|By PR Newswire||
|November 28, 2012 11:00 AM EST||
CUPERTINO, Calif., Nov. 28, 2012 /PRNewswire/ -- In its analysis of targeted attack data collected between February and September this year, global cloud security leader Trend Micro (TYO: 4704;TSE: 4704) found that 91 percent of targeted attacks involved spear phishing. This finding reinforces the company's stance that these attacks often begin at a very simple point of contact – an email message that is cleverly crafted to entice a specific individual to either open a malicious file attachment or to click a link to a malware- or an exploit-laden site, starting a compromise within the victim's network. Spear phishing – coined as a direct analogue to spearfishing – is a new breed of highly targeted phishing that makes the use of information about a target to make attacks more specific and "personal" to the target. Spear phishing emails, for instance, may refer to their targets by their specific name, rank, or position instead of using generic titles as in broader phishing campaigns.
According to the report, "Spear Phishing Email: Most Favored APT Attack Bait," 94 percent of targeted emails use malicious file attachments as the payload or infection source. The remaining 6 six percent use alternative methods such as installing malware through malicious links that download malicious files. The reason for this huge discrepancy is straightforward: Employees in large companies or government organizations normally share files (e.g., reports, business documents, and resumes) via email since downloading materials straight off the Internet is regarded as insecure.
Notable highlights from the report:
- The most commonly used and shared file types accounted for 70 percent of the total number of spear phishing email attachments during the monitored time period. The main file types were: .RTF (38 percent), .XLS (15 percent), and .ZIP (13 percent). Alternatively, executable (.EXE) files were not as popular among cybercriminals, most likely because emails with .EXE file attachments are usually detected and blocked by security solutions.
- The most highly targeted industries are government and activist groups. Extensive information about government agencies and appointed officials are readily found on the Internet and often posted on public government websites. Activist groups, highly active in social media, are also quick to provide member information in order to facilitate communication, organize campaigns or recruit new members. These habits elevate member profiles, making them visible targets.
- As a result, three out of four of the targeted victims email addresses are easily found through web searches or using common email address formats.
Trend Micro offers the most comprehensive, "first line of defense" email security against spear phishing attacks
Based on Trend Micro's on-going research surrounding APTs (advanced persistent threats), organizations must be able to detect and block spear phishing attempts as its first line of defense against targeted attacks. As part of its Custom Defense against APTs launch in October, Trend Micro bolstered its suite of email security solutions to not only stop traditional threats, but also to identify highly targeted, acute email attacks. By integrating with the new Trend Micro™ Deep Discovery hardware appliance, a solution that delivers network-wide threat detection, custom sandboxing, and advanced threat analysis into a single platform, Trend Micro provides leading capabilities in both traditional filtering and specialized threat detection in a single email security layer.
Unlike standard email security solutions that are unlikely to detect spear phishing emails associated with APTs, Trend Micro's email security products automatically send suspicious attachments to Deep Discovery for analysis in customer-defined sandboxes and blocks spear phishing emails in-line. Beyond email threat detection and protection, Deep Discovery automatically issues custom security updates to other security layers throughout the organization's network. Moreover, it correlates local findings with Trend Micro's global threat intelligence to help security departments fight back against their attackers – offering detailed information about the specific attack and the attackers: the nature and extent of the attack, and who is behind it. This custom insight enables organizations to better respond and protect against further attack.
Trend Micro's email security products that are equipped with spear phishing protection include:
- Trend Micro™ ScanMail™ for IBM™ Lotus™ Domino 5.5 – available now
- Trend Micro™ ScanMail™ for Microsoft™ Exchange 10.2 SP2 – available at end of December
- Trend Micro™ InterScan™ Messaging Security 8.2 SP2 – available at end of December
The full report, "Spear Phishing Email: Most Favored APT Attack Bait," is available here: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-spear-phishing-email-most-favored-apt-attack-bait.pdf
About Trend Micro
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com/ and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.
SOURCE Trend Micro Incorporated
- The Odd Couple: Marrying Agile and Waterfall
- Fanning the Flames of Agile
- Internet of @ThingsExpo Silicon Valley Call for Papers Now Open
- MangoApps to Exhibit at Cloud Expo New York
- WSO2 Introduces Industry’s First Enterprise Identity Bus With the Launch of WSO2 Identity Server 5.0
- Last Chance to Register for LTE World Summit
- The Butterfly Effect Within IT
- The Business Challenges Impacting Digital Transformation
- Stay Current on the Internet of Things
- Setting the Bar for Agile Architecture
- New Relic Announces General Availability of Real-Time Analytics Platform New Relic Insights
- Misconceptions Around App Testing in the Private Cloud
- How to Get the Best From Virtual Employees
- Global Financial Firms Can Effectively Address Technology Risk Guidelines
- .CLUB Domain Name Extension Now Available for General Registration
- AMAG, HP, ImageWare Systems, March Networks and StrikeForce Discuss Security Solutions in SecuritySolutionsWatch.com Interviews
- MapR Technologies Announces Upcoming June Conferences
- More Mainstream Businesses Depend on Open Source
- F5 to Present at Upcoming Technology and Investor Conferences
- The Odd Couple: Marrying Agile and Waterfall
- Flexera Software’s InstallShield 2014 Release Introduces New Support of Cloud and Virtualised Installations, High-DPI Displays and Touch Devices, and Agile Development
- FlexNet Manager Suite Wins CODiE Award for Best Asset Management Solution - 4th CODiE Award for Flexera Software
- Fanning the Flames of Agile
- WSO2 Guest Speakers at WSO2Con Europe 2014 Will Examine Technology Developments and Best Practices Enabling the Connected Business
- The Top 150 Players in Cloud Computing
- Who Are The All-Time Heroes of i-Technology?
- Where Are RIA Technologies Headed in 2008?
- Success, Arrogance, Rise and Fall
- AJAX World RIA Conference & Expo Kicks Off in New York City
- The Top 250 Players in the Cloud Computing Ecosystem
- Personal Branding Checklist
- i-Technology Viewpoint: Attack of the Blogs
- Exclusive Q&A with Jeff Haynie, Co-Founder & CEO, Appcelerator
- Cloud People: A Who's Who of Cloud Computing
- Ulitzer Names the World's 30 Most Influential Cloud Computing Bloggers
- Web 2.0 News and Wrapping Up "Real-World AJAX" Seminar