Symantec Intelligence Report: July 2012
Total Page:16
File Type:pdf, Size:1020Kb
Symantec Intelligence Symantec Intelligence Report: July 2012 Attacks use Olympics as bait for spam, malware and phishing attacks; the state of Web attack toolkits in 2012 Welcome to the July edition of the Symantec Intelligence report, which provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January through June 2012. Report highlights • Spam – 67.6 percent (an increase of 0.8 percentage points since June): page 14 • Phishing – One in 475.3 emails identified as phishing (a decrease of 0.003 percentage points since June): page 17 • Malware – One in 340.9 emails contained malware (a decrease of 0.023 percentage points since June): page 19 • Malicious Web sites – 2,189 Web sites blocked per day (an increase of 4.0 percent since June): page 21 • Olympic related scams and threats to keep an eye on: page 2 • Web attack toolkit activity in the first six months of 2012: page 7 • A roundup of the best blogs of the last month: page 11 Introduction In this month’s report we take a look at the various attacks being perpetrated using an Olympic theme. It seems attackers are taking to social networking to spread threats, attempting to compromise mobile devices, and trying a number of different spam and phishing related scams surrounding the Games. We’ll look at each of these areas in detail this month. We’ll also look at Web attack toolkits and how attackers have been making use of them since we reported about their activity in Volume 17 of the Internet Security Threat Report1. As predicted in ISTR 17 for 2011, their use has increased since the end of last year, but the ways in which they are being deployed is also changing. Finally, we take a broader look at some of the more significant and interesting threats that Symantec’s Security Response team has been tracking in recent weeks —from printing-related threats, to the latest Android malware, including the impact of the attempted takedown of Grum, one of the largest spam-sending botnets in the threat landscape. I hope you enjoy reading this month’s edition of the report, and please feel free to contact me directly with any comments or feedback. Paul Wood, Cyber Security Intelligence Manager [email protected] @paulowoody 1 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf Page 1 of 24 Report analysis Let the Games begin As this month’s report goes to press, the 2012 London Olympics are fully underway. As with other major sporting events, including the soccer World Cup in 2010, attackers attempt to take advantage of people’s interest in the events, more recently launching a variety of attacks and scams with Olympic-based themes. Similar sporting-themed attacks took place during the 2008 Olympics in Beijing and during the 2010 World Cup2 in South Africa, so this is not a new phenomenon, but the social engineering employed in many of these attacks may be unfamiliar to a new audience. For the most part there may only be a few differences in the attacks; for example, spammers began their Olympic campaigns quite early3, sending out the first span runs clear back in March 2011. Attackers have also tailored their attacks towards mobile devices and social networks as well. Let’s have a look at some of the Olympic-related threats and scams out there. Twitter bots Attackers have been actively using Olympic-related trending topics on Twitter recently in order to entice people to click on malicious links. The Tweets appear to be generated by bots, with poorly constructed, ambiguous sentences. Figure 1 – Example of a Twitter bot Tweet linking to malicious content The shortened URLs lead to fake pages that appear to cover a variety of topics, including business strategy tips and health-related themes. However, the real purpose of these sites is to spread malware. An attack toolkit is set up on the back end of the pages and will attempt to install trojan back doors or fake security software on vulnerable computers that visit these Web sites. For instance, the attack might play out similar to this video.4 The accounts themselves are generally created the day the Tweets are sent, rarely have any followers, and rapidly post a few Tweets each minute using a wide variety of hash tags linked to trending topics. Twitter has been quick to identify these accounts and suspend them, generally within a few hours of their creation. 