{"id":16360,"date":"2011-10-12T18:01:37","date_gmt":"2011-10-12T08:01:37","guid":{"rendered":"http:\/\/power-up.space\/?p=16360"},"modified":"2011-10-12T18:01:37","modified_gmt":"2011-10-12T08:01:37","slug":"avg-unveils-global-community-powered-threat-report-%e2%80%94-q3-2011","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=16360","title":{"rendered":"AVG unveils global Community Powered Threat Report \u2014 Q3-2011"},"content":{"rendered":"<p><strong>AVG unveils global Community Powered Threat Report \u2014 Q3-2011<\/strong>\u00a0\u00a0<\/p>\n<p><em>Pickpocketing Digital Currency the new gold mine, criminals outsourcingmoney collecting to mobile operators and eavesdropping on Android<\/em><em>\u00a0\u00a0<\/em><\/p>\n<p><strong>MELBOURNE and AMSTERDAM, 12 October 2011<\/strong> \u2014 <a href=\"http:\/\/www.avg.com.au\/\">AVG (AU\/NZ) Pty Ltd<\/a>, the Australian, New Zealand and South Pacific distributor of the award-winning AVG Internet and mobile security software, today released the \u201cAVG Community Powered Threat Report \u2014 Q3 2011\u201d, providing insight, background and analysis on the trends and developments in the global online security threat landscape. Highlights in this quarter\u2019s report are the risks of digital wallets, using mobile phone operators to collect money and how an Android Trojan records your calls.<\/p>\n<ul>\n<li>Last month, Keith Alexander, director of the US National Security Agency told attendees of the &#8220;Maneuvering in Cyberspace&#8221; conference that the global cost of cybercrime is estimated to be US$1 trillion. (1*)<\/li>\n<li>Last week, the PCeU \u2014 the e-crime unit of the UK Metropolitan Police \u2014 reported to have prevented over \u00a3140 million-worth of cybercrime in the UK over the last six months alone. (2*)<\/li>\n<li>A recent report by the Ponemon Institute \u2014 a U.S. based information security policy research centre \u2014 states that over the past year, the median cost of cybercrime increased by 56 percent and now costs companies an average of US$6 million per year. (3*)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth billions. In this report AVG focuses on some of the most notable cybercrime developments in the last quarter.<\/p>\n<p><strong>Stealing digital currency<\/strong><\/p>\n<p>Digital Currency has become very popular in a short time. Facebook Credits, Xbox Points, Zynga coins and Bitcoin now play a vital role in a multi-billion dollar global gaming economy. Far from being just of virtual value, many of these currencies are actively traded for real currency. This has not gone unnoticed by cyber criminals, now aiming to steal digital wallets from people\u2019s computers. In June a digital wallet containing close to US$500,000 was stolen when someone broke into the victim\u2019s computer and transferred most, but not all, of the money out of his wallet.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Outsourcing the hard part, collecting the money<\/strong><\/p>\n<p>In a bid to outsource the hassle and risks of collecting the money, cyber criminals are moving beyond credit cards details and are increasingly using mobile phone operators to do the collecting for them. A criminal might install a Trojan on to a victim\u2019s smartphone that sends premium SMS messages when the owner is asleep. They might use a Facebook scam to get hold of people\u2019s phone numbers and sign them up for an expensive monthly phone charge. A victim\u2019s mobile operator will process the charges and transfer the money to the criminal organisation, even if they reside on the other side of the world. If and when a victim notices the charge and the mobile operator is alerted to stop processing payments, considerable amounts may already have been stolen. If the amounts are small enough, many victims may not even notice for months.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Eavesdropping on Android<\/strong><\/p>\n<p>With Android taking almost 50% of the world\u2019s smartphone market share, it is no wonder that cyber criminals consider the platform an attractive target. Most Android malware focuses on making money from premium SMS. However, in July AVG investigated a Trojan that records a victim\u2019s phone conversation and SMS messages and sends them to the attacker\u2019s servers for analysis to identify potential confidential data. This clearly demonstrates the power of modern mobile operating systems but also the tremendous risks unprotected mobile users are open to.