SlideShare una empresa de Scribd logo
1 de 19
Symantec Intelligence Report

    June 2012


Symantec Intelligence              1
About the Symantec Intelligence Report

The Symantec Intelligence report provides the latest analysis of
cyber security threats, trends and insights from the Symantec
Intelligence team concerning malware, spam, and other
potentially harmful business risks.


The data used to compile the analysis for this combined report
includes data from May and June 2012.




Symantec Intelligence                                              2
October 2011 Highlights
• 36% of targeted attacks directed at SMBs
• Further analysis of W32.Flamer
• In-depth look a recently attempted targeted attack
• Spam – 66.8 percent (a decrease of 1.0 percentage point since
  May 2012)
• Phishing – One in 467.6 emails identified as phishing (an
  increase of 0.04 percentage points since May 2012)
• Malware – One in 316.5 emails contained malware (an increase
  of 0.04 percentage points since May 2012)
• Malicious Web sites – 2,106 Web sites blocked per day (a
  decrease of 51.7 percent since October 2011)

Symantec Intelligence                                             3
Targeted Attacks in 2012
• Daily targeted attacks increased by a minimum of 24%.
• More than 36% of all targeted attacks are aimed at small
  companies, compared to 18% at the end of 2011.
• Direct correlation between a rise in attacks against small
  companies and a drop in attacks against larger ones.
• 45% of all targeted attacks are aimed at the Defense industry.
• In four of the top five source countries, their own country is
  either the first or second-most targeted country.




Symantec Intelligence                                              4
Spam Rate & Sources
                      5
Symantec Intelligence   ‹#›
Additional Spam Metrics
Spam URL TLD Distribution

                                                         Change
TLD                          June         May
                                                       (% points)
.com                         74.7%       66.6%              +8.1
.ru                          4.1%        7.5%                -3.4
.net                         4.6%        5.8%                -1.2
.br                          2.9%        3.4%                -0.5

 Average Spam Message Size

                                                         Change
Message Size                     June            May
                                                       (% points)

0Kb – 5Kb                        43.1%       51.1%           -8.0
5Kb – 10Kb                       33.3%       29.1%          +4.2
>10Kb                            23.6%       19.8%          +3.8



Symantec Intelligence                                               7
Spam Subject Line Analysis
        June 2012                               No. of   May 2012                                    No. of
Rank    Total Spam: Top Subject Lines            Days    Total Spam: Top Subject Lines                Days
1      Delivery Status Notification (Failure)       28   Save-8O%-0ff-Viagra©-Cia1is©-Levitra©           28
2      Save-8O%-0ff-Viagra©-Cia1is©-Levitra©        28   (blank subject)                                 30
                                                         High-End-Designer-Watch-Replicas-Save-
3      (blank subject)                              28                                                   22
                                                         THOUSANDS-2012-Models
                                                         HIGH-QUALITY-ROLEX-REPLICA-
4      My Sexy Pics                                 28                                                   17
                                                         WATCHES&DESIGNER BAGS
                                                         ADD THREE INCHES TO YOUR MANHOOD
5      0                                             5                                                   19
                                                         NOW!
       We cant make it ANY EASIER toget LAID
6                                                   16   Order confirmation                               8
       tonight
       HIGH-QUALITY-ROLEX-REPLICA-                       Hey, You Need To Cum Check out My FucBook
7                                                   23                                                   14
       WATCHES&DESIGNER BAGS                             Page! :)
8      look at my photos                            13   Undelivered Mail Returned to Sender             30

9      Buy Viagra/Cialis Online!                     3   look at my photos                                7

10     ENLARGE YOUR MANHOOD 2-4 INCHES              22   Erika Sent You A Message                         7




Symantec Intelligence                                                                                         8
Additional Spam Metrics
Global Spam Categories

Category Name             June 2012   May 2012
Adult/Sex/Dating            64.28%     70.16%
Pharma                      18.76%     19.22%
Casino                       5.24%      0.88%
Jobs                         4.72%      3.47%
Watches                      2.94%      3.45%
Software                     1.67%      1.78%
Degrees                      0.47%      0.57%
419/Scam/Lotto               0.27%      0.13%
Mobile                       0.09%      0.14%
Newsletters                  0.08%      0.03%
Weight Loss                 <0.01%      0.08%