2 http://www.2010netthreat.com/ 3 http://www.symantec.com/connect/blogs/spammers-begin-their-games-early 4 http://www.youtube.com/watch?v=Upciy-g_n28 Page 2 of 24 Fake Olympic scandals There also have been a few instances of spammers attempting to trick users into downloading malware. For example, one spam email we’ve recently encountered hints at a doping scandal, and includes a link to a website that mimics YouTube. The video in question purports to be about the supposed scandal, but instead of playing the video, it tells the user to install a new version of Flash Player. If the user clicks OK and runs the executable, they will infect the computer with a trojan. This threat contacts a large list of malicious domains, attempting to download further malware, thus opening the computer to a variety of threats. Figure 2 – Fake video website attempting to trick the user into downloading a trojan Page 3 of 24 Android.Opfake The attackers behind Android.Opfake5, which we discussed back in the May report6, are not ones to let an opportunity such as the Olympics go by without trying to use the topic to spread their malware. Irfan Asrar, a Security Response Manager focused on mobile threats, has been keeping a close eye on this threat. “The authors behind Android.Opfake are now going after apps related to the London 2012 Olympics” says Asrar. He recently noticed the attackers bundling their threat with a copy of a legitimate Olympics application. The legitimate app, a game promoting some of the more popular Olympic sports, was copied and repackaged with the trojan and then distributed on a Russian Android app marketplace. Figure 3 – Android.Opfake repackaged with Olympic-themed game If installed, the trojan will send premium-rate SMS messages from the compromised device, leading to profits for the attackers and an increased mobile phone bill for the user. Fortunately Symantec customers are covered. “Users of Norton Mobile Security will be warned upon visiting the site distributing the malware,” says Asrar. 5 http://www.symantec.com/security_response/writeup.jsp?docid=2012-012709-2732-99 6 http://www.symantec.com/content/en/us/enterprise/other_resources/b-intelligence_report_05_2012.en-us.pdf Page 4 of 24 Olympic-themed spam and scams We discussed Olympic spam scams back in May7, highlighting a lottery-style scam in the report. The spammers have continued sending out a wide variety of spam since then. We took a look at an assortment of Olympic-related subject lines that have been in use since May, and the frequency that they appeared each day. While there was an especially busy period for a week in mid-June, the spam rate has increased steadily for the most part, effectively doubling from late May to late July, when the Games began. 120 100 80 60 40 20 0 Figure 4 – Chart showing the increase in Olympic related spam and scams The scams behind these spam runs are generally focused on gathering personal information from the user. Mathew Maniyara, a Security Response lead in Pune, India, has been monitoring similar Olympic-related scams and has provided the following analysis of two such scams: Cybercriminals lean on Olympics 2012 By Mathew Maniyara Even before the Summer Olympic Games began on 27 July 2012, online scammers had already taken the opportunity to target users. Here at Symantec we have kept track of spam and phishing attacks that offered free gifts related to the sporting event, and would like to show you a few scenarios that the attackers are playing out. In the first example, the phishers masquerade as a MasterCard™ promotion and created an eye-catching phishing site. The phishing pages, hosted in Brazil, included several fake offers such as “Win Free Trips to the 2012 Summer Olympics in London!”, “Participate and win laptops, cameras and many great prizes.”, and “MasterCard and you in the Olympic Games!” The London Olympics logo was placed at the center of the page and below the logo were images involved in the event. The images included the London Olympic Stadium, Wembley Stadium, the North Greenwich 7 http://www.symantec.com/content/en/us/enterprise/other_resources/b-intelligence_report_05_2012.en-us.pdf Page 5 of 24 Arena, and the London Underground promoting the London Olympics. Customers were prompted to participate in the offers by clicking a button labeled “Participate now.” Figure 5 – Example of an Olympic-themed phishing scam Upon clicking the button, customers would be redirected to the next phishing page that asks for the user’s confidential information. The information includes full name, email address and password, date of birth, credit card number, name on card, and security code. After the required information is entered, the phishing site acknowledges the registration with the message: your registration was successful! good luck! number of the protocol 1342410522 Spammers have also been targeting customers by using fake gift cards from Visa™, reportedly worth USD $1,000. By clicking a link provided in the spam mail, the user would be redirected to a fake survey page where the user is required to answer questions related to the London Olympics.