internet security tHreAt rePOrt GOVernMent 2013
internet security tHreAt rePOrt GOVernMent 2013
internet security tHreAt rePOrt GOVernMent 2013
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
p. 73<br />
Symantec Corporation<br />
Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />
ThREAT ACTIVITy TRENDS<br />
Analysis of Web-based Spyware, Adware, and Potentially Unwanted Programs<br />
Background<br />
One of the main goals of a drive-by Web-based installation is the<br />
deployment of malicious code, but often a compromised website<br />
is also used to install spyware or adware code. This is because<br />
the cybercriminals pushing the spyware and adware in this way<br />
are being paid a small fee for each installation. However, most<br />
adware vendors, such as those providing add-in toolbars for<br />
Web browsers, are not always aware how their code came to be<br />
installed on the users’ computers. The expectation is that it is<br />
with the permission of the end user, when this is typically not<br />
the case in a drive-by installation and may be in breach of the<br />
vendors’ terms and conditions of use.<br />
Data<br />
Figure A.11. Potentially Unwanted Programs: Spyware and Adware Blocked, 2012<br />
Source: Symantec.cloud<br />
Rank Top 10 Potentially Unwanted Programs %<br />
Methodology<br />
1 Application.DirectDownloader.A 94.2%<br />
2 spyware.PcAcme 1.5%<br />
3 Adware.Js.script.c 0.2%<br />
4 Application:Android/counterclank.A 0.2%<br />
5 Application.installcore.e 0.2%<br />
6 Adware:W32/cDn.A 0.2%<br />
7 Adware.solimba.c 0.2%<br />
8 spyware.Ardakey 0.2%<br />
9 Adware:Android/AirPush.A 0.2%<br />
10 spyware.Keylogger 0.1%<br />
This metric assesses the prevalence of Web-based spyware and<br />
adware activity by tracking the trend in the average number of<br />
spyware and adware related websites blocked each day by users<br />
of Symantec.cloud Web <strong>security</strong> services. Underlying trends<br />
observed in the sample data provide a reasonable representation<br />
of overall malicious Web-based activity trends.