30.05.2013 Views

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

p. 73<br />

Symantec Corporation<br />

Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />

ThREAT ACTIVITy TRENDS<br />

Analysis of Web-based Spyware, Adware, and Potentially Unwanted Programs<br />

Background<br />

One of the main goals of a drive-by Web-based installation is the<br />

deployment of malicious code, but often a compromised website<br />

is also used to install spyware or adware code. This is because<br />

the cybercriminals pushing the spyware and adware in this way<br />

are being paid a small fee for each installation. However, most<br />

adware vendors, such as those providing add-in toolbars for<br />

Web browsers, are not always aware how their code came to be<br />

installed on the users’ computers. The expectation is that it is<br />

with the permission of the end user, when this is typically not<br />

the case in a drive-by installation and may be in breach of the<br />

vendors’ terms and conditions of use.<br />

Data<br />

Figure A.11. Potentially Unwanted Programs: Spyware and Adware Blocked, 2012<br />

Source: Symantec.cloud<br />

Rank Top 10 Potentially Unwanted Programs %<br />

Methodology<br />

1 Application.DirectDownloader.A 94.2%<br />

2 spyware.PcAcme 1.5%<br />

3 Adware.Js.script.c 0.2%<br />

4 Application:Android/counterclank.A 0.2%<br />

5 Application.installcore.e 0.2%<br />

6 Adware:W32/cDn.A 0.2%<br />

7 Adware.solimba.c 0.2%<br />

8 spyware.Ardakey 0.2%<br />

9 Adware:Android/AirPush.A 0.2%<br />

10 spyware.Keylogger 0.1%<br />

This metric assesses the prevalence of Web-based spyware and<br />

adware activity by tracking the trend in the average number of<br />

spyware and adware related websites blocked each day by users<br />

of Symantec.cloud Web <strong>security</strong> services. Underlying trends<br />

observed in the sample data provide a reasonable representation<br />

of overall malicious Web-based activity trends.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!