30.05.2013 Views

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

p. 106<br />

Symantec Corporation<br />

Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />

MALICIOUS CODE TRENDS<br />

Data<br />

Figure B.9. Propagation Mechanisms<br />

Source: Symantec<br />

Rank Propagation Mechanisms<br />

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

8<br />

9<br />

10<br />

EXECUTABLE FILE ShARING. the malicious code creates copies of itself or infects<br />

executable files. the files are distributed to other users, often by copying them to<br />

removable drives such as usB thumb drives and setting up an autorun routine.<br />

FILE TRANSFER, CIFS CIFS. this is a file sharing protocol that allows files and other<br />

resources on a computer to be shared with other computers across the <strong>internet</strong>. One<br />

or more directories on a computer can be shared to allow other computers to access<br />

the files within. Malicious code creates copies of itself on shared directories to affect<br />

other users who have access to the share.<br />

REMOTELy EXPLOITABLE VULNERABILITy. the malicious code exploits a<br />

vulnerability that allows it to copy itself to or infect another computer.<br />

FILE TRANSFER, EMAIL ATTAChMENT. the malicious code sends spam email that<br />

contains a copy of the malicious code. should a recipient of the spam open the<br />

attachment, the malicious code will run and their computer may be compromised.<br />

FILE TRANSFER, P2P. the malicious code copies itself to folders on an infected<br />

computer that are associated with P2P file sharing applications. When the<br />

application runs, the malicious file will be shared with other users on the same P2P<br />

network.<br />

FILE TRANSFER, NON-EXECUTABLE FILE ShARING. the malicious code infects nonexecutable<br />

files.<br />

FILE TRANSFER, hTTP, EMBEDDED URL, INSTANT MESSENGER. the malicious code<br />

sends or modifies instant messages with an embedded uri that, when clicked by the<br />

recipient, will launch an attack and install a copy of the malicious code.<br />

SQL. the malicious code accesses sQL servers, by exploiting a latent sQL<br />

vulnerability or by trying default or guessable administrator passwords, and copies<br />

itself to the server.<br />

FILE TRANSFER, INSTANT MESSENGER. the malicious code sends or modifies<br />

instant messages that contain a copy of the malicious code. should a recipient of the<br />

spam open the attachment, the malicious code will run and their computer may be<br />

compromised.<br />

FILE TRANSFER, hTTP, EMBEDDED URI, EMAIL MESSAGE BODy. the malicious code<br />

sends spam email containing a malicious uri that, when clicked by the recipient, will<br />

launch an attack and install a copy of the malicious code.<br />

2012<br />

Percentage<br />

Change<br />

71% -5% 76%<br />

33% -10% 43%<br />

26% -2% 28%<br />

8% -6% 14%<br />

4% -3% 7%<br />

3% +1% 2%<br />

3% +2% 1%<br />

1% -0% 1%<br />

1% -4% 5%<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!