Sunteți pe pagina 1din 6

WHITE PAPER

Tangled Web: Undercover Threats,


Invisible Enemies
Mark Sunner, Chief Security Analyst, MessageLabs

The Secret War crucial danger points for any business that doesn’t defend itself
adequately against undercover threats and invisible enemies.
The enemy you can’t see is usually the hardest to fight. And it’s
But it also outlines a ready-made solution that can protect your
the adversary who doesn’t operate out in the open that can often
business, immediately, comprehensively and cost-effectively.
do the most damage. They move in the shadows, constantly
changing tactics and repeatedly altering their point of attack.
The information presented here is based on MessageLabs
Elusive and dangerous, they may emerge briefly from their cover
hands-on experience of providing proven messaging and web
– only to vanish again just as quickly.
security management services for over 17,000 clients worldwide,
with around 2.5 billion attempted Simple Mail Transfer Protocol
The world of messaging and web security has seen striking
(SMTP) connections processed every day on their behalf.
growth in just this type of activity. Anonymity, deceit and
subterfuge are now established weapons in the arsenal of the
“bad guys” targeting organizations like yours with profit-reducing
malware, spam and scams. Increasingly, this enemy’s ultimate
Spyware: Agent of Chaos
aim is to access intellectual property and other confidential data Perhaps the best-known example of an undercover threat is
– just the sort of information you can’t afford to fall into the wrong spyware, which first appeared around five years ago. Essentially,
hands. Now motivated by commercial gain rather than pure spyware is software that gets onto a computer’s hard drive
malice, these masters of disguise pose a greater threat than ever without the user’s explicit and knowing agreement. In some
to the health of your business. cases, “permission” for spyware to install itself is buried deep
in the small print of a licensing agreement. In other cases,
Long gone are the “good old bad old days” when threats permission is not given at all.
generally had an instant and obvious effect – when many
businesses simply warned employees not to click on dubious- Once installed, the spyware secretly tracks the computer user’s
looking email attachments in case their computers became web browsing behavior, logs websites visited and passes this
infected with a virus or some other unwelcome visitor. Today we information on to advertisers – all with the consummate skill of a
are seeing a rising tide of dangers that are more cunning, harder professional pickpocket. The computer then finds itself flooded
to pin down and much more difficult to defend against. with a torrent of irritating pop-up advertisements; pricelists,
etc., broadly related to the user’s browsing behavior. Hence the
Many of these attack computers without their owners or users other name commonly given to spyware – “adware”. The user,
ever knowing it, often as a result of visiting an innocuous-looking meanwhile, remains oblivious to the fact that their machine has
website. Another key trend is the delivery of malware via “bad” been infected. Pop-ups are a common feature of the electronic
weblinks rather than the traditional email attachment – a rapidly landscape, so it’s not always obvious when spyware is to blame
escalating trend that is proving a more efficient (and ultimately for their appearance.
more lucrative) way for the bad guys to realize their objectives.
And much of the time those objectives involve the secret pilfering Spyware usually gains access to a computer by camouflaging
of business-critical information from your organization. itself among other software (e.g. a free screensaver or a music
file) which the user has agreed to download. Ironically, it’s often
Examining recent developments in the threat landscape, this concealed in downloadable software claimed to be “spyware-
MessageLabs whitepaper focuses on the emergence of the web free” or “adware-free” – and even in many “anti-spyware”
and covert information-gathering as key battlegrounds in the applications! As for the actual delivery mechanism, this may
ongoing war against malware propagators and the criminal gangs be an email attachment, but weblink/website downloads have
increasingly active in this field. Above all, the paper highlights the increasingly become the spyware gangs’ weapon of choice.

WHITE PAPER: Tangled Web: Undercover Threats, Invisible Enemies


Computers are Like any good spy, spyware is designed to go Of course, it’s the businesses which fall victim to
about its stealthy business unnoticed, concealed spyware that are left to pick up the bill. Unsolicited
attacked without from a computer’s operating system and even pop-ups are not just an irritating nuisance. Their
their users ever from much of the advanced security hardware/ deletion from computer screens is a time-wasting
software in use today. As well as its expertise at distraction from more important tasks. Moreover,
knowing it. infiltrating computers in the first place, spyware is as they enmesh themselves, spyware programs act
equally adept at staying there. Frequently, it will as a serious “drag” on the functionality of individual
break itself up into a number of pieces and hide machines and entire networks; an efficiency-
in different parts of the hard drive. If one piece compromising burden that businesses can well
is detected and deleted, the spyware will simply do without.
rebuild itself using the pieces that survive.

Spyware has developed into a multi-billion Exposing the Spy


dollar global industry, often operating in the grey Despite the serious damage it can do, spyware
area between legal and illegal. In many cases, accounts for a relatively small component of overall
advertisements for reputable companies appear “bad” Internet traffic. In fact, in recent months,
on computers as a result of spyware. But those MessageLabs has actually detected a reduction
companies may be totally unaware of the fact that in this proportion. In December 2007, spyware
their advertisements have been passed down accounted for 55.7% of traffic; by January 2008,
a convoluted chain of distributors without their this had declined to 10.9%.
knowledge.