Symantec Intelligence                            9
Phishing Rate & Sources




                          10
Phishing Rate & Sources




                          11
Tactics of Phishing Distribution
     Automated Toolkits                          55.5%

 Other Unique Domains                    36.9%

     IP Address Domains       2.8%

 Free Web Hosting Sites           4.0%

           Typosquatting   0.8%




Symantec Intelligence                                    12
Organizations Spoofed in Phishing Attacks, by Industry
Sector
              Banking                               46.1%

         E-Commerce                         34.9%

  Information Services              15.0%

                 Retail     1.4%

      Communications        1.1%

  Telecommunications       0.919%

         Government       0.439%

          Retail Trade    0.078%

              Security    0.048%

            Insurance     0.019%

                    ISP   0.011%




Symantec Intelligence                                       13
Virus Rate




             14
Most Frequently Blocked Email Malware
   Malware Name                         % Malware
   W32/Bredolab.gen!eml.k                 17.43%
   W32/Bredolab.gen!eml.j                  9.49%
   Link-Exploit/Spam-3a71                  3.82%
   W32/NewMalware!16a0                     3.48%
   Exploit/Link-generic-ee68               3.22%
   W32/NewMalware-Generic-a2a1-3477        2.34%
   HTML/JS-Encrypted.gen                   1.69%
   Trojan.Bredolab                         1.56%
   W32/Bredolab.gen!eml-01cd               1.52%
   Link-Gen:Variant.Barys.1516.dam         1.43%




Symantec Intelligence                               15
New Malware and Spyware Sites Per Day




Symantec Intelligence                   16
Policy, Malware & Potentially Unwanted Programs




Symantec Intelligence                             17
Most Frequently Blocked Malware at the Endpoint
  Malware Name                                                                                                                           % Malware
  WS.Trojan.H                                                                                                                                29.06%
  W32.Sality.AE                                                                                                                               6.81%
  W32.Ramnit!html                                                                                                                             6.01%
  W32.Ramnit.B                                                                                                                                5.61%
  W32.Downadup.B                                                                                                                              3.82%
  W32.Ramnit.B!inf                                                                                                                            3.53%
  W32.Virut.CF                                                                                                                                2.07%
  Trojan.ADH.2                                                                                                                                2.00%
  W32.Almanahe.B!inf                                                                                                                          1.83%
  Trojan.ADH                                                                                                                                  1.43%




                        [1] For further information on these threats, please visit: http://www.symantec.com/business/security_response/landing/threats.jsp




Symantec Intelligence                                                                                                                                        18
Where to next?
• Web:
    – www.symanteccloud.com/intelligence
    – www.symantec.com/spam


• Twitter:
    – @symanteccloud




Symantec Intelligence                      19

Más contenido relacionado

Destacado

Open For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusionOpen For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusionBrunswick Group
 
CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016Andrew Gunn
 
Getting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStackGetting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStackAnthony Chow
 
Best Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageBest Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageRyan Snell
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Accenture Technology
 

Destacado (6)

Open For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusionOpen For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusion
 
CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016
 
Getting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStackGetting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStack
 
Best Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageBest Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash Storage
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3
 
99 Facts on the Future of Business
99 Facts on the Future of Business99 Facts on the Future of Business
99 Facts on the Future of Business
 

Similar a 2012 June Symantec Intelligence Report

2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report2012 February Symantec Intelligence Report
2012 February Symantec Intelligence ReportSymantec
 
Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec
 
Multiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the ProsMultiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the ProsLitmus
 
2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report2011 September Symantec Intelligence Report
2011 September Symantec Intelligence ReportSymantec
 
Webinar presentation-for-web
Webinar presentation-for-webWebinar presentation-for-web
Webinar presentation-for-webBoni
 
DMA digital tracking study May 2010
DMA digital tracking study May 2010DMA digital tracking study May 2010
DMA digital tracking study May 2010Bryan Miller
 
Multiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpopMultiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpopSilverpop
 
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)Global Business Events
 
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...McKinley Advisors
 
Security4all Desktop Security
Security4all   Desktop SecuritySecurity4all   Desktop Security
Security4all Desktop SecurityBen W.
 
Mobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail SectorMobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail SectorMobilosoft
 
McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011McDougall Interactive
 
2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source results2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source resultsBryan House
 
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de marktMobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de marktShareforce
 
Mobile Email: Why, What, How
Mobile Email: Why, What, HowMobile Email: Why, What, How
Mobile Email: Why, What, HowLitmus
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec
 

Similar a 2012 June Symantec Intelligence Report (20)

2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report
 
Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011
 
Multiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the ProsMultiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the Pros
 
2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report
 
Webinar presentation-for-web
Webinar presentation-for-webWebinar presentation-for-web
Webinar presentation-for-web
 
DMA digital tracking study May 2010
DMA digital tracking study May 2010DMA digital tracking study May 2010
DMA digital tracking study May 2010
 
Multiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpopMultiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpop
 
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
 
Reeves - Williams
Reeves - WilliamsReeves - Williams
Reeves - Williams
 
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
 
Security4all Desktop Security
Security4all   Desktop SecuritySecurity4all   Desktop Security
Security4all Desktop Security
 
Credit Suisse Group Financial Services Forum
	Credit Suisse Group Financial Services Forum 	Credit Suisse Group Financial Services Forum
Credit Suisse Group Financial Services Forum
 
Mobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail SectorMobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail Sector
 
McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011
 
LonghornPHP - CVE 101.pdf
LonghornPHP - CVE 101.pdfLonghornPHP - CVE 101.pdf
LonghornPHP - CVE 101.pdf
 
BNYMellon - CVE 101.pdf
BNYMellon - CVE 101.pdfBNYMellon - CVE 101.pdf
BNYMellon - CVE 101.pdf
 
2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source results2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source results
 
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de marktMobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
 
Mobile Email: Why, What, How
Mobile Email: Why, What, HowMobile Email: Why, What, How
Mobile Email: Why, What, How
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 

Más de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistanvineshkumarsajnani12
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowranineha57744
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 

Último (20)

joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 

2012 June Symantec Intelligence Report

  • 1. Symantec Intelligence Report June 2012 Symantec Intelligence 1
  • 2. About the Symantec Intelligence Report The Symantec Intelligence report provides the latest analysis of cyber security threats, trends and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this combined report includes data from May and June 2012. Symantec Intelligence 2
  • 3. October 2011 Highlights • 36% of targeted attacks directed at SMBs • Further analysis of W32.Flamer • In-depth look a recently attempted targeted attack • Spam – 66.8 percent (a decrease of 1.0 percentage point since May 2012) • Phishing – One in 467.6 emails identified as phishing (an increase of 0.04 percentage points since May 2012) • Malware – One in 316.5 emails contained malware (an increase of 0.04 percentage points since May 2012) • Malicious Web sites – 2,106 Web sites blocked per day (a decrease of 51.7 percent since October 2011) Symantec Intelligence 3
  • 4. Targeted Attacks in 2012 • Daily targeted attacks increased by a minimum of 24%. • More than 36% of all targeted attacks are aimed at small companies, compared to 18% at the end of 2011. • Direct correlation between a rise in attacks against small companies and a drop in attacks against larger ones. • 45% of all targeted attacks are aimed at the Defense industry. • In four of the top five source countries, their own country is either the first or second-most targeted country. Symantec Intelligence 4
  • 5. Spam Rate & Sources 5
  • 7. Additional Spam Metrics Spam URL TLD Distribution Change TLD June May (% points) .com 74.7% 66.6% +8.1 .ru 4.1% 7.5% -3.4 .net 4.6% 5.8% -1.2 .br 2.9% 3.4% -0.5 Average Spam Message Size Change Message Size June May (% points) 0Kb – 5Kb 43.1% 51.1% -8.0 5Kb – 10Kb 33.3% 29.1% +4.2 >10Kb 23.6% 19.8% +3.8 Symantec Intelligence 7
  • 8. Spam Subject Line Analysis June 2012 No. of May 2012 No. of Rank Total Spam: Top Subject Lines Days Total Spam: Top Subject Lines Days 1 Delivery Status Notification (Failure) 28 Save-8O%-0ff-Viagra©-Cia1is©-Levitra© 28 2 Save-8O%-0ff-Viagra©-Cia1is©-Levitra© 28 (blank subject) 30 High-End-Designer-Watch-Replicas-Save- 3 (blank subject) 28 22 THOUSANDS-2012-Models HIGH-QUALITY-ROLEX-REPLICA- 4 My Sexy Pics 28 17 WATCHES&DESIGNER BAGS ADD THREE INCHES TO YOUR MANHOOD 5 0 5 19 NOW! We cant make it ANY EASIER toget LAID 6 16 Order confirmation 8 tonight HIGH-QUALITY-ROLEX-REPLICA- Hey, You Need To Cum Check out My FucBook 7 23 14 WATCHES&DESIGNER BAGS Page! :) 8 look at my photos 13 Undelivered Mail Returned to Sender 30 9 Buy Viagra/Cialis Online! 3 look at my photos 7 10 ENLARGE YOUR MANHOOD 2-4 INCHES 22 Erika Sent You A Message 7 Symantec Intelligence 8
  • 9. Additional Spam Metrics Global Spam Categories Category Name June 2012 May 2012 Adult/Sex/Dating 64.28% 70.16% Pharma 18.76% 19.22% Casino 5.24% 0.88% Jobs 4.72% 3.47% Watches 2.94% 3.45% Software 1.67% 1.78% Degrees 0.47% 0.57% 419/Scam/Lotto 0.27% 0.13% Mobile 0.09% 0.14% Newsletters 0.08% 0.03% Weight Loss <0.01% 0.08% Symantec Intelligence 9
  • 10. Phishing Rate & Sources 10
  • 11. Phishing Rate & Sources 11
  • 12. Tactics of Phishing Distribution Automated Toolkits 55.5% Other Unique Domains 36.9% IP Address Domains 2.8% Free Web Hosting Sites 4.0% Typosquatting 0.8% Symantec Intelligence 12
  • 13. Organizations Spoofed in Phishing Attacks, by Industry Sector Banking 46.1% E-Commerce 34.9% Information Services 15.0% Retail 1.4% Communications 1.1% Telecommunications 0.919% Government 0.439% Retail Trade 0.078% Security 0.048% Insurance 0.019% ISP 0.011% Symantec Intelligence 13
  • 15. Most Frequently Blocked Email Malware Malware Name % Malware W32/Bredolab.gen!eml.k 17.43% W32/Bredolab.gen!eml.j 9.49% Link-Exploit/Spam-3a71 3.82% W32/NewMalware!16a0 3.48% Exploit/Link-generic-ee68 3.22% W32/NewMalware-Generic-a2a1-3477 2.34% HTML/JS-Encrypted.gen 1.69% Trojan.Bredolab 1.56% W32/Bredolab.gen!eml-01cd 1.52% Link-Gen:Variant.Barys.1516.dam 1.43% Symantec Intelligence 15
  • 16. New Malware and Spyware Sites Per Day Symantec Intelligence 16
  • 17. Policy, Malware & Potentially Unwanted Programs Symantec Intelligence 17
  • 18. Most Frequently Blocked Malware at the Endpoint Malware Name % Malware WS.Trojan.H 29.06% W32.Sality.AE 6.81% W32.Ramnit!html 6.01% W32.Ramnit.B 5.61% W32.Downadup.B 3.82% W32.Ramnit.B!inf 3.53% W32.Virut.CF 2.07% Trojan.ADH.2 2.00% W32.Almanahe.B!inf 1.83% Trojan.ADH 1.43% [1] For further information on these threats, please visit: http://www.symantec.com/business/security_response/landing/threats.jsp Symantec Intelligence 18
  • 19. Where to next? • Web: – www.symanteccloud.com/intelligence – www.symantec.com/spam • Twitter: – @symanteccloud Symantec Intelligence 19

Notas del editor

  1. x
  2. comprising a phishing attack.