CompUSA

Tuesday, January 27, 2009

Short-Lived Stealthy Attacks are the New Web Threats

/PRNewswire/ -- AVG Technologies, a leading developer of Internet security software, has released statistics that paint a scary picture of the way web-borne threats are developing. Unlike viruses, which make a point of being obvious and staying around for as long as they can, the primary characteristics of web infections today are stealth and transience - meaning they are secretive, short-lived and fast-moving.

Today's online threats frequently appear briefly on an otherwise legitimate site, moving on to other sites before they can be identified and blocked. In other instances, the criminal element behind these threats simply sets up hundreds of seemingly-legitimate web sites with embedded infections, promotes them for a day or two, and then shuts them down, never to be seen again. The rate of appearance of these 'here today, gone tomorrow sites' is increasing - in just the past three months, AVG researchers have seen the average number of unique new infective sites that appear growing from 100,000-200,000 a day to 200,000-300,000 a day, a pattern that looks set to continue.

One example of a transient threat is malicious advertising - known as 'malverts'. Online criminals simply create and submit a 'malvert' to an advertising network, which then unwittingly distributes the malicious advert to hundreds of sites. Computer users clicking on these ads, or even simply exposed to them accidentally, can become infected with data-stealing spyware.

There are plenty of other examples of threats where the user can be infected by simply visiting a web site, without even clicking on a link - so-called 'drive-by downloads' can steal passwords, bank account information and other valuable personal data without the user being any the wiser. AVG's research indicates that close to 60 percent of sites launching 'drive-by downloads' are infective for one day or less. Figure A below shows the typical length of time these transient infections are 'live'.

This transience means that anyone relying on security software that provides protection using traditional virus 'signatures' or by periodically scanning the millions of sites active on the web at any given time is completely unprotected just when they need that protection most: that crucial time when they click a link to a site poisoned with one of these transient infections.

According to AVG Technologies' CEO J.R. Smith, "the hallmark of today's web-borne infections is 'here today, gone tomorrow'. Any web security product that relies on visiting and scanning websites to deliver a safety rating to its users would have to visit every one of the hundreds of millions of sites on the Internet every day to provide protection against these threats - a technological impossibility even with today's supercomputers. Our recent acquisition of Sana Security's behavioral analysis technology adds yet another layer of protection that will help us to keep users safe from new and unknown threats."

Transient, rapidly-changing information is also a hallmark of social networks like Facebook and MySpace, so it's not surprising that cybercriminals have found fertile territory there. Messages from 'friends' that direct users to malicious pages, which then download infective malware in the background, are all-too-easy for people to mistakenly trust. Then there are links to music or video clips that ask users to download a seemingly-innocent multimedia program - but which carry a hidden threat.

AVG Technologies' Chief Research Officer Roger Thompson notes three key factors that make it particularly difficult for security companies to track and detect these types of threats:

"Firstly, it takes a long time to detect and close down threats distributed randomly across thousands of different pages on a large social networking site. Secondly, the threat is usually short-lived: a malicious program delivered through a popular site doesn't need to run for long to attract a large number of victims. And thirdly, the Internet is so large that scanning every web page for a threat that may only be present for a few hours or days is simply not feasible."

AVG takes a different approach to protecting users against these hidden threats. The company's LinkScanner web security software brings together data from experts and users alike to provide a crucial layer of real-time protection for all AVG's security products.

Thompson believes this layered approach is vital given the nature of today's threats. "If a site contains one bad thing, it might easily contain multiple bad things - and usually does. By bring together data from multiple sources, we're able to build a very complete picture of individual threats and provide the appropriate protection.

"It's important that users understand traditional anti-virus software, while still an important part of online security, is no longer able to provide protection against every individual virus out there - our labs are seeing tens of thousands of new viruses every day. So what we do is look at the behavior of these threats - which is a much more manageable task because there are far fewer different ways in which the threats are delivered. It's rather like detecting letter bombs - we get enough data from our research to be able to identify a threat (the bomb) by the delivery mechanism (the envelope enclosing the bomb)."

AVG software provides the most timely, precise and reliable protection for Internet users by analyzing web pages at the only time it matters - when the user is about to visit them. AVG offers the industry's only real-time protection against the new generation of web-borne threats to protect users' personal information against unwanted intrusions from cybercriminals.

-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page

No comments: