---------- Forwarded message ----------
From: Microsoft Malaysia <[email protected]>
Date: Thu, Apr 22, 2010 at 10:14 AM
Subject: Malware, SPAM and Phishing
To: [email protected]


   If you are unable to view this HTML eDM, please click
here<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f29e60a2e9d220a4006165bcc1617b310d09e51fd3d666a414342dcfee1d81d262>
    [image:
Malware, Email Threats and Phishing - Still a Threat and Getting More
Sophisticated in Nature!]

In this edition of the Microsoft Security Intelligence Report Series – Part
3, we will be looking at malicious and potentially unwanted software.
Specifically malware, email threats and phishing attacks.
         Malicious and Potentially Unwanted Software
Infection data from several Microsoft security products demonstrates the
highly localised nature of malware and potentially unwanted software.

In the United States and United Kingdom, Miscellaneous Trojans account for
the largest single category of threat with families such as Win32/Alureon
and Win32/Vundo common in both locations.

The top threat in France and Italy by a wide margin was the Miscellaneous
Trojans family Win32/Wintrim.

In China, many of the most prevalent families are Chinese-language threats
such as the browser modifier Win32/BaiduSobar or password stealers that
target players of online games, including Win32/Lolyda and Win32/Frethog.

Brazil is dominated by Portuguese-language password stealers that target
online users of Brazilian banks, led by Win32/Bancos.

Spain and Korea are both dominated by worms, led by Win32/Taterf which
targets players of online games. The prevalence of Taterf in Korea may be
due in part to the worm’s propensity to spread easily in Internet cafés and
LAN gaming centres.

While security software is evolving, so is the sophistication of attacks.
Customers therefore need to ensure they build a defence-in-depth approach to
security and combine technology to ensure the greatest protection. *Microsoft®
Windows® 7 and Windows® Server
R2<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2f22873822ec887b95376eef14528613d179747ad051bc7fe2fab5fc10ef56a65>
* together deliver security that extends beyond the desktop.

*Malicious And Potentially Unwanted Software - Geographic trends by system
"location" setting*
Threat categories worldwide and in eight locations around the world, by
incidence among all computers cleaned, 1H09

           E-mail Threats
The vast majority of e-mail messages received via the Internet are unwanted.
Not only does this tax the recipients’ inboxes and the resources of e-mail
providers, it also creates an environment in which e-mailed malware attacks
and phishing attempts can proliferate. Blocking spam, phishing, and other
e-mail threats is a top priority for e-mail providers, social networks, and
other online communities.

Here is a snapshot of some facts on email threats around the world in 1H09:

   - Forefront Online Protect for Exchange (FOPE) blocked 97.3% of all
   unwanted messages at the network edge
   - The dominant form of spam in 1H09 was product advertisements
   - Most spam was sent through botnets or other automated tools

Using technology like *Microsoft® Forefront for Exchange and
SharePoint<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2af29925f920e53e40c97ef7b0584fcafa54433cc9017a1e0b8637d04bdb3b57e>
* reduces SPAM entering an organisation’s perimeter and from being
circulated further through email and collaboration servers.
Phishing
Legitimate websites belonging to innocent parties that have been compromised
are often used by attackers to host phishing pages or distribute malware. In
many cases, just visiting these sites can be dangerous, since attackers
often create exploits that can silently download malware to vulnerable
computers as soon as the user loads the page. Installing *Security
Updates<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2a00816b67182013d3a99dbbb42cd70955cff23dd9c2d522c5622c5e6bb5106d9>
* for the operating system, the browser, and any installed browser add-ons
in a timely manner can greatly reduce users’ chances of being victimised.

Microsoft maintains a database of known active phishing sites reported by
users of Internet Explorer and other Microsoft products and services. When a
user attempts to visit a site in the database with *SmartScreen
Filter<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2488d15e128b074ba410b528c8f7d60496ca71e5d6058c89e015c5c4f66cc24be>
* in Microsoft® Internet Explorer 8 enabled, Internet Explorer checks the
URL against the database. If the site has been reported as a phishing site,
Internet Explorer blocks navigation to the site and displays a warning.
Microsoft monitors traffic to the reported phishing URLs and uses the
information to improve its filtering technology and its efforts to track
suspected phishing sites.

*Malicious Web Sites - Analysis of phishing sites*
Unique attempts at Phishing blocked by smart screen filter in Internet
Explorer 8
Phishing impressions tracked each month in 2H08 and 1H09, indexed to January
2009

After remaining mostly consistent throughout 2H08 and through April 2009,
the number of impressions suddenly almost quadrupled in May and rose even
higher in June. However, the number of actual phishing sites decreased, with
analysis showing social networking sites the target of 76% of phishing
attacks in 1H09.

*Malicious Web Sites - Target institutions*
Impressions for each type of phishing site each month in 1H09

         To find out more about malware, email threats and phishing, *read
the 
report<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f219ca985ad5b819b6a118eea43cdf8533be3e06dbeebfcdad961c856fc7dc2160>
* on our site. And do remember to look out for the final part of our
Security Series, Part 4, where we’ll provide some valuable recommendations
on how to keep your *computers, data and your enterprise safe*.
Unsubscribe<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f24cec7f4d564729154473bd98f7d392bfee674daf87c5a39920c77e5416051b96>|
Update
your 
profile<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f24cec7f4d564729154473bd98f7d392bfee674daf87c5a39920c77e5416051b96>
© 2010 Microsoft Corporation Terms of
Use<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2b16d5a314abf791d0be0a2bd102e60f2a4162da62efbf4d391875e2d54cb86fd>|
Trademarks<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2f6bf09c1705ff6099723e7b0829330beb5a8c86565f2453968ab5847f6d2f8a8>|
Privacy
Statement<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f274643788b3164e97dd5199f22319419b050a7cdb99492b643c9c84daaf8bef39>
[image:
Microsoft]

Update 
Profile<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f237344e7acf647126f973d3d8a9bc5ddb675d3ee14c5557545cb7747ffd014482>
_______________________________________________
Owasp-Malaysia mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-malaysia

OWASP Malaysia Wiki
http://www.owasp.org/index.php/Malaysia

OWASP Malaysia Wiki Facebook
http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420

Reply via email to