CYBERCRIME TAKES ITS TOLL

      No Comments on CYBERCRIME TAKES ITS TOLL

For anyone intent on finding out exactly what the worldwide impact of cybercrime is now – and the price we are all paying as it penetrates every corner of the global markets – there can be no better starting point than the 2013 Norton Cybercrime Report[1].

The findings are both eye-opening and deeply concerning. According to the report, some 1 million-plus adults become cybercrime victims every single day and, if you break that down, it equates to a staggering 12 victims per second.

This annual report, commissioned by Symantec[2], is focused on understanding exactly how cybercrime affects consumers (more than 13,000 adults across 24 countries took part in the 2013 survey) and how the adoption and evolution of new technologies impacts their overall security.

And what an impact that turns out to be, with the global price tag of consumer cybercrime now topping US$113 billion annually – enough to host the 2012 London Olympics nearly 10 times over –  while the cost per cybercrime victim has shot up to USD$298: a 50% increase over 2012. In terms of the number of victims of such attacks, that’s 378 million per year – averaging 1 million plus per day.[3] Speaking of the Olympics: BT security chief executive officer Mark Hughes, in a presentation at the recent RSA conference, said that no (successful) cyber-attack had occurred during the Games. Quite an achievement, considering BT dealt with over 212 million cyber-attacks on the official website during last year’s Olympic and Paralympic Games.

PAYING THE PRICE

According to the report, 83% of direct financial costs are a result of fraud, repairs, theft and loss. Equally worrying is how deeply cybercrime is etching its mark across each and every continent.

In North America, the percentage hit by these attacks was 63% in the USA (at a cost of US$38 bn), while, in Canada, it was even higher, at 68% (cost: US$3 bn)

In Central America-Latin America (CALA), the figures were no less alarming: Brazil 60% (cost: US$8 bn); Mexico 71(US$3 bn); and Colombia 64% (US$0.5 bn)

In the Middle East, the worst affected countries were Saudi Arabia (62% – US$0.5 bn) and the UAE (71% – US$0.3 bn).

THE VICTIMS

What makes this even more concerning is that, as our channels and means of communication expand, cybercrime is seizing on the opportunity, spreading across the world with the speed and ferocity of a pandemic. Well over a third (38%) of those surveyed have experienced mobile cybercrime in the past 12 months, the main victims being:

  • Social network users – 63%
  • Public/unsecured Wi-Fi users – 68%
  • Emerging market – 68%
  • Parent of children 8-17 – 65%.

Half (50%) of all online adults have been victims of cybercrime and/or negative online situations in the past year, the report confirms, while 41% have fallen victim to attacks such as malware, viruses, hacking, scams, fraud and theft.

PUBLIC/UNSECURED WI-FI

As far as public/unsecured Wi-Fi is concerned, the statistics relating to potentially risky behaviour are particularly disturbing:

  • 56% access their social network account
  • 54% access personal email
  • 29% access their bank accounts
  • 29% shop online
  • 30% do not always log off after having used a public Wi-Fi connection
  • 39% do not take any special steps to protect themselves when using public Wi-Fi.

The cybercriminals must be equally encouraged at the response to their full-on assaults when it comes to mobile devices – because the 2013 Norton Cybercrime Report also reveals that nearly a half of respondents don’t use basic precautions, such as passwords, security software or back-up files.

On the plus side, when it comes to their PCs:

  • 90% do delete suspicious emails from people they don’t know
  • 72% have at least a basic free antivirus solution
  • 78% avoid storing sensitive files online.

However, that still means more than a quarter DON’T appear to have any antivirus protection at all, while almost a quarter DO store sensitive files on line.

CONVENIENCE OVER SAFETY

Why is safety on line treated so indifferently by so many people? According to the 2013 Norton Cybercrime Report: “Many consumers are making a conscious decision to trade their safety for convenience; many more are unaware that they’re making the same trade.”

What the report highlights most of all is that the need to stay safe at all times has never been greater. Moreover, ‘constantly connected, doesn’t have to equal ‘constantly at risk’, it points out. The tools and solutions are readily to hand to ensure that you are always protected. And here are some ‘Top Tips’ from the report on how to defend your data:

  • A comprehensive security suite provides a strong defence against online threats. Norton 360 multi-device offers protection for PCs, smartphones and tablets, in a single solution
  • Be cautious in the cloud. While cloud storage solutions make it easy to save and share files, they also open other avenues for attack
  • Be careful about who has access to your files and use a solution with built-in security, if possible
  • Save sensitive transactions for secure connections
  • Free or unsecured Wi-Fi networks can make it easy for thieves to eavesdrop on your activity
  • Avoid conducting sensitive transactions, such as banking or shopping, while connected to these networks, or use a personal VPN client
  • After you connect, double check!
  • Check credit card and bank statements regularly for fraudulent transactions, and report any suspicious activity to your provider and/or law enforcement.
  • And, of course, when shopping online or signing into webmail or social networks, look for https, The Norton Secured Seal and the Extended Validation ‘green bar’.

Failing to ensure this means the cybercriminals will only go from strength to strength, leaving an ever greater trail of destruction in their wake. And even more victims.