This should not be mistaken, though, for a sign that the virulence of the spyware itself is declining. Indeed,
in terms of ingenuity and sophistication, spyware has continued to evolve. Some current breeds can even
track the keys you press when you enter a password. Others can hijack online banking sessions after
authentication has been completed.

Nevertheless, important new developments are now acting as a constraint on the spyware industry.
Foremost among these is legal action against the perpetrators of spyware. In particular, a current lawsuit
involving New York-based spyware company Direct Revenue is causing significant ripples. The key issue
at stake is whether computer users should be made more aware of the software they download onto their
machines, and whether it really is satisfactory for permission for a software download to be concealed in
small print.

Fearful of being stigmatized, mainstream advertisers and leading brands are now taking greater
precautions to ensure they have nothing to do with spyware. This in turn means some key markets are
being choked off, making it harder for spyware propagators to operate. In response, the spyware industry
is increasingly launching its attacks from countries where there are fewer (or even no) legal and regulatory
constraints on their operations.

2 WHITE PAPER: Tangled Web: Undercover Threats, Invisible Enemies


Web of Intrigue The web has
But the real significance of spyware is that it earlier SpamThru virus, StormWorm harnesses a increasingly
represents the tip of a huge iceberg. On one level, whole host of phenomenally clever and incredibly
it forms part of a whole suite of weapons that have sophisticated techniques to propagate itself. For become spyware
been converging over the last two years. The result instance, it switches the botnet computers it uses gangs’ weapon
has been the unleashing of new types of much better every three minutes (so-called “fast flux” or “bullet
targeted, fundamentally stealth-based attacks on proof hosting”), making it virtually impossible to of choice.
computer users around the world. Because such thwart a StormWorm attack once it’s under way. And
“surgical strike”-style attacks are more likely to slip the emails sent out during an attack always contain
under the security radar, they are much more likely a hyperlink to a website, where the primary payload
to succeed. The application of social engineering – the StormWorm virus itself – is contained.
techniques has also played a key role in this
evolution.

A classic instance of such convergence neatly


harnesses spyware’s ability to equip scammers
with a sniper’s rifle rather than a blunderbuss. It
involves using the information that spyware gathers
about individuals and organizations to maximize
the chances of launching a successful “phishing”
attack. Phishers send out legitimate-looking
emails designed to dupe recipients into supplying
high-value, confidential data. Including authentic
information about the recipient or their company
can significantly increase the odds of the email
attracting a “bite.”

To take another example, controllers of “botnets”


– networks of Internet computers that, unknown
to their users, have been set up to forward spam,
viruses, etc., to other computers – now frequently
install spyware onto their victims’ machines. This
Visual representation of a Keylogger Trojan
generates incredible amounts of data on the users’
passwords, online purchases, etc., which can be
used to target them with phishing and other attacks. As StormWorm demonstrates, the web is becoming
a new front line, a key territory to be fought over
Today, though, one of the biggest icebergs of all by scammers and security vendors. Volumes of
relates to the web. As noted earlier, spyware typically spyware may be going down, but the overall problem
downloads itself when a victim clicks on a hyperlink of which spyware is a part is heading inexorably in
leading to a rogue website. But now we are seeing the opposite direction. Indeed, by February 2008,
this approach extending to other forms of malware around half of all the bad email traffic detected by
too. Three years ago, almost every virus was MessageLabs contained a hyperlink.
disseminated via an email attachment. Over the last
18 months or so, however, traditional viruses have
begun to appear in web traffic as well. Increasingly, Information is Profit
hyperlinks are the preferred delivery mechanism. Spyware can also be seen as the advanced guard of
Why? Because most security solutions don’t follow another kind of surreptitious web-based threat with
such links. Instead, they simply read them as body the potential to deal enormous damage to business.
text. Threats hidden behind “bad” weblinks are The primary aim of spyware has always been to
therefore not identified, unwary users quickly fall gather data without the victim being aware of the
prey to them and the bad guys enjoy a higher rate fact. It’s this desire to obtain unauthorized and illicit
of success. information (plus the knowledge that the information
can be turned directly into financial profit) that has
A key development that underlined this sea change become a key driver of criminal activity in the world
in the threat landscape was the emergence of the of the “underground Internet.”
StormWorm virus in early 2007. Building on the

