skip to main | skip to sidebar

TechsVilla

HOUSE OF TECH FOR ZEALERS

  • TECH
  • GAME
  • BLOG
  • WINDOW
  • LINUX
  • APPLE
  • SECURE
  • MSN
  • TIPS
  • 3 reasons trustworthy sites can no longer be trusted

    Monday, March 21, 2011

    3 reasons trustworthy sites can no longer be trusted

    Research from Blue Coat Systems claims cybercriminals have shifted their malware-delivery technique from the internet's shadier sites and are hacking the domains we visit every day

    Last year, malware became increasingly more common on popular and trusted domains, according to research released this week by security firm Blue Coat Systems. Migration to popular hacked sites with trusted reputations and acceptable-use category ratings was the primary theme for hosting malware delivery infrastructure, researchers claim.
    Cybercriminals are hacking trusted sites using stolen access credentials in order to launch attacks that are out in the open, but also veiled from reputation filters and commonly blocked web categories. Here are three reasons researchers say you need to be wary — even on sites you count as safe:
    Cybercriminals are patient and willing to put in the work
    Patience delivers payoffs, according to Blue Coat researchers, who note criminals will often wait months to establish legitimate web site infrastructure that will get past reputation-based software filtering. The most common example of this type of exploitation is malvertising (malware advertising) attacks.
    "For example, a relatively new ad domain that had existed for approximately six months had been checked several times for malware with clean ratings when it picked a day in early November to selectively target and deliver its cloaked malware payload," the report states. "The next day it was gone."
    In other words, the cybercriminal will wait months and allow their intended malicious site to develop a clean reputation within ad networks. It will allow the site to accept categorizations and pass multiple sweeps for malware in order to seem innocent and gain a trusted position within Web advertising. Once that is accomplished, the site will launch an attack during a particularly vulnerable time, such as the weekend when IT support staff is low, the report said.
    Roughly 75 percent of phishing attacks now reside on trusted domains that have been hacked
    Cybercriminals use search engines to find domains that use vulnerable-hosting software. These domains are prime hacking candidates, according to the research. Phishing attacks are more common to reputed websites now because criminals know users often have the same credentials for several accounts, including bank accounts and social networking accounts. Chances are if a thief gets a hold of your Facebook log in or banking password, they will be able to use it in other lucrative places.
    "Most people associate phishing with SPAM and email attacks; however, social networking has opened a new door for social engineering web-based phishing attacks," the report states. "While classical phishing still exists, cyber crime has moved to social networking attacks to enter the picture as a trusted link between friends, either to deliver malware or to phish for confidential and financial information."
    The report also notes criminals are poisoning search results and using search engine optimization (SEO) and link-farming techniques to deliver malware.
    "These efforts have shifted from free domains to hacked sites with reputable domains in an effort to be better hidden from defenses," the report said.
    Criminals are increasingly targeting the most popular web destinations
    Historically, malware has been hidden on sites that would traditionally be blocked by any good filtering software. But the Blue Coat research finds online storage sites, which include photo-sharing sites like Flickr, and open/mixed content sites, such istockphoto and YouTube, saw the fastest growth in malware activity in 2010.
    "The number of new online storage sites hosting malware increased 13 percent while the number of new open/mixed content sites hosting malware increased 29 percent. Both of these categories typically fall within acceptable use policies for most companies," the report claims.
    The report cites an example of a phishing attack on AOL, which hosts bebo.com with tens of millions of users. The phish established with animation what appeared to be three-step secure Web login sending personal information to the AOL billing center. Once there, the user was presented with an elaborate Web page that collects personal, credit card, banking and login credential information with a warning that AOL would never send an email to collect this information.
    The report also cites research from Kaspersky Lab which lists its top 10 places to watch out for phishing predators. The list includes some of the world's most popular web sites, including Paypal, Ebay, HSBC, Facebook, Google, IRS, RAPIDSHARE, Bank of America, UBI (United Bank of India), and Bradesco (one of the four leading banks in Brazil).

    Posted by Rajan Chatterjee at 6:54 PM Email This BlogThis! Share to X Share to Facebook

    0 comments:

    Post a Comment

    Newer Post Older Post Home
    Subscribe to: Post Comments (Atom)
    Powered by Blogger.
    • Home
    • TWEAK PC
    • MICROSOFT NEWS
    • CYBER SECURITY
    • APPLE
    • LINUX
    • WINDOWS
    • WEB DESIGNING
    • GAMING
    • TECHVISION

    TechsVilla Corner

    Loading...

