Blue Coat Systems unveiled their 2011 security report that examines Web behavior and the malware to which users are most frequently exposed. The report analyzes Web requests from the Blue Coat WebPulse service, which weekly rates nearly three billion requests in real-time, to provide an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Some of the most surprising Web usage trends from the report include:
Social networking as the new communication platform: Personal Pages/Blogs, Chat/Instant Messaging and Email are the second, third and fourth most requested subcategories of Social Networking, respectively. At the same time, Webmail was the 17th most requested Web category for 2010, falling from ninth in 2009, and fifth in 2008. This ongoing decline in popularity is driven by an overwhelming shift to social networking as the communication platform of choice for Internet users.
Web behavior is more business focused: As users around the world faced high unemployment and ongoing financial challenges, personal lust as a driving force of Web behavior shifted to a more business-oriented focus. Blue Coat saw a significant decline in requests for Web content in the Dating/Personals, Pornography and Adult/Mature Content categories in 2010. While these categories were fourth, fifth and eighth, on the list of the top 10 most requested categories in 2009, Audio/Video Clips, New/Media, and Reference dominated the top 10 in 2010.
The Web-based threat landscape continues to become more sophisticated, utilizing a combination of techniques and multiple stages to launch attacks. Among the biggest shifts for 2010 were the following:
Social networking becomes malware vector: In 2010, cybercrime successfully exploited trusted relationships between friends to quickly infect and harvest new users. Social network phishing and click-jacking attacks were the two most common types of attacks through social networks in 2010. The shift of phishing attacks to social networks is particularly driven by the attempt to obtain user credentials that can also provide access to banking, financial and other online accounts that use shared passwords.
Legitimate sites become part of attack infrastructure: One of the most noticeable shifts in the threat landscape in 2010 was the migration of attack infrastructures from free domains to known sites with trusted reputations and acceptable use category ratings. By hacking into trusted sites, cyber criminals can host attack infrastructures on sites that have good reputations.
Malware hides in acceptable web categories: Historically, malware has been hidden in categories that would traditionally be blocked by acceptable use policies. However, Online Storage and Open/Mixed Content, which ranked second and sixth, respectively, on the list of sites hosting malware, saw the fastest growth in 2010. The number of new Online Storage sites hosting malware increased 13 percent while the number of new Open/Mixed Content sites hosting malware increased 29 percent. Both of these categories typically fall within acceptable use policies for most companies.
Based on the findings, the report offers lessons that organizations can take away to better protect their employees and their confidential data, including:
Dynamic defense is key for malware protection: Using dynamic links, cybercrime can build attack infrastructures, changing only the location of the malware deliverable. Blocking malware delivery, call home attempts, scams and phishing requires a defense that can respond dynamically to rate new and unknown content and analyze the dynamic links that increasingly are part of malware attacks.
Real-time ratings are crucial to a successful web defense: Defenses that don’t analyze Web requests in real time and provide immediate ratings leave their users exposed to attacks that may only last for a few hours.
Rely less on reputation ratings: To avoid detection, cybercrime is increasingly hacking legitimate sites with good reputation ratings and using those sites to host attack infrastructures. A defense that only utilizes reputation ratings will leave its users exposed to those attacks.
Protect remote users: Web access is ubiquitous, so Web security needs to be 24/7 regardless of location.
Data loss driven by malware: No amount of data governance or automated prevention will stop data loss through malware, so organizations need to move to a dynamic Web defense that can identify command and control servers and block requests for and attempts to send data to those servers.
The complete report is available here.