Internet Security Systems, an IBM Company announced the highlights of its 2006 security statistics report, which describes key security findings for 2006 and predicts the nature of Internet threats expected to emerge in 2007. Based on early indicators, Internet Security Systems (ISS) anticipates a continued rise in the sophistication of profit-motivated cyber attacks, including an increased focus on the Web browser and advances in image-based spam.
According to the report, which was developed by the ISS XÃ‚ÂForce research and development team, there were 7,247 new vulnerabilities recorded and analysed by the X-Force in 2006, which equates to an average of 20 new vulnerabilities per day. This total represents a nearly 40 per cent increase over what ISS reported in 2005. Over 88 per cent of 2006 vulnerabilities could be exploited remotely, and over 50 per cent allowed attackers to gain access to a machine after exploitation.
Attacks on Web browsers are expected to continue rising in 2007, partially as a result of the newly-created “exploits as a service” industry. The sale of exploit material is becoming even more organised and is increasingly taking the shape of the channel sales model used by legitimate corporate entities. Managed exploit providers are purchasing exploit code from the underground, encrypting it so that it cannot be pirated, and selling it for top dollar to spam distributors. The organised development and sale of encrypted exploit code will make signature-based protection even less effective in the new year.Ã‚Â
In terms of spam, X-Force predicts a continued sophistication of image-based spam techniques. In 2007, new forms of image-based spam will likely be developed to evade protection solutions that have been created to combat early forms of image-based spam seen in the wild.
This latest report from X-Force also points to new methods being used by attackers to avoid detection by commercial security solutions. In 2006, malware continued to become less distinct in its categorisation, instead borrowing characteristics from other successful forms of malware. As such, the classical groups of virus, rootkit, spyware and other categories typically used by the security industry to differentiate standalone protection products will be much less relevant in 2007.
In 2006, X-Force also observed considerable Web browser exploitation and a strong increase in the use of Web exploit obfuscation and encryption to make it difficult for signature-based intrusion detection and prevention products to detect attacks. X-Force data indicates that approximately 50 per cent of Web sites hosting exploit material designed to infect browsers now obfuscate or camouflage their attack, with approximately 30 per cent encrypting their payload.
The X-Force report also discusses the following key security statistics for 2006, among others:
” Within the last year, the volume of spam has increased by 100 per cent over what ISS reported in 2005.
” The U.S., Spain and France are the three largest originators of spam worldwide.
” After English, German is the most popular language in which spam messages are written. (X-Force predicts that as computer users become more savvy at detecting and deleting spam, spammers will increasingly localise their messages in languages other than English to improve the rate at which they are opened.)
” The most popular subject line for spam in 2006 was “Re: hi.”
” South Korea accounts for the highest source of phishing e-mails.Ã‚Â
” The largest threat category of malware in 2006 was Downloaders, accounting for 22 per cent of all malware. (A Downloader is a piece of low-profile malware that installs itself on machines for the purpose of later downloading a more sophisticated malware agent.)
” The most popular exploit used on the Internet to infect Web browsers with malware was for Microsoft’s MS-ITS vulnerability (MS04-013), disclosed in 2004.
” The busiest month in 2006 for vulnerability disclosure was June, while the busiest week was the week before Thanksgiving in November and the most popular day of the week to disclose vulnerabilities was Tuesday.