half of 2007 and accounted for 46 percent of all reported breaches in the previous reporting period.

- Government was the top industry sector for identities exposed, accounting for 60 percent of the total, an increase from 12 percent in the previous reporting period.

- A full identity can be purchased in the underground economy for as little as $1.


- “Avoiding the dark alleys of the internet was sufficient advice in years past,” said Stephen Trilling, vice president, Symantec Security Technology and Response. “Today’s criminal is focused on compromising legitimate web sites to launch attacks on end-users, which underscores the importance of maintaining a strong security posture no matter where you go and what you do on the internet.”

- “Remaining vigilant and informed on the latest evolutions in the threat landscape is critical to maintaining a strong security posture,” said Adriano Diaz, vice president and information security manager, BankUnited. “Symantec’s Internet Security Threat Report continues to provide us with critical information on the most current online security trends, helping us better protect our information.”


To find out more about threats facing today’s internet users, visit the following resources:

- Symantec Internet Security Threat Report – To download the full report.

- XSSed Project – To understand more about site-specific cross-site vulnerabilities.

- Data Loss Archive and Database – To review publicly available information about data loss.

- SecurityFocus – To explore security databases and discussions of software vulnerabilities.

About Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help businesses and consumers secure and manage their information. Headquartered in Cupertino, California, Symantec has operations in more than 40 countries. More information is available at


NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at All prices noted are in U.S. dollars and are valid only in the United States.

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

TECHNORATI TAGS: Symantec, Norton, Internet Security Threat Report, cybercrime, hackers, phishing, social networking, identity theft, Internet security, data breaches, viruses, malicious code, vulnerabilities

© Scoop Media

Business Headlines | Sci-Tech Headlines


Crown Accounts: Slightly Softer Growth Expected In PREFU

A slightly softer growth forecast is the main feature of largely unchanged Pre-election Fiscal Update compared to the Budget forecasts three months ago, Finance Minister Steven Joyce says. More>>


Water: Farming Leaders Pledge To Help Make Rivers Swimmable

In a first for the country, farming leaders have pledged to work together to help make New Zealand’s rivers swimmable for future generations. More>>


Unintended Consequences: Liquor Change For Grocery Stores On Tobacco Tax

Changes in the law made to enable grocery stores to continue holding liquor licences to sell alcohol despite increases in tobacco taxes will take effect on 15 September 2017. More>>

Back Again: Government Approves TPP11 Mandate

Trade Minister Todd McClay says New Zealand will be pushing for the minimal number of changes possible to the original TPP agreement, something that the remaining TPP11 countries have agreed on. More>>


By May 2018: Wider, Earlier Microbead Ban

The sale and manufacture of wash-off products containing plastic microbeads will be banned in New Zealand earlier than previously expected, Associate Environment Minister Scott Simpson announced today. More>>