Fortinet, a network security and unified threat management (UTM) solutions provider, has announced its August 2009 Threatscape Report. A flood of malware activity executed through several spam campaigns has been reported in this period. In addition, increasing levels of software vulnerabilities were marked by critical in-the-wild exploits. Key highlights of the August Threatscape Report include:
* ZBot Variant Bumps Headline-Making Worms of Years Past: Surpassing the single-day run of the Sober worm in 2006, the Storm worm in 2007 and rogue security software in 2008, ZBot variants flooded cyberspace on July 24 with record levels: one through HTML/ Agent.E, an attachment in an e-mail, which used the ever-popular eCard hook to potentially steal and sell personal consumer information. An additