<br />
<b>Deprecated</b>:  Function create_function() is deprecated in <b>/home/hidefide/public_html/blog/wp-content/plugins/wr-pagebuilder/core/core.php</b> on line <b>127</b><br />
{"id":928,"date":"2015-01-05T18:31:34","date_gmt":"2015-01-05T18:31:34","guid":{"rendered":"https:\/\/icaruspressblog.wordpress.com\/?p=928"},"modified":"2019-04-17T10:19:32","modified_gmt":"2019-04-17T10:19:32","slug":"spam-in-2015-botnets-malicious-links-on-the-rise","status":"publish","type":"post","link":"https:\/\/hidefideas.com\/blog\/2015\/01\/05\/spam-in-2015-botnets-malicious-links-on-the-rise\/","title":{"rendered":"Spam in 2015: Botnets, Malicious Links on the Rise"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-929 alignleft\" src=\"http:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/2015.jpg\" alt=\"2015\" width=\"338\" height=\"225\" srcset=\"https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/2015.jpg 600w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/2015-300x200.jpg 300w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/2015-225x150.jpg 225w\" sizes=\"auto, (max-width: 338px) 100vw, 338px\" \/>It\u2019s a new year, and that\u2019s always a good time to review security policies and threat analyses. 2014 was a year filled with big news stories about hacks, and there\u2019s no reason to believe that things are going to get any better. Leading the news were the <a href=\"http:\/\/www.mirror.co.uk\/news\/technology-science\/technology\/apple-warned-icloud-vulnerability-months-4326913\">Apple iCloud leak<\/a>, the <a href=\"http:\/\/www.forbes.com\/sites\/davelewis\/2014\/12\/16\/sony-pictures-data-breach-and-the-pr-nightmare\/\">Sony<\/a> hack <a href=\"http:\/\/www.cnet.com\/news\/after-outage-sony-makes-peace-offering-to-users-of-playstation-network\/\">fiascoes <\/a>(there were more than one), and a number of <a href=\"http:\/\/www.pcworld.com\/article\/2453400\/the-biggest-data-breaches-of-2014-so-far.html\">prominent data breaches<\/a>. If these stories <!--more-->aren\u2019t enough to make you revisit your network hardening, then you must have a pretty secure infrastructure and I\u2019d like to find out how you did it.<\/p>\n<p>It\u2019s 2015, and as we look forward to the new year, we can only guess what problems hackers and spammers have in store for us, but it\u2019s a safe bet that whatever we do to be proactive, they\u2019re going to find a way to break it. We can look back at 2014, though, to see what trends became apparent. By understanding what happened, we can make some educated guesses about this year\u2019s threat landscape, and it all starts with botnets.<\/p>\n<p>According to the <a href=\"http:\/\/www.spamhaus.org\/news\/article\/720\/spamhaus-botnet-summary-2014\">Spamhaus Botnet Summary 2014<\/a>, botnet use is on the rise. It\u2019s no surprise that Spamhaus reports \u201cthe majority of detected botnets are targeted at obtaining and exploiting banking and financial information. Botnet controllers (C&amp;Cs) are hosted disproportionately on ISPs with understaffed abuse departments, inadequate abuse policies, or inefficient abuse detection and shutdown processes. Botnet C&amp;C domains are registered disproportionately with registrars in locations that have lax laws or inadequate enforcement against cybercrime.\u201d According to <a href=\"http:\/\/www.zdnet.com\/article\/botnets-in-review-2014-zeus-surge-lax-policies-place-web-users-at-risk\/\">ZDNet.com<\/a>, \u201cin 2014, Spamhaus detected 7,182 distinct IP addresses that hosted a botnet controller, which is an increase of 525 &#8212; or approximately eight percent &#8212; over the number recorded in 2013. C&amp;C centers were hosted on a total of 1,183 networks.\u201d<\/p>\n<p>Interestingly enough, IP addresses hosting C&amp;C servers are not hosted in countries typically considered to be the usual suspects. Spamhaus reports that a network in France comes in at number one with 189 C&amp;C servers; Germany at number two with 124; and the Netherlands comes in third at 120.<\/p>\n<p>On the malware side, the report identified ZeuS as the runaway leader, being found on 2,246 C&amp;C servers. Citadel comes in at number two, with 1,127. Asprox, a spambot, was a distant third, being found on 566 server. Both ZeuS and Citadel are e-banking Trojans, so it\u2019s pretty clear what the primary focus of spammers is. It\u2019s all about the Benjamins, baby.<\/p>\n<p>On the spam side, we\u2019re seeing sharp rises in malicious links as spammers drift away from attachments. This makes plenty of sense, because everyone emphasizes the danger of attachments, but many people are comfortable with clicking links and don\u2019t seem to get that links can be spoofed. And it\u2019s a no-brainer that spam filters are looking for attachments, whereas links are more benign. According to <a href=\"http:\/\/www.net-security.org\/malware_news.php?id=2933\">Help Net Security<\/a>, spam emails containing malicious links rose from 7 percent in October to 41 percent in November, a whopping increase over a month. That number continued to climb in December. \u201cWhile many malicious emails come with an attachment, organizations can block and filter these types of messages,\u201d a security expert tells HNS. It\u2019s suspected that \u201cthe Cutwail botnet (Trojan.Pandex) is behind some of the recent spam messages, along with other botnets, and that attackers have resorted to using links in a bid to avoid email security products that scan for malicious attachments.\u201d<\/p>\n<p>According to <a href=\"http:\/\/www.spamfighter.com\/News-19379-Spam-Containing-Malicious-Links-Rises-Symantec.htm\">SpamFighter.com<\/a>, \u201cduring last few weeks, cybercriminals have been relaying out social engineered messages like emails about voicemail and fax notifications. These emails may contain information usually included in genuine fax and voicemail messages like confirmation number or caller identification but the information itself is phony.\u201d The payload here is to be found only after the user has clicked the dirty link. \u201cThe common thread in each email is links given in emails and these links use hijacked domains having URL path which leads to a PHP landing page. Users are led to a malicious file\u2026when they click on the links.\u201d<\/p>\n<p>Botnets and dirty links seem to be the outlook for 2015, but of course we cannot assume that it will stop there. Spammers are nothing if not multitasking. Spamhaus doesn\u2019t see a cessation in the use of botnets, but they do offer some sage advice. \u201cBecause techniques used by criminals online are always changing, it is best to use a multi-layered defense, which should include keeping users away from dangerous resources such as the ones [in the report]. Spamhaus will continue working to protect internet users worldwide and continue helping networks and registrars to keep their assets clean.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s a new year, and that\u2019s always a good time to review security policies and threat analyses. 2014 was a year filled with big news&hellip; <\/p>\n","protected":false},"author":3,"featured_media":929,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14],"tags":[11,9,10,8,7],"class_list":["post-928","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-spam","tag-allspammedup","tag-bot","tag-botnet","tag-malware","tag-spam","jsn-master"],"_links":{"self":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/comments?post=928"}],"version-history":[{"count":2,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/928\/revisions"}],"predecessor-version":[{"id":1658,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/928\/revisions\/1658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/media\/929"}],"wp:attachment":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/media?parent=928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/categories?post=928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/tags?post=928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}