• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Exploits   »   3Q Security Roundup: The Invisible Web, 1 Million Mobile Malware Highlight Quarter

3Q Security Roundup: The Invisible Web, 1 Million Mobile Malware Highlight Quarter

  • Posted on:November 11, 2013 at 6:50 am
  • Posted in:Exploits, Malware, Mobile, Vulnerabilities
  • Author:
    Trend Micro
0

The third quarter of the year shone the spotlight on parts of the hidden Internet that would have preferred to remain hidden. Services favored by cybercriminals such as the digital currency Liberty Reserve and the online marketplace Silk Road were all shut down during the quarter. Right after the quarter ended, the notorious creator of the Blackhole Exploit Kit, Paunch, was arrested as well, severely curtailing related spam campaigns.

Cybercrime Continues Unabated

Despite these steps, however, cybercrime continued to grow during the quarter. The number of online banking Trojans detected reached record levels, with more than 200,000 infections reported in the quarter. Three countries – the United States, Brazil and Japan – accounted for over half of these infections.

Figure 1. Number of online banking infections

Mobile Malware Crosses 1 Million Mark

Our 2013 predictions noted that we believed the number of high-risk and malicious Android apps would exceed 1 million sometime in the year. That was exactly what happened this quarter. Premium service abusers remained  the most common threat. These sign up users for paid “premium services” without their consent and highlights how mobile malware has become mainstream, continuously growing and affecting more users around the world.

As a sign of the growing maturity of mobile platforms, a major vulnerability was found in Android with correspondingly serious risks. The so-called “master key” vulnerability allowed an attacker to “update” a legitimate app with a malicious version.

Java 6 Becomes a Permanent Threat

Older, unpatched versions of software have always posed serious security risks. This was shown when a new exploit targeting a vulnerability in Java 6 was seen. This came after Oracle officially declared Java 6’s end-of-life (EOL), highlighting the risks of using EOLed software that will no longer receive patches. This serves as a potential preview of what will happen next year, when Windows XP – still in use in many systems and networks all over the world.

Read more about the goings-on in the third quarter in the full report, titled The Invisible Web Unmasked.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: Deep Webinvisible webmobile malwareq3 2012security roundup

Featured Stories

  • systemd Vulnerability Leads to Denial of Service on Linux
  • qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware
  • Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability
  • A Closer Look at North Korea’s Internet
  • From Cybercrime to Cyberpropaganda

Security Predictions for 2018

  • Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.
    Read our security predictions for 2018.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Monero-Mining RETADUP Worm Goes Polymorphic, Gets an AutoHotKey Variant
  • XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing
  • XTRAT and DUNIHI Backdoors Bundled with Adwind in Spam Mails
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner
  • Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

Popular Posts

  • New MacOS Backdoor Linked to OceanLotus Found
  • Monero-Mining HiddenMiner Android Malware Can Potentially Cause Device Failure
  • ChessMaster Adds Updated Tools to Its Arsenal
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner
  • Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.