Websense 2014 Threat Report Analyses Emerging Trends In Cyber-Attack Methodology

By   ISBuzz Team
Writer , Information Security Buzz | Apr 04, 2014 01:57 am PST

Key findings shed light on cybercriminal services, emerging threat ecosystem and key stages for attack interception

Websense, Inc., the global leader in protecting organisations from advanced cyber attacks and data theft, have released the Websense® Security Labs™ 2014 Threat Report, documenting the latest shift in complex attack trends, evolution in the threat ecosystem and shifting motivation of cyber-attacks.

“Cybercriminals continue to evolve their attack planning and execution to stay ahead of most existing security measures,” said Charles Renert, vice president of security research for Websense. “While the determined, persistent attackers continue to have success in advanced, strategic attacks using zero-day exploits and advanced malware, there has also been a boom in cybercriminal activity on a massive scale. Even these more ‘common’ forms of attack are easily slipping past organizations without real-time defenses.”

The Websense Security Labs 2014 Threat Report details the growing global criminal-infrastructure-as-a-service economy through exploit kits and compromised websites redirection chains. Through an analysis of the latest attack methodology, Websense security researchers analyse the seven threat stages of advanced attacks. In addition, outcomes include the modification and repurposing of existing malware source code.

Key findings from the Websense Security Labs 2014 Threat Report include:

– 85 percent of malicious links used in web or email attacks were located on compromised legitimate websites
– 3.3 percent of all spam contained malicious links and other malicious content
– Websense technologies protected customers from more than 1 billion lure events
– The average number of website redirects used per attack in 2013 was four
– The maximum number of redirects used in a fully documented attack was 20
– 1.8 billion malicious redirect events were stopped by Websense
– Websites classified as Business and Economy, Information Technology, Shopping and Travel made the top 10 list of compromised redirect destination categories
– The Magnitude and Neutrino Exploit Kits experienced the largest surge in adoption following the arrest of Blackhole’s creator
– Websense protected customers from approximately 67 million exploit kit events
– 64 million dropper file events were detected and blocked using Websense real-time security and TRITON ThreatScope
– 30 percent of malicious executable files sampled included custom encryption of command and control communication or data exfiltration
– More than 1.1 billion call home events were prevented by Websense gateways

The report also documents how the infrastructure of an attack campaign is constantly developed, enhanced and reused throughout the entire threat lifecycle. To avoid detection when reusing components in subsequent attacks, criminals are increasingly taking an approach that involves modification and modulation of existing attack tools. Often, this means choosing to take advantage of a specific strength of a particular piece of malware to target new industries.

In addition, Websense security researchers observed the Zeus malware, which was originally designed as a financial threat and keylogging Trojan, dramatically increased in use as it was repurposed for other vertical markets. In the last year the government and the communications industry joined financial firms among the top five verticals targeted with Zeus malware. The top two industries hit hardest with Zeus attacks were the services and manufacturing sectors.

The Websense Security Labs 2014 Threat Report research was conducted using the Websense ThreatSeeker® Intelligence Cloud, which unites more than 900 million endpoints. This network identifies and responds to changes in the global threat landscape at rate of 2.3 state changes per second. With the help of Websense ACE (Advanced Classification Engine), ThreatSeeker analyzes the content of 3–5 billion requests per day.

To download the Websense 2014 Threat Report, and to view a video featuring the top findings, visit www.websense.com/2014threatreport. For ongoing research updates, be sure to follow the Websense Security Labs blog: http://community.websense.com/blogs/securitylabs/.

About Websense, Inc.

Websense, Inc. is a global leader in protecting organizations from the latest cyber attacks and data theft. Websense TRITON comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. More than 11,000 enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance- and cloud-based Websense TRITON solutions.

Websense TRITON stops more threats; visit www.websense.com/proveit to see proof. To access the latest Websense security insights and connect through social media, please visit www.websense.com/smc. For more information, visit www.websense.com and www.websense.com/triton.

Notify of
0 Expert Comments
Inline Feedbacks
View all comments

Recent Posts

Would love your thoughts, please comment.x