Finjan, today published the latest findings from its Malicious Code Research Center (MCRC). In its Web Security Trends Report (Q1 2007) , Finjan summarizes the analysis of more than 10 million (>10,000,000) unique URLs based on live web traffic recorded in the UK.
The most important findings from Finjan’s ongoing research are:
· As commercial interests continue to drive e-crime, malicious code is more likely to be hosted on local servers in the US and UK than in countries with less developed e-crime law enforcement policies.
· A continuing evolution in the complexity of attacks, specifically the increasing use of code obfuscation using diverse randomization techniques. Over 80% of the malicious code detected by Finjan was obfuscated, making it virtually invisible to pattern-matching/signature-based methods in use by anti-virus products.
· Increasing sophistication at embedding malicious code within legitimate content (e.g., ad delivery and translation services) and less dependence on outlaw servers in unregulated countries.
Finjan’s detection and analysis is based on its unique and proprietary methods for analyzing executable code embedded in web content for malicious or dangerous intent. These methods excel in detecting malicious code without depending on location, reputation or a priori signature information.
The Worldwide Distribution of Content with Malicious Code
Finjan’s research, based on information gathered by its real-time content inspection engines, clearly demonstrates that malicious code is not just an issue of outlaw servers in countries with weak laws and lax enforcement. Ninety percent (90%) of the URL’s containing malicious code that were discovered in this UK-focused study resided on servers located in the US or UK.
“The results of this study shatter the myth that malicious code is primarily being hosted in countries where e-crime laws are less developed,” stated Yuval Ben-Itzhak, CTO at Finjan.
“Our research shows that malicious content is much more likely to show up on a local server than one in Asia or Eastern Europe. Unfortunately this means that the traditional location-based reputation heuristics are decreasingly effective against modern attacks.”
Advertising Is the Primary Vector for Delivering Malicious Code
Advertising is the leading category for URLs containing malicious code, representing 80% of all instances. Attackers have discovered that the multiple parties involved and the complex structure of business relationships involved in online advertising make it relatively easy to inject malicious content into generally legitimate ad delivery streams.
Similarly, when analyzing malicious content in terms of the URL website categories, Finjan found that malicious code is just as likely to be accessed through legitimate websites (e.g., Finance, Travel and Computing) as through what might be considered disreputable websites (e.g., adult content or free downloads). “The fact that malicious code is just as likely to be found in legitimate categories as in questionable categories means that security products that rely solely on URL categories to block access to malicious sites are no longer effective,” said Ben-Itzhak.
Malicious Code via Translation Services
A new trend identified by Finjan researchers is the existence of malicious code on webpages served by automatic translation services, such as those offered by many leading websites and search engine companies. The report presents several instances of malicious code discovered by Finjan security researchers on translated webpages. This is another example of attackers’ increasing creativity and sophistication, i.e., using the translation process to obscure the source of the malicious code behind the otherwise reputable translation service.
This scenario is quite similar to the use of malicious code on storage and caching servers, which can be referenced by third party webpages to exploit an end user’s machine.
“This latest research from Finjan parallels the work from other security companies and gives a fascinating but chilling view on the ongoing war against malicious code attacks,” said Peter Christy, Principal Analyst at the Internet Research Group. “In the past, attacks were dominated by worms and viruses designed to create a big and very visible disruption.
Increasingly, modern attacks have criminal intent, and the attackers are becoming more proficient at obscuring the attacks and delivering them from otherwise reputable regions and website categories in order to circumvent many of the defenses that have been effective against earlier attacks. These trends are a clear call-to-action for better detection and prevention methods.”
To read the full report, please visit this website.