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Other key findings in the report:<\/strong><\/p>\n<ul>\n<li>Rogue AV Scanner is currently the most active threat on the web<\/li>\n<li>Exploit Toolkits account for over 30% of all threat activity on malicious websites (\u2018Fragus\u2019 is most popular, closely followed by \u2018Blackhole\u2019)<\/li>\n<li>Angry Birds Rio Unlocker is the most popular malicious Android application<\/li>\n<li>The USA is still the largest source of spam, followed by India and Brazil<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>\u201cIn Q3 we started to see a clear trend in cybercriminals shifting their focus to simplifying money collection,\u201d said Yuval Ben-Itzhak, Chief Technology Officer, AVG Technologies. \u201cWell-organised criminal gangs are now letting mobile phone operators handle the money collecting part by focusing on mobile phones and setting victims up for charges that will appear on their phone bill some time later. Not only is it a lot easier, it also scales to tremendous volumes making money by stealing small amounts from very large groups of victims.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>A recent report authored by the research agency The Future Laboratory (<a href=\"http:\/\/www.avg.com\/filedir\/news\/2011_09_09_Future%20Poll_Cybercrime_Futures.pdf\">Cybercrime_Futures<\/a>), reveals that while cyber criminals and malicious programs are becoming increasingly sophisticated and difficult to detect, users are, alarmingly, becoming the weakest link as they are less vigilant about protecting their online devices. The combination of these two factors presents a potentially disastrous cybercrime scenario.<\/p>\n<p>&nbsp;<\/p>\n<p>JR Smith, CEO of AVG Technologies, said \u201cIt\u2019s increasingly evident that each unprotected individual makes us all more vulnerable, so it\u2019s vital that as a global society we find ways to address this trend and ensure that we are protected together. We\u2019re securing people\u2019s digital life, or as we like to say: Providing Peace of Mind to the Connected World.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><strong>About the report<\/strong><br \/>\nThe AVG Community Powered Threat Report is based on the Community Protection Network traffic and data, collected over a three-month period, followed by analysis by AVG. It provides an overview of web, mobile devices, Spam risks and threats. All statistics referenced are obtained from the AVG Community Protection Network.<\/p>\n<p>&nbsp;<\/p>\n<p>The AVG Community Protection Network is an online neighbourhood watch, helping everyone in the community to protect each other. Information about the latest threats is collected from customers who choose to participate in the product improvement program and shared with the community to make sure everyone receives the best possible protection.<\/p>\n<p>&nbsp;<\/p>\n<p>AVG has focused on building communities that help millions of online participants support each other on computer security issues and actively contribute to AVG\u2019s research efforts.<\/p>\n<p><strong>Full Q3 Threat Report: <\/strong><a href=\"http:\/\/www.avg.com.au\/files\/media\/avg_threat_report_2011-q3.pdf\">AVG_Community_Powered_Threat_Report_Q3_2011<\/a> (33 pages, 3.5 Mb PDF) \u00a0<\/p>\n<p>&nbsp;<\/p>\n<p>1*<a href=\"http:\/\/www.computerworlduk.com\/news\/security\/3303786\/us-needs-to-be-prepared-for-a-big-cyber-attack\/\">http:\/\/www.computerworlduk.com\/news\/security\/3303786\/us-needs-to-be-prepared-for-a-big-cyber-attack\/<\/a><\/p>\n<p>2* <a href=\"http:\/\/www.guardian.co.uk\/uk\/2011\/oct\/02\/cyber-crime-unit-met-police?newsfeed=true\">http:\/\/www.guardian.co.uk\/uk\/2011\/oct\/02\/cyber-crime-unit-met-police<\/a><\/p>\n<p>3* <a href=\"http:\/\/www.ponemon.org\/blog\/post\/second-cost-of-cyber-crime-study-is-released-today\">http:\/\/www.ponemon.org\/blog\/post\/second-cost-of-cyber-crime-study-is-released-today<\/a>\u00a0\u00a0<\/p>\n<p><strong>Keep in touch with AVG (AU\/NZ)<\/strong><\/p>\n<ul>\n<li>For breaking news, follow AVG (AU\/NZ) on Twitter at <a href=\"http:\/\/twitter.com\/avgaunz\">twitter.com\/avgaunz<\/a><\/li>\n<li>Join our Facebook community at <a href=\"http:\/\/www.facebook.com\/avgaunz\">www.facebook.com\/avgaunz<\/a><\/li>\n<li>For security trends, analysis, follow the AVG (AU\/NZ) blog at <a href=\"http:\/\/resources.avg.com.au\/\">resources.avg.com.au<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>AVG unveils global Community Powered Threat Report \u2014 Q3-2011\u00a0\u00a0 Pickpocketing Digital Currency the new gold mine, criminals outsourcingmoney collecting to mobile operators and eavesdropping on Android\u00a0\u00a0 MELBOURNE and AMSTERDAM, 12 October 2011 \u2014 AVG (AU\/NZ) Pty Ltd, the Australian, New Zealand and South Pacific distributor of the award-winning AVG Internet and mobile security software, today<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=16360\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16360","post","type-post","status-publish","format-standard","hentry","category-game-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/16360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16360"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/16360\/revisions"}],"predecessor-version":[{"id":16362,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/16360\/revisions\/16362"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}