    Blog Archive

    • ▼  2011 (156)
      • ►  April (5)
      • ▼  March (151)
        • PC won't boot up? How to find out why it so....
        • Mac OS X 10.7 Lion: what you need to know
        • In Depth: Our preview of the best of the new phone...
        • Kinect For Xbox 360 Hacked To Work With Sony PlayS...
        • Next Generation Xbox Hardware To Surface By 2015?
        • Tethered Jailbreak for iOS 4.3.1 Now Available (Bu...
        • iOS 4.3.1 Jailbroken Already Using PwnageTool. Her...
        • 3DS Crashing To “Black Screen Of Death”?
        • Panasonic And Partners Announce New M-3DI Active-S...
        • MIT Scientist Claims To Have Created Practical “Ar...
        • SSDs have been on my Amazon Wishlist for over ...
        • Windows Phone 7 gets copy and paste update
        • Windows 8: everything you need to know
        • The Only Secure Password Is the One You Can’t Reme...
        • Honeywell’s Home Automation Touchscreen: Security ...
        • How to research your users
        • Bulletstorm review
        • Homefront Review
        • Forza Motorsport 4: Capitalising on GT5's missteps?
        • Crash Time 4: The Syndicate Review
        • iPad 2 review Apple's new tablet is the best of i...
        • Firefox 4 review It's the best Firefox yet. Is it...
        • How Mozilla turned the corner with Firefox 4
        • Fly or Die: The Nintendo 3DS, Rockmelt, And Mobile...
        • Robocast Sues Apple For Infringing Its ‘Automated ...
        • Drunk On Licensing Fees And Patents, Microsoft Has...
        • http://techcrunch.com/2011/03/22/googlers-buy-more...
        • This tip will explain How to open a file manager o...
        • Social Media Risks: The Basics
        • 9 Dirty Tricks: Social Engineers' Favorite Pick-Up...
        • 3 reasons trustworthy sites can no longer be trusted
        • Facebook is biggest mobile malware threat, says se...
        • Malware exploding, especially on mobile devices
        • Local ethical hackers nurtured in Kenya
        • Mobile security moving to the forefront? Extending...
        • Expert: RSA security breach compromised key federa...
        • Anonymous Exposed: Hacker Group Infiltrated, Chat ...
        • How your operating system works
        • Libre Graphics Meeting: Cutting Edge Creative Tool...
        • Red Hat Announces EMEA Partner Summit: Dublin Ireland
        • Create a social media icon
        • Nintendo 3DS released
        • SPLIT/SECOND
        • HALO REACH
        • Assassin’s Creed: Brotherhood
        • SPIDER-MAN: SHATTERED DIMENSIONS
        • Apple: Judging an app by its icon
        • Master the Windows 7 Action Center
        • Share files between Windows Vista and Windows 7
        • Download and install the best gadgets
        • CES 2011: More details about the Windows Phone 7 u...
        • Netbook ultimate guide
        • Get more from email
        • Reinstall Windows For The Last Time
        • HTC Incredible S To Come In Strawberry Red?
        • The Magic Connector Unifies The Apple Wireless Key...
        • Every Super Nintendo Game Ever – Yours For $9999!
        • Prevent E-mail Disasters: 5 Tools to Protect You f...
        • Apple Tweaks In-App Purchase To Prevent Accidental...
        • Analyst: Non-iPad Tablets Will Be Collecting Dust ...
        • PS3 To Be Re-Secured by 3.60 Firmware
        • Apples To Apples: Apple Inc. Files For Apple Corps...
        • AT&T DSL Adopts 250GB Monthly Bandwidth Cap
        • Google Maps Can Now Locate EV Charging Stations
        • M-Edge’s Case Designer Lets You Customize Your iPa...
        • MicroCenter Takes Up To $200 Off MacBook Pro
        • Bang And Olufsen Bring 16 Speakers To The New BMW ...
        • Protect your home with your webca
        • 9 Steps to get Windows Vista help from your friend...
        • The Best Flash Sites Ever
        • Web fonts: the .net top 20
        • Best web design: How to create better layouts from...
        • Best Graphics/Design Tool
        • Best Digital Photo Management Tool
        • Best IRC Client Pidgin Honorable Mention/Runner Up...
        • Best Single Office Program
        • Best Office Suite
        • Best Microblogging Client
        • Best IM Client
        • Best E-mail Client
        • Best Web Browser
        • Best Desktop Environment
        • Best Mobile OSGoogle Android Honorable Mention/Run...
        • Best Distribution for Netbooks/Limited Hardware
        • Best Linux Distribution
        • Apples To Apples: Apple Inc. Files For Apple Corps...
        • Adobe Just Made Medialets Its Mobile Ad Server
        • Apple Keeps Right On Approving Amazon And Netflix ...
        • Study: Mobile Ad-Tracking Systems Are “Blind” To 8...
        • The Ever-Elusive Mobile Wallet: Why NFC Chips Are ...
        • It’s A Good Day To Be An iPad Competitor . . . Oh ...
        • Why Payments Are Hard, Even For Apple And Google
        • Dear Apple, Please Copy This Notification System F...
        • Explor, Touch-Based App Discovery To Get Around Th...
        • Adobe’s Wallaby Can’t Jump Very High
        • As Apple Ponders Their Subscription Ruling, Readab...
        • Video: Hands-On With An Engineering Prototype 64GB...
        • On Apple TV Special Apps, Sports, And The Slow Ble...

    Popular Posts Widget

    • SPIDER-MAN: SHATTERED DIMENSIONS
      RATINGS 4/5 Action Spider-Man: Shattered Dimensions Price       Rs 3,499 (PS3) PUBLISHER          Activision DEVELOPER         Beenox PLA...
    • Web fonts: the .net top 20
      Web fonts: the .net top 20 It’s easier than ever to get creative with typefaces. Elliot Jay Stocks picks 20 web fonts that demand your vis...
    • Mac OS X 10.7 Lion: what you need to know
      Steve Jobs and other senior Apple employees provided   a glimpse   into Mac OS X 10.7 'Lion', making clear Apple's philosophy re...
    • Wireframe tools: the top 10 solutions
      Create your next prototype the easy way with our guide to the best wireframing tools out there Every website design has to ki...
    • PC won't boot up? How to find out why it so....
      You press the power button and your PC won't boot up. What do you do next? Don't write it off just yet. The first thing to do when ...

    Total Pageviews

    Subscribe To

    Posts
    Atom
    Posts
    Comments
    Atom
    Comments

    About Me

    Rajan Chatterjee
    I m Student Of computer Scince Engineering and tech-savvy person have unlimit zeal for programming and technology
    View my complete profile

    Followers

    Copyright © 2010 TechsVilla | Blogger Templates by Splashy Templates
    Css Designed by Hot Website Templates