WHITE PAPER: Tangled Web: Undercover Threats, Invisible Enemies 3


Spyware It’s no exaggeration to say the Internet overflows web security industry. Confronted with this reality,
with opportunities to dupe people into sharing it’s clear that in-house IT specialists, budgets and
represents the privileged information or making unguarded, facilities face an impossible struggle in terms of
tip of a huge indiscrete comments about themselves or their tackling the challenge successfully. However much
employers. And there’s no shortage of scammers is invested in software, appliances and upgrades,
iceberg. lining up to exploit those opportunities. it’s never going to be enough to provide the level of
security and peace of mind that business needs.
The comparatively new phenomenon of social
networking is a classic case. A vast number of
web users in the United States now participate How to Win the War
in this activity, with social networking websites
Little wonder, then, that outsourcing the problem
such as Facebook, MySpace and Bebo
is growing in popularity. But of the many vendors
proliferating in the last couple of years. A
offering “comprehensive messaging and web
rapidly growing number of business-oriented
security solutions,” which is the best one to choose?
sites, like LinkedIn, Viadeo, Huddle and BT
Which has the right weapons to fight back against
Tradespace, are also competing for attention.
the rise of web-based threats and clandestine data
gathering? Above all, which is best-placed to deal
Undoubtedly, social networking offers many
with the disorienting world of deception and illusion
potential business benefits. But the underlying
that the threat landscape has become?
and overriding problem remains, it’s impossible
to know if the people you converse with in this
MessageLabs offers integrated web and email
medium are really who (and what) they say they
security services proven to stay a step ahead of
are. Spoofing,
the bad guys. Its web security service, for example,
includes anti-spyware and anti-virus protection, as
well as industry-leading converged threat analysis
Your Business: Caught in the which ensure that threat intelligence learned from
Crossfire email is also applied to web security. The service’s
Make no mistake. Although they and their effects state-of-the-art URL filtering capabilities also enable
are not always immediately visible or obvious, businesses to develop low-risk web usage policies
the undercover, and increasingly web-based, that precisely meet their needs.
threats now prevalent across the Internet pose
a significant commercial risk to businesses. No Moreover – and absolutely invaluable given today’s
organization can afford to believe it won’t become shifting threat profile – MessageLabs Email Anti-
a casualty in this particular dirty war. No business Virus service incorporates a unique link-following
can rely on email security measures alone and feature designed to detect links in emails that lead to
ignore or underestimate the dangers also posed harmful web content. No other vendor can match this
by the web. capacity to check every single incoming email for
bad weblinks, which in turn, can further bolster web
It’s not just a matter of minor inconvenience security.
or modest financial cost. These threats have
the potential to undermine your operations and Armed with capabilities like these, MessageLabs is
damage the very foundations on which your superbly equipped to carry the fight to scammers all
performance is built. Intellectual property and over the globe, and to reassure its millions of clients
other confidential information may leak out or that the good guys really can overcome the bad guys
be lost completely. Your ability to demonstrate in this particular war.
compliance with ever more stringent data security
regulations will be compromised. Vital electronic For a free trial of MessageLabs Web and Email
communications may be impeded and employee Security services please visit www.messagelabs.
morale and productivity may take a major hit. com/trials/free.

Trying to combat these threats can be a huge


challenge. The level of expertise deployed by
scammers today is every bit as high as that found
in the upper echelons of the messaging and

4 WHITE PAPER: Tangled Web: Undercover Threats, Invisible Enemies


MessageLabs offers integrated web and email
security services proven to stay a step ahead of
the bad guys.
Americas Europe
AMERICAS HEADQUARTERS HEADQUARTERS
512 Seventh Avenue 1270 Lansdowne Court
6th Floor Gloucester Business Park
New York, NY 10018 Gloucester, GL3 4AB
USA United Kingdom
T +1 646 519 8100 T +44 (0) 1452 627 627
F +1 646 452 6570 F +44 (0) 1452 627 628

CENTRAL REGION LONDON


7760 France Avenue South 3rd Floor
Suite 1100 1 Great Portland Street
Bloomington, MN 55435 London, W1W 8PZ
USA United Kingdom
T +1 952 830 1000 T +44 (0) 207 291 1960
F +1 952 831 8118 F +44 (0) 207 291 1937

Asia Pacific NETHERLANDS


HONG KONG Teleport Towers
1601 Kingsfordweg 151
Tower II 1043 GR
89 Queensway Amsterdam
Admiralty Netherlands
Hong Kong T +31 (0) 20 491 9600
T +852 2111 3650 F +31 (0) 20 491 7354
F +852 2111 9061
BELGIUM / LUXEMBOURG
AUSTRALIA Culliganlaan 1B
Level 14 B-1831 Diegem
90 Arthur Street Belgium
North Sydney T +32 (0) 2 403 12 61
NSW 2060 F +32 (0) 2 403 12 12
Australia
T +61 2 9409 4360 DACH
F +61 2 9955 5458 Feringastraße 9
85774 Unterföhring
SINGAPORE Munich
Level 14 Germany
Prudential Tower T +49 (0) 89 189 43 990
30 Cecil Street F +49 (0) 89 189 43 999
Singapore 049712
T +65 6232 2855
F +65 6232 2300

www.messagelabs.com
©2008 MessageLabs Inc. All Rights Reserved. MessageLabs and the MessageLabs logo are registered trademarks and Be certain is a trademark of
info@messagelabs.com MessageLabs Ltd. and its affi liates in the United States and/or other countries. Other products, brands, registered trademarks and trademarks are
© MessageLabs 2007 property of their respective owners/companies. WP_DEATHTOPST0208

WHITE PAPER: Tangled Web: Undercover Threats, Invisible Enemies

S-ar putea să vă placă și