30.05.2013 Views

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

p. 72<br />

Symantec Corporation<br />

Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />

ThREAT ACTIVITy TRENDS<br />

Figure A.10. Malicious Website Activity: Overall Frequency of Major Attack Toolkits, 2012<br />

Source: Symantec<br />

45%<br />

40<br />

35<br />

30<br />

25<br />

20<br />

15<br />

10<br />

5<br />

0<br />

41<br />

BLACKHOLE<br />

Commentary<br />

22<br />

SAKURA<br />

10<br />

PHOENIX<br />

7<br />

REDKIT<br />

• Blackhole continues to be the most dominant Web attack kit<br />

in 2012, accounting for 40.7 percent of attacks blocked from<br />

Web attack toolkits, compared with 44.3 percent in 2011.<br />

The Sakura toolkit was ranked second, accounting for 22<br />

percent of attacks blocked and was not ranked in the top<br />

10 in 2011.<br />

• The Sakura Web attack kit was updated to version 1.1 in<br />

early 2012. And many of the more common attack toolkits<br />

were updated in 2012 to include exploits for the Java<br />

Runtime Environment, including CVE-2012-0507, CVE-<br />

2012-1723, and CVE-2012-4681.<br />

• The Blackhole kit was updated frequently and the code is<br />

highly obfuscated. It is often used to deploy ransomware<br />

and fake <strong>security</strong> software.<br />

3<br />

NUCLEAR<br />

17<br />

OTHERS

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!