Malware Soars As Traditional Phishing Falters

Malware incidents rose by 89 percent in the last three months, while phishing saw a drop of 8 percent over the period, according to a report.

The period also saw an increasing number of large-scale domain hijackings, DNS exploits and other breaches of global targets, causing substantial downtime for companies’ online enterprises. “Zeus malware infection is also an on-going threat, especially with the reemergence of the Avalanche group and their fast flux hosting tactic,” said internet security company, Internet Identity (IID), in its third quarter eCrime Trends Report.

The reappearance of Avalanche is not a surprise and it is apparent that they are now providing their massive botnet as an infrastructure for hire, according to Rod Rasmussen, IID President and CTO. “Cybercriminals are always trying to adapt to the latest security methods and threat awareness, and as an industry we must stay one step ahead of these increasingly sophisticated cyber gangs,” he said in a statement.

Major players fight back

Facebook, Google and Microsoft are some of the global palyers who fought back hard against cyber-thugs this quarter. After the .tk top-level domain showed a 600 percent rise in phishing, Facebook joined the .tk registry, IID, and the Anti-Phishing Alliance of China (APAC) to secure the top-level domain and reduce phishing from that domain by 40 percent. Google de-indexed the entire second-level domain co.cc, a hive of fraudulent activity, blocking 11 million co.cc websites from appearing in its search engine results, while Microsoft took down the Kelihos botnet, a network of 41,000 private computers infected with malicious software capable of sending billions of spam emails per day.

Traditional phishing attacks occur when online fraudsters try to access personal data such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an online exchange, while malware is malicious software installed onto a computer, which enables cybercriminals to access and use that computer for criminal purposes.

The IID report was compiled using data from security and Internet infrastructure organisations including IID, ICANN (Internet Corporation for Assigned Names and Numbers) and APWG (Anti-Phishing Working Group.

Iris Cheerin

Recent Posts

Bitcoin Surges To Above $93,000 For First Time

Bitcoin price reaches new record, amid hope that incoming Trump administration will implement crypto-friendly policies

10 hours ago

Users Flock To Bluesky Post Election, As Guardian Leaves X

Bluesky briefly tops download charts in UK and US, as Guardian newspaper says it is…

11 hours ago

Apple To Launch AI Wall ‘Tablet’ – Report

Smart home expansion? Apple reportedly developing an 'AI wall tablet' for smart home control, Siri,…

13 hours ago

Waymo Opens Ride-Hailing Services In Los Angeles

End of road for taxi drivers? More people seeking transportation in Los Angeles can now…

16 hours ago

Trump Appoints Elon Musk To Lead Government Efficiency Department

Slash-and-burn cuts for federal staff? Elon Musk and former presidential candidate Vivek Ramaswamy appointed to…

17 hours ago