2
Monthly Websense Email Security Threat Brief December brought several major attacks in which hackers built their social-engineering campaigns around two main themes 1) the H1N1 scare, and 2) Facebook Password resets. In the first tactic , spammer sent emails masquerading as the CDC (Center for Disease Control), calling recipients to "follow this link" for a "vaccination profile". The link leads to a fake CDC Web site where visitors may be infected. The email subject line changes: variations include "Governmental registration program on the H1N1 vaccination" and "Your personal vaccination profile". The second tactic was an email purporting to be from Facebook with a malware attachment. The email claims that the recipient's Facebook password has been reset for security reasons and that the recipient should open the attachment to find the new password. As a matter of course, nobody should ever open an attachment to get a new password, yet these attacks often succeed. Victims would find themselves infected with the Bredolab Trojan Downloader. Can people tell the difference between a real and fake Web site? A recent study discovered that about 45% of the time people submit their information to a phishing site. Social Spamineering Decemember 2009 Volume 2, Issue 12 KEY STATS Threats “in the mail” this month: 3.2 billion messages processed by the Hosted Infrastructure (over 103 million per day) 86.8% of all email was spam 91.4% of spam included an embedded URL 55 thousand instances of 22 unique zero-day threats stopped by ThreatSeeker before AV 2.9% of spam emails were phishing attacks How Websense is addressing these threats: 99.7% spam detection rate. Websense Hosted Email Security provides 99% spam detection Service Level Agreement. Average false positive rate of 1 in 577,618 1% average daily threats protected using ThreatSeeker intelligence before AV signatures were available What this means: The threat landscape is dangerous and growing more sophisticated. Websense is on the forefront of finding these threats including the increasingly pervasive blended threats. Most importantly, Websense is ideally positioned to address these threats with our market-leading Web security expertise, which drives our leadership in protecting from converged email & Web 2.0 threats. Monthly Email Trends from the Security Labs Figure 1: Embedded URLs in Email Understanding how Web URLs in Email are classified is crucial to stopping converged threats Figure 2: First to Detect Because of the ThreatSeeker TM Network, our Email Security customers are protected hours, and often days, before other security vendors provide a solution. Tech 17% Malicious 14% Shopping 6% Financial 5% Forums 4% Search 5% Storage 7% Business 8% Social Networks 5% Other 29% Top 10 Classifications of URLs in Email 0 20 40 60 80 100 120 140 160 180 1 10 100 1,000 10,000 100,000 Top 10 ThreatSeeker TM Malware Discoveries & Closed Window of Exposure Instances AV Exposure Window Hours Instances

InTheMailDec09

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: InTheMailDec09

Monthly Websense Email Security Threat Brief

December brought several major attacks in which hackers built their social-engineering campaigns around two main themes –

1) the H1N1 scare, and 2) Facebook Password resets.

In the first tactic, spammer sent emails masquerading as the CDC (Center for Disease Control), calling recipients to "follow this link" for a "vaccination profile". The link leads to a fake CDC Web site where visitors may be infected. The email subject line changes: variations include "Governmental registration program on the H1N1 vaccination" and "Your personal vaccination profile".

The second tactic was an email purporting to be from Facebook with a malware attachment. The email claims that the recipient's Facebook password has been reset for security reasons and that the recipient should open the attachment to find the new password. As a matter of course, nobody should ever open an attachment to get a new password, yet these attacks often succeed. Victims would find themselves infected with the Bredolab Trojan Downloader.

Can people tell the difference between a real and fake Web site? A recent study discovered that about 45% of the time people submit their information to a phishing site.

Social Spamineering

DDeecceemmeemmbbeerr 22000099

VVoolluummee 22,, II ssssuuee 1122

KEY STATS

Threats “in the mail” this month:

3.2 billion messages processed by the Hosted Infrastructure (over 103 million per day)

86.8% of all email was spam

91.4% of spam included an embedded URL

55 thousand instances of 22 unique zero-day threats stopped by ThreatSeeker before AV

2.9% of spam emails were phishing attacks

How Websense is addressing these threats:

99.7% spam detection rate. Websense Hosted Email Security provides 99% spam detection Service Level Agreement.

Average false positive rate of 1 in 577,618

1% average daily threats protected using ThreatSeeker intelligence before AV signatures were available

What this means:

The threat landscape is dangerous and growing more sophisticated.

Websense is on the forefront of finding these threats including the increasingly pervasive blended threats.

Most importantly, Websense is ideally positioned to address these threats with our market-leading Web security expertise, which drives our leadership in protecting from converged email & Web 2.0 threats.

Monthly Email Trends from the Security Labs

Figure 1: Embedded URLs in Email Understanding how Web URLs in Email are classified is crucial to stopping converged threats

Figure 2: First to Detect Because of the ThreatSeeker

TM Network, our Email Security customers are protected

hours, and often days, before other security vendors provide a solution.

Tech17%

Malicious14%

Shopping6%

Financial5%Forums

4%Search

5%

Storage7%

Business8%

Social Networks

5%

Other29%

Top 10 Classifications of URLs in Email

020406080100120140160180

1

10

100

1,000

10,000

100,000

Top 10 ThreatSeekerTM Malware Discoveries & Closed Window of ExposureInstances AV Exposure Window

Ho

urs

Inst

an

ces

Page 2: InTheMailDec09

70%

75%

80%

85%

90%

95%

Spam as a Percent of Inbound Email

99.0%

99.2%

99.4%

99.6%

99.8%

100.0%

Spam Detection Rate

2,500

25,000

250,000

2,500,000

False Positive Rate (1 in X)

Figure 3 - Percent of email that contains spam (Average 86.8%) While this figure fluctuates, this signifies that a very high percentage of incoming email is indeed spam. Without a strong email security solution, customers will experience bandwidth and storage capacity issues, frustration, and a drain in productivity, not to mention exposure to significant security risk.

Figure 4 - Percent of spam detected (Average 99.7%)

This is evidence that we are consistently maintaining a very high spam detection rate. Therefore,

customers should be very confident that with Websense they are receiving the best in anti-spam

protection.

Figure 5 - False Positive Rate (Average 1 in 577,618)

This shows how Websense is consistently maintaining a very low false positive rate.

While Websense is catching a high percentage of spam, customers are rarely inhibited by messages

falsely landing in a spam queue.

Why Websense Email Security?

- The Websense ThreatSeeker

Network provides the

intelligence to proactively

protect against spam and

malware – far ahead of

traditional anti-spam and anti-

virus alone.

- Today’s pervasive blended

threats are best matched by

integration of best-in-class

Websense Web security with

email security for Essential

Information Protection.