SlideShare a Scribd company logo
1 of 19
Symantec Intelligence Report

    June 2012


Symantec Intelligence              1
About the Symantec Intelligence Report

The Symantec Intelligence report provides the latest analysis of
cyber security threats, trends and insights from the Symantec
Intelligence team concerning malware, spam, and other
potentially harmful business risks.


The data used to compile the analysis for this combined report
includes data from May and June 2012.




Symantec Intelligence                                              2
October 2011 Highlights
• 36% of targeted attacks directed at SMBs
• Further analysis of W32.Flamer
• In-depth look a recently attempted targeted attack
• Spam – 66.8 percent (a decrease of 1.0 percentage point since
  May 2012)
• Phishing – One in 467.6 emails identified as phishing (an
  increase of 0.04 percentage points since May 2012)
• Malware – One in 316.5 emails contained malware (an increase
  of 0.04 percentage points since May 2012)
• Malicious Web sites – 2,106 Web sites blocked per day (a
  decrease of 51.7 percent since October 2011)

Symantec Intelligence                                             3
Targeted Attacks in 2012
• Daily targeted attacks increased by a minimum of 24%.
• More than 36% of all targeted attacks are aimed at small
  companies, compared to 18% at the end of 2011.
• Direct correlation between a rise in attacks against small
  companies and a drop in attacks against larger ones.
• 45% of all targeted attacks are aimed at the Defense industry.
• In four of the top five source countries, their own country is
  either the first or second-most targeted country.




Symantec Intelligence                                              4
Spam Rate & Sources
                      5
Symantec Intelligence   ‹#›
Additional Spam Metrics
Spam URL TLD Distribution

                                                         Change
TLD                          June         May
                                                       (% points)
.com                         74.7%       66.6%              +8.1
.ru                          4.1%        7.5%                -3.4
.net                         4.6%        5.8%                -1.2
.br                          2.9%        3.4%                -0.5

 Average Spam Message Size

                                                         Change
Message Size                     June            May
                                                       (% points)

0Kb – 5Kb                        43.1%       51.1%           -8.0
5Kb – 10Kb                       33.3%       29.1%          +4.2
>10Kb                            23.6%       19.8%          +3.8



Symantec Intelligence                                               7
Spam Subject Line Analysis
        June 2012                               No. of   May 2012                                    No. of
Rank    Total Spam: Top Subject Lines            Days    Total Spam: Top Subject Lines                Days
1      Delivery Status Notification (Failure)       28   Save-8O%-0ff-Viagra©-Cia1is©-Levitra©           28
2      Save-8O%-0ff-Viagra©-Cia1is©-Levitra©        28   (blank subject)                                 30
                                                         High-End-Designer-Watch-Replicas-Save-
3      (blank subject)                              28                                                   22
                                                         THOUSANDS-2012-Models
                                                         HIGH-QUALITY-ROLEX-REPLICA-
4      My Sexy Pics                                 28                                                   17
                                                         WATCHES&DESIGNER BAGS
                                                         ADD THREE INCHES TO YOUR MANHOOD
5      0                                             5                                                   19
                                                         NOW!
       We cant make it ANY EASIER toget LAID
6                                                   16   Order confirmation                               8
       tonight
       HIGH-QUALITY-ROLEX-REPLICA-                       Hey, You Need To Cum Check out My FucBook
7                                                   23                                                   14
       WATCHES&DESIGNER BAGS                             Page! :)
8      look at my photos                            13   Undelivered Mail Returned to Sender             30

9      Buy Viagra/Cialis Online!                     3   look at my photos                                7

10     ENLARGE YOUR MANHOOD 2-4 INCHES              22   Erika Sent You A Message                         7




Symantec Intelligence                                                                                         8
Additional Spam Metrics
Global Spam Categories

Category Name             June 2012   May 2012
Adult/Sex/Dating            64.28%     70.16%
Pharma                      18.76%     19.22%
Casino                       5.24%      0.88%
Jobs                         4.72%      3.47%
Watches                      2.94%      3.45%
Software                     1.67%      1.78%
Degrees                      0.47%      0.57%
419/Scam/Lotto               0.27%      0.13%
Mobile                       0.09%      0.14%
Newsletters                  0.08%      0.03%
Weight Loss                 <0.01%      0.08%




