{"id":13642,"date":"2011-06-21T17:30:42","date_gmt":"2011-06-21T07:30:42","guid":{"rendered":"http:\/\/power-up.space\/?p=13642"},"modified":"2011-06-21T17:30:42","modified_gmt":"2011-06-21T07:30:42","slug":"avg-unveils-global-community-powered-threat-report-%e2%80%94-q2-2011","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=13642","title":{"rendered":"AVG unveils global Community Powered Threat Report \u2014 Q2-2011"},"content":{"rendered":"<p><strong>AVG unveils global Community Powered Threat Report \u2014 Q2-2011<\/strong><\/p>\n<p><strong><em>\u2018Trusted malware\u2019 on the rise, SpyEye causing havoc for businesses and Mac users latest targets for cyber attacks<\/em><\/strong><\/p>\n<p><strong>Melbourne, 21 June, 2011<\/strong> <strong>\u2013<\/strong> <strong><a href=\"http:\/\/www.avg.com.au\/\">AVG (AU\/NZ)<\/a><\/strong> Pty Ltd, the distributor of the award-winning AVG Internet and mobile security software in Australia, New Zealand and South Pacific, has announced the release of AVG Technologies\u2019 <a href=\"http:\/\/www.avg.com.au\/files\/media\/avg_threat_report_2011-q2.pdf\">\u201cAVG Community Powered Threat Report \u2013 Q2 2011\u201d<\/a>, providing insight, background and analysis on the trends and developments in the global threat landscape. \u00a0<\/p>\n<p><strong>\u2018Trusted malware\u2019<\/strong><\/p>\n<p>The report unearths how \u2018trusted malware\u2019 is continuing to grow at an alarming rate. In Q2, AVG\u2019s Threat Labs have seen an increase in the number of stolen digital certificates used to sign malware, before being distributed by hackers. A significant increase of over 300% was identified at the start of 2011 compared to the whole of 2010. The practice of trusting signed files is rapidly losing its strength.<\/p>\n<p><strong>Mac attack<\/strong><\/p>\n<p>As Macs continue to rise in popularity, they are increasingly becoming the latest victims of cyber crime, the report reveals. With the platform reaching crucial market share levels, it is starting to appear on the radar of cyber criminals. While it may be a new target platform, cyber criminals are using tried and tested social engineering techniques to attack Mac OS users.<\/p>\n<p><strong>Mobile malware<\/strong><\/p>\n<p>Increasingly, cyber crooks are using mobile malware to monetise using premium SMS and fake apps. Monetising techniques via mobile are much easier to operate than those in use on PCs. By spamming users to download apps or simply posting them on download stores or markets, the software distribution is easy and scalable.<\/p>\n<p><strong>An eye on SpyEye<\/strong><\/p>\n<p>The report provides insight into the most prevalent malware targeting online banking in the past few years \u2013 SpyEye. The rise in SpyEye means that users of Internet banking need to be extra vigilant, especially as victims of cyber attacks are increasingly considered to be accountable.<\/p>\n<p>A recent court ruling in the US concluded that it was in fact the victim\u2019s responsibility to protect their account credentials, rather than the bank \u2013 namely via the use of Internet security and identity protection tools.<\/p>\n<p>In the first half of 2011 the AVG Threat Labs investigated the operation of 702 Command and Control servers (C&amp;C). The research results match the geo location of the servers as well as the popularity of the various malware versions in use by each C&amp;C. The US holds the lead in Command and Control servers with 30% of the market share, followed by Ukraine with 22%.\u00a0<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Brazil <\/strong><\/p>\n<p>The United States still remains the dominant source of spam with English as the main language used in spam messages, followed by the UK with Brazil only just coming third. However, Brazil is rapidly closing that gap and is on course to overtake the UK, likely in the next quarter.<\/p>\n<p><strong>World Wild Web<\/strong><\/p>\n<p>\u201cIn Q2 cyber criminals have clearly been shifting their focus to new markets, with a clear goal on increasing revenue from their operations,\u201d said Yuval Ben-Itzhak, Chief Technology Officer, AVG Technologies. \u201cThe World Wide Web might as well be re-branded as the World Wild Web. Our research indicates that hundreds of live servers operating all around the world are active 24\/7 to steal users\u2019 credentials for online banking and other private assets. As attack techniques of hackers continue to get more advanced, users need to take action. Security products, with multi-layers of protection, are a must have to protect against the potentially damaging threats that lurk on the web. The user\u2019s computer platform is becoming irrelevant for these cyber criminals \u2013 Windows, Android, Mac and iOS are all targeted now.\u201d<\/p>\n<div>\n<p><strong>Other key findings include:<\/strong><\/p>\n<ul type=\"disc\">\n<li>11.3% of malware are using external hardware devices (e.g. flash drives) as a distribution method (AutoRun)<\/li>\n<li>Blackhole remains the most prevalent exploit toolkit in the wild, accounting for 75.83% of toolkits<\/li>\n<li>Exploit Toolkits are responsible for 37% of all threat activity<\/li>\n<li>32.9% of Spam messages originated from the USA followed by the United Kingdom with 3.9%<\/li>\n<\/ul>\n<\/div>\n<p>\u00a0<\/p>\n<p><strong>About the report<\/strong><br \/>\nThe AVG report is based on the Community Protection Network traffic and data followed by research from AVG, over a three-month period. It provides an overview of web, mobile devices, spam risks and threats.<\/p>\n<p>The statistics referenced are obtained from the AVG Community Protection Network, which is an online neighbourhood watch, helping everyone in the community to protect each other. Information about the latest threats is collected from customers who choose to participate in the product improvement program and shared with the community to make sure everyone receives the best possible protection.<\/p>\n<p>With more than 110 million users using AVG\u2019s various solutions, AVG provides powerful community protection. Each new user who chooses to participate increases the security level of the community as a whole.<\/p>\n<p>AVG is focused on building communities that help multiple-millions of online participants support each other on computer security issues and actively contribute to AVG\u2019s research efforts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AVG unveils global Community Powered Threat Report \u2014 Q2-2011 \u2018Trusted malware\u2019 on the rise, SpyEye causing havoc for businesses and Mac users latest targets for cyber attacks Melbourne, 21 June, 2011 \u2013 AVG (AU\/NZ) Pty Ltd, the distributor of the award-winning AVG Internet and mobile security software in Australia, New Zealand and South Pacific, has<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=13642\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-13642","post","type-post","status-publish","format-standard","hentry","category-game-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/13642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13642"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/13642\/revisions"}],"predecessor-version":[{"id":13645,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/13642\/revisions\/13645"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}