Cyber criminals nowadays have increased their strength in harming computer systems. For in the past years, cyber criminals were associated with distributing viruses and spam. But all that has now changed, as Cyber criminals are resorting to various other techniques of getting into personal and institutional computer systems.
As technology develops, cybercriminals also have strengthenend their attacks to attempt in damaging computer systems around the world.
Recently, a report was released by the Commtouch – a security technological company that identifies new threats from billions of Internet transactions; regarding new tactics in harming our Internet system. It is a combination of mail and web elements called Multi-stage attacks or popularly referred to as “Blended Attacks”.
What is Blended Attack?
It is a malicious code that transfers virus or malicious software. This kind of attack uses one or more methods in spreading the virus to your computer or system. Not just that, it can also do a multiple damage by just one multiple method without succession of another attack.
Another characteristic is that it is a more complicated style of spreading malware than those of single-attack; this is why it takes a bit longer and harder to make a good one.
What are the methods of this attack?
The first method is through Emails. This kind of method uses email attachments that could re-direct a user to a HTML-based email site and starts to infect the system.
Next is Windows Share. In this method, the virus would try to inflect on an unsecured window file. And when a user would run this infected file, it will then activate the virus thus; it will be the start of the infection.
Another one is the Web Servers. In this type, the virus will then be on the lookout of possible vulnerable servers and would try to send a copy to it. Once inside, it will then start to infect the server along with its content and files.
Next is Web clients. It is a second-hand attack wherein a user, who happens to visit the infected or damaged server, will also be infected too.
The other methods include those of peer-to-peer file sharing and instant messaging.
Latest report also revealed that the use of trusted websites and search engines, like your Google and Yahoo, are now being used by this network and system attackers.
Commtouch have managed to narrow down the research of recent events in malware spreading. It has been estimated that there are 179 billion of spam messages per day, 64% of this message comes from Pharmacy spam. There were also 307,000 zombies activated and India got the highest population of them. The latest TDSS.17 virus was widely distributed as an email-borne virus and the Mal/Bredo malware which has more variants compared to other malware.
Although Pornography sites were a common tool on Spam advertisement, another new way of getting through is the use of media and download sites.
Indeed, even though we are on our verge of high technologies, these attacks were also increasing and getting stronger. Though we have programs and applications to counter-attack like your anti-spam or anti-malware, this could not guarantee us of a complete security. Precautions are a lot better!