Symantec Intelligence                            9
Phishing Rate & Sources




                          10
Phishing Rate & Sources




                          11
Tactics of Phishing Distribution
     Automated Toolkits                          55.5%

 Other Unique Domains                    36.9%

     IP Address Domains       2.8%

 Free Web Hosting Sites           4.0%

           Typosquatting   0.8%




Symantec Intelligence                                    12
Organizations Spoofed in Phishing Attacks, by Industry
Sector
              Banking                               46.1%

         E-Commerce                         34.9%

  Information Services              15.0%

                 Retail     1.4%

      Communications        1.1%

  Telecommunications       0.919%

         Government       0.439%

          Retail Trade    0.078%

              Security    0.048%

            Insurance     0.019%

                    ISP   0.011%




Symantec Intelligence                                       13
Virus Rate




             14
Most Frequently Blocked Email Malware
   Malware Name                         % Malware
   W32/Bredolab.gen!eml.k                 17.43%
   W32/Bredolab.gen!eml.j                  9.49%
   Link-Exploit/Spam-3a71                  3.82%
   W32/NewMalware!16a0                     3.48%
   Exploit/Link-generic-ee68               3.22%
   W32/NewMalware-Generic-a2a1-3477        2.34%
   HTML/JS-Encrypted.gen                   1.69%
   Trojan.Bredolab                         1.56%
   W32/Bredolab.gen!eml-01cd               1.52%
   Link-Gen:Variant.Barys.1516.dam         1.43%




Symantec Intelligence                               15
New Malware and Spyware Sites Per Day




Symantec Intelligence                   16
Policy, Malware & Potentially Unwanted Programs




Symantec Intelligence                             17
Most Frequently Blocked Malware at the Endpoint
  Malware Name                                                                                                                           % Malware
  WS.Trojan.H                                                                                                                                29.06%
  W32.Sality.AE                                                                                                                               6.81%
  W32.Ramnit!html                                                                                                                             6.01%
  W32.Ramnit.B                                                                                                                                5.61%
  W32.Downadup.B                                                                                                                              3.82%
  W32.Ramnit.B!inf                                                                                                                            3.53%
  W32.Virut.CF                                                                                                                                2.07%
  Trojan.ADH.2                                                                                                                                2.00%
  W32.Almanahe.B!inf                                                                                                                          1.83%
  Trojan.ADH                                                                                                                                  1.43%




                        [1] For further information on these threats, please visit: http://www.symantec.com/business/security_response/landing/threats.jsp




Symantec Intelligence                                                                                                                                        18
Where to next?
• Web:
    – www.symanteccloud.com/intelligence
    – www.symantec.com/spam


• Twitter:
    – @symanteccloud




Symantec Intelligence                      19

More Related Content

Viewers also liked

Open For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusionOpen For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusionBrunswick Group
 
CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016Andrew Gunn
 
Getting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStackGetting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStackAnthony Chow
 
Best Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageBest Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageRyan Snell
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Accenture Technology
 

Viewers also liked (6)

Open For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusionOpen For Business - The economic & business case for global LGBT inclusion
Open For Business - The economic & business case for global LGBT inclusion
 
CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016CV Andrew Gunn Feb 2016
CV Andrew Gunn Feb 2016
 
Getting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStackGetting over the barrier and start contributing to OpenStack
Getting over the barrier and start contributing to OpenStack
 
Best Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageBest Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash Storage
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3
 
99 Facts on the Future of Business
99 Facts on the Future of Business99 Facts on the Future of Business
99 Facts on the Future of Business
 

Similar to Symantec Intelligence Report June 2012 Highlights

2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report2012 February Symantec Intelligence Report
2012 February Symantec Intelligence ReportSymantec
 
Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec
 
Multiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the ProsMultiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the ProsLitmus
 
2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report2011 September Symantec Intelligence Report
2011 September Symantec Intelligence ReportSymantec
 
Webinar presentation-for-web
Webinar presentation-for-webWebinar presentation-for-web
Webinar presentation-for-webBoni
 
DMA digital tracking study May 2010
DMA digital tracking study May 2010DMA digital tracking study May 2010
DMA digital tracking study May 2010Bryan Miller
 
Multiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpopMultiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpopSilverpop
 
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)Global Business Events
 
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...McKinley Advisors
 
Security4all Desktop Security
Security4all   Desktop SecuritySecurity4all   Desktop Security
Security4all Desktop SecurityBen W.
 
Mobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail SectorMobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail SectorMobilosoft
 
McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011McDougall Interactive
 
2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source results2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source resultsBryan House
 
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de marktMobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de marktShareforce
 
Mobile Email: Why, What, How
Mobile Email: Why, What, HowMobile Email: Why, What, How
Mobile Email: Why, What, HowLitmus
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec
 

Similar to Symantec Intelligence Report June 2012 Highlights (20)

2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report
 
Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011
 
Multiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the ProsMultiscreen Email Design: Lessons from the Pros
Multiscreen Email Design: Lessons from the Pros
 
2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report
 
Webinar presentation-for-web
Webinar presentation-for-webWebinar presentation-for-web
Webinar presentation-for-web
 
DMA digital tracking study May 2010
DMA digital tracking study May 2010DMA digital tracking study May 2010
DMA digital tracking study May 2010
 
Multiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpopMultiscreen mobile email design strategy silverpop
Multiscreen mobile email design strategy silverpop
 
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
 
Reeves - Williams
Reeves - WilliamsReeves - Williams
Reeves - Williams
 
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
 
Security4all Desktop Security
Security4all   Desktop SecuritySecurity4all   Desktop Security
Security4all Desktop Security
 
Credit Suisse Group Financial Services Forum
	Credit Suisse Group Financial Services Forum 	Credit Suisse Group Financial Services Forum
Credit Suisse Group Financial Services Forum
 
Mobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail SectorMobile Web presence among the Belgian Retail Sector
Mobile Web presence among the Belgian Retail Sector
 
McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011McDougall Interactive-presentation - 2011
McDougall Interactive-presentation - 2011
 
LonghornPHP - CVE 101.pdf
LonghornPHP - CVE 101.pdfLonghornPHP - CVE 101.pdf
LonghornPHP - CVE 101.pdf
 
BNYMellon - CVE 101.pdf
BNYMellon - CVE 101.pdfBNYMellon - CVE 101.pdf
BNYMellon - CVE 101.pdf
 
2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source results2009 NBVP Future of Open Source results
2009 NBVP Future of Open Source results
 
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de marktMobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
Mobile PIoneers - Distimo - Hendrik Koekoek - Visie op de markt
 
Mobile Email: Why, What, How
Mobile Email: Why, What, HowMobile Email: Why, What, How
Mobile Email: Why, What, How
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 

Recently uploaded (20)

Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 

Symantec Intelligence Report June 2012 Highlights

  • 1. Symantec Intelligence Report June 2012 Symantec Intelligence 1
  • 2. About the Symantec Intelligence Report The Symantec Intelligence report provides the latest analysis of cyber security threats, trends and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this combined report includes data from May and June 2012. Symantec Intelligence 2
  • 3. October 2011 Highlights • 36% of targeted attacks directed at SMBs • Further analysis of W32.Flamer • In-depth look a recently attempted targeted attack • Spam – 66.8 percent (a decrease of 1.0 percentage point since May 2012) • Phishing – One in 467.6 emails identified as phishing (an increase of 0.04 percentage points since May 2012) • Malware – One in 316.5 emails contained malware (an increase of 0.04 percentage points since May 2012) • Malicious Web sites – 2,106 Web sites blocked per day (a decrease of 51.7 percent since October 2011) Symantec Intelligence 3
  • 4. Targeted Attacks in 2012 • Daily targeted attacks increased by a minimum of 24%. • More than 36% of all targeted attacks are aimed at small companies, compared to 18% at the end of 2011. • Direct correlation between a rise in attacks against small companies and a drop in attacks against larger ones. • 45% of all targeted attacks are aimed at the Defense industry. • In four of the top five source countries, their own country is either the first or second-most targeted country. Symantec Intelligence 4
  • 5. Spam Rate & Sources 5
  • 7. Additional Spam Metrics Spam URL TLD Distribution Change TLD June May (% points) .com 74.7% 66.6% +8.1 .ru 4.1% 7.5% -3.4 .net 4.6% 5.8% -1.2 .br 2.9% 3.4% -0.5 Average Spam Message Size Change Message Size June May (% points) 0Kb – 5Kb 43.1% 51.1% -8.0 5Kb – 10Kb 33.3% 29.1% +4.2 >10Kb 23.6% 19.8% +3.8 Symantec Intelligence 7
  • 8. Spam Subject Line Analysis June 2012 No. of May 2012 No. of Rank Total Spam: Top Subject Lines Days Total Spam: Top Subject Lines Days 1 Delivery Status Notification (Failure) 28 Save-8O%-0ff-Viagra©-Cia1is©-Levitra© 28 2 Save-8O%-0ff-Viagra©-Cia1is©-Levitra© 28 (blank subject) 30 High-End-Designer-Watch-Replicas-Save- 3 (blank subject) 28 22 THOUSANDS-2012-Models HIGH-QUALITY-ROLEX-REPLICA- 4 My Sexy Pics 28 17 WATCHES&DESIGNER BAGS ADD THREE INCHES TO YOUR MANHOOD 5 0 5 19 NOW! We cant make it ANY EASIER toget LAID 6 16 Order confirmation 8 tonight HIGH-QUALITY-ROLEX-REPLICA- Hey, You Need To Cum Check out My FucBook 7 23 14 WATCHES&DESIGNER BAGS Page! :) 8 look at my photos 13 Undelivered Mail Returned to Sender 30 9 Buy Viagra/Cialis Online! 3 look at my photos 7 10 ENLARGE YOUR MANHOOD 2-4 INCHES 22 Erika Sent You A Message 7 Symantec Intelligence 8
  • 9. Additional Spam Metrics Global Spam Categories Category Name June 2012 May 2012 Adult/Sex/Dating 64.28% 70.16% Pharma 18.76% 19.22% Casino 5.24% 0.88% Jobs 4.72% 3.47% Watches 2.94% 3.45% Software 1.67% 1.78% Degrees 0.47% 0.57% 419/Scam/Lotto 0.27% 0.13% Mobile 0.09% 0.14% Newsletters 0.08% 0.03% Weight Loss <0.01% 0.08% Symantec Intelligence 9
  • 10. Phishing Rate & Sources 10
  • 11. Phishing Rate & Sources 11
  • 12. Tactics of Phishing Distribution Automated Toolkits 55.5% Other Unique Domains 36.9% IP Address Domains 2.8% Free Web Hosting Sites 4.0% Typosquatting 0.8% Symantec Intelligence 12
  • 13. Organizations Spoofed in Phishing Attacks, by Industry Sector Banking 46.1% E-Commerce 34.9% Information Services 15.0% Retail 1.4% Communications 1.1% Telecommunications 0.919% Government 0.439% Retail Trade 0.078% Security 0.048% Insurance 0.019% ISP 0.011% Symantec Intelligence 13
  • 15. Most Frequently Blocked Email Malware Malware Name % Malware W32/Bredolab.gen!eml.k 17.43% W32/Bredolab.gen!eml.j 9.49% Link-Exploit/Spam-3a71 3.82% W32/NewMalware!16a0 3.48% Exploit/Link-generic-ee68 3.22% W32/NewMalware-Generic-a2a1-3477 2.34% HTML/JS-Encrypted.gen 1.69% Trojan.Bredolab 1.56% W32/Bredolab.gen!eml-01cd 1.52% Link-Gen:Variant.Barys.1516.dam 1.43% Symantec Intelligence 15
  • 16. New Malware and Spyware Sites Per Day Symantec Intelligence 16
  • 17. Policy, Malware & Potentially Unwanted Programs Symantec Intelligence 17
  • 18. Most Frequently Blocked Malware at the Endpoint Malware Name % Malware WS.Trojan.H 29.06% W32.Sality.AE 6.81% W32.Ramnit!html 6.01% W32.Ramnit.B 5.61% W32.Downadup.B 3.82% W32.Ramnit.B!inf 3.53% W32.Virut.CF 2.07% Trojan.ADH.2 2.00% W32.Almanahe.B!inf 1.83% Trojan.ADH 1.43% [1] For further information on these threats, please visit: http://www.symantec.com/business/security_response/landing/threats.jsp Symantec Intelligence 18
  • 19. Where to next? • Web: – www.symanteccloud.com/intelligence – www.symantec.com/spam • Twitter: – @symanteccloud Symantec Intelligence 19

Editor's Notes

  1. x
  2. comprising a phishing attack.