Feeds

China displaces Britain as botnet epicentre

Zero-day attacks, phishing scams star in Symantec scorecard

Website security in corporate America

China has displaced Britain as the home of the greatest concentration of compromised (zombie) PCs.

The world's most populous country accounted for 26 per cent of the world's bot-infected computers, a higher density than any other country. Beijing was the city with the most bot-infected computers in the world, accounting for just over five per cent of the worldwide total, according to the latest edition of security firm Symantec's twice-yearly Internet Security Threat Report.

During the second half of 2006 period, Symantec observed an average of 21,707 new active bot-infected computers per day in the EMEA region. More than 2.3 million bot-infected computers in the region were identified as being active at any one time, a 130 per cent increase from the 1m seen during the first half of 2006.

In the EMEA region, France and Germany had the highest number of bot-infected computers, compromised systems used to send spam or other nefarious activities. The number of bots affecting computers in the UK fell from 22 per cent, to 11 per cent during the second six months of 2006, a drop Symantec attributes to the economic cycle of broadband penetration and adoption rather than particular internet security efforts.

Madrid, Spain had the most bot-infected computers of any city in the EMEA region, accounting for six per cent of the total. London came third behind Paris in this zombie league of shame.

Many of these compromised PCs (around 40 per cent) were controlled via bot command-and-control computers located in the US.

Lan of the dead

The US remains both a centre and target of cybercrime. Eighty-six per cent of the credit and debit cards advertised for sale on the digital underground were issued by banks in the US.

Symantec recorded an average of 5,213 denial of service (DoS) attacks per day, down from 6,110 in the first half of the year. Systems in the US were the target of most DoS attacks, accounting for more than half (52 per cent) of the worldwide total.

Ollie Whitehouse, Symantec research scientist and one of the authors of the report, said that hackers are becoming increasingly sophisticated in the tactics they use to gain control of vulnerable systems. He said the increased use of unpatched (zero-day) vulnerabilities, which occurred regularly during the second half of 2006, provided evidence of this trend.

During the second half of 2006, 23 per cent of the 1,318 documented malicious code samples exploited vulnerabilities. Many of these attacks targeted web browser security bugs.

Symantec documented 54 vulnerabilities in Microsoft Internet Explorer, 40 in the Mozilla browsers, and four each in Apple Safari and Opera over the report period. Mozilla did the best job of the browser suppliers in fixing flaws, taking an average of two days to develop an update. Internet Explorer was targeted by 77 per cent of attacks specifically targeting Web browsers.

Spam, spam, spam....

Spam and in particular phishing attacks that attempt to trick users into handing over account credentials remained a problem during the reporting period. Symantec blocked over 1.5 billion phishing messages in 2H06, an increase of 19 per cent over the first half of 2006.

Forty-six per cent of all known phishing sites were located in the US, a much higher proportion than in any other country. The UK had the second highest number of phishing Web sites in EMEA and third highest in the world, beyond the US and Germany. Karlsruhe in Germany was the EMEA city which hosted the highest number of phishing Websites.

During the last six months of 2006, 44 per cent of all spam detected worldwide originated in the US. In the EMEA region, spam made up 66 per cent of all monitored email traffic, Symantec reports.

Fortune cookies

Looking ahead, Symantec expects to see more threats begin to appear on Windows Vista, with a focus on vulnerabilities, malware and attacks against the Teredo platform. Symantec also expects that attackers will focus on third-party applications that run on Vista.

The net security giant expects phishing fraudsters to expand beyond the regular targets of online banks and eBay to new industry sectors, such as multiplayer online games. It also reckons that spam and phishing will increasingly target SMS and MMS on mobile platforms. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Blood-crazed Microsoft axes Trustworthy Computing Group
Security be not a dirty word, me Satya. But crevice, bigod...
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.