For more information on how to stay safe and secure online, visit https://www.staysecureonline.com/

[1] 2013 Norton Cybercrime Report: go.symantec.com/norton-report-2013 (Direct link to PPT of the report)

[2] Research conducted Edelman Berland.

[3] Online adults per country x % cybercrime victims past 12 months per country = 377,943,431 (sum of 24 countries).

 

Microsoft Security Advisory (2896666): Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution – Version: 1.0

Revision Note: V1.0 (November 5, 2013): Advisory published.
Summary: Microsoft is investigating private reports of a vulnerability in the Microsoft Graphics component that affects Microsoft Windows, Microsoft Office, and Micros…

???????????????????????????

      No Comments on ???????????????????????????

悪質なゲームをダウンロードさせる手口は特に目新しいものではありませんが、マルウェアの作成者はいよいよオンラインゲームユーザーを標的にしようという野望を露わにしています。ゲームを狙うトロイの木馬が、ゲームのログイン情報に加えてユーザーの銀行口座も狙うようになってきています。

Infostealer.Gampass などの脅威が、何年も前からオンラインゲームユーザーのログイン情報やデータを盗み出してユーザーを悩ませてきましたが、登場してからまだ比較的日の浅い Trojan.Grolker も、新しい攻撃経路を使っています。

シマンテックは Trojan.Grolker の活動を 2012 年中頃から確認しています。感染の大部分は韓国で確認されており、それより規模は小さいながらハンガリーでの感染も見られます。攻撃者が韓国を標的にしているのは、韓国でオンラインゲーム人気が高いためです。

3353327_fig1.png

図 1. Trojan.Grolker の標的となっている国

今月までは、Trojan.Grolker もゲームを狙う典型的なトロイの木馬だったようで、盗み出すゲーム関連の情報は先行するマルウェアと同様のものでした。古い Grolker サンプルのコードを分析したところ、ブラウザの URL を Grolker の狙うゲームサイトの URL と比較していたことがわかります。それが対象の URL であった場合、Grolker は悪質な JavaScript を Web ページにインジェクトしていました。

3353327_fig2.png

図 2. 古い Trojan.Grolker の URL チェック

Grolker の新しいサンプルも以前と同じコードを使って、ブラウザに読み込まれた URL を韓国のオンラインバンキングサイトの URL と比較します。

3353327_fig3.png

図 3. オンラインバンキングサイトの URL を検索する新しい Trojan.Grolker

Grolker は、以前のサンプルと同様に、攻撃者が狙う URL を含むページに悪質な JavaScript をインジェクトします。韓国ではあらゆるオンラインバンキングサイトが標的となっているため、韓国のユーザーは大きく被害を受けています。

3353327_fig4.png

図 4. Grolker がオンラインバンキングサイトに悪質な JavaScript をインジェクト

正常な Web ページにインジェクトされる悪質な JavaScript は、トロイの木馬のバイナリファイルにハードコード化されています。Grolker は別個の設定ファイルを使わないので、その点がオンラインバンキングを狙う他のトロイの木馬(Trojan.Zbot など)とは異なるところです。

Grolker はブラウザヘルパーオブジェクト(BHO)を使って、コンポーネントを Internet Explorer のプロセスにロードします。オンラインバンキングを狙う他のトロイの木馬はコンポーネントをブラウザのプロセスに直接インジェクトし、ネットワーク機能をフックして Web トラフィックを傍受するのが一般的であり、これも Grolker が他のトロイの木馬と異なる点です。このように、Trojan.Grolker はオンラインバンキングを狙うトロイの木馬よりも、ゲームを狙う従来型のトロイの木馬に似ています。

Trojan.Grolker の攻撃から保護するために、最新のコンシューマ向けのノートン製品シマンテックのエンタープライズ向けソリューションを使用することをお勧めします。シマンテックは、この脅威を Trojan.Grolker として検出します。

 

* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/ja にアクセスしてください。

First upgrade to avast! 2014, then to Windows 8.1

Are you ready to make the move to Windows 8.1? Reviews says that with Windows 8.1, Microsoft made some significant improvements, including restoring the much-missed start button. Make sure that your upgrade experience goes smoothly by installing avast! 2014 first. Avast! 2014 has Windows 8.1 certification which ensures that it meets compatibility standards and performs […]

A report from RSA Conference Europe 2013

      No Comments on A report from RSA Conference Europe 2013

In today’s world where malware evolves and develops rapidly, sharing security information is the key element for success. Companies which ignore this fact  sooner of later suffer from the consequences of their bad decision. Malware researchers from all over the world regularly meet at various IT security conferences, where they learn from each other how […]

How do I access the avast! Virus Chest?

      No Comments on How do I access the avast! Virus Chest?

Question of the week: What goes into the Virus Chest, and how do I remove what’s inside? Potentially harmful files are stored in a safe and completely isolated place called the avast! Virus Chest. This area keeps infected or otherwise suspicious files away from the rest of the operating system so they cannot cause damage […]

Leveling Up: Gaming Trojan Adds Banks to Target List

Malicious game downloads are not a new phenomenon, but malware authors are now exhibiting a greater degree of ambition in targeting online gamers. A gaming Trojan horse is now targeting user bank accounts in addition to user gaming credentials.
Threats…