Breaking-news malware exploits get faster: report
Cyberoam claims an average of 22 hours between breaking news and related malware
The time lag between breaking world news and cyber exploits that use the news to mount attacks is narrowing, according to the Cyberoam Internet Threat Report for the third quarter of 2013.
According to the report, in March 2013, when the new Pope was elected, the first malware attacks began after 55 hours. In April 2013, after the Boston Marathon bombing, it took 27 hours to see the first related attacks exploiting interest in the event. The new average time to exploit news events for malware distribution now averages only 22 hours.
Other examples of the real-time malware campaigns in Q3 include the news of British royal baby Prince George, NSA whistleblower Edward Snowden, and the Syria crisis.
The report also highlighted that the average number of phishing sites coming online daily increased by nearly 35% in Q3. PayPal phishing sites alone accounted for approximately 750 new sites each day.
Email-malware campaigns also continued to be prolific in Q3. Such emails are sent in the name of highly visible brands, but include a malicious attachment or a link to an infected website. According to Cyberoam, the brands used in attacks during the third quarter included Apple, Burger King, KFC, Walmart, UPS, DPD and MoneyGram.
The report also included compiled data on the top ten types of website most likely to be infected with malware. Travel websites topped the list.
Also included in the report was a list of the top five mobile malware exploits and most commonly seen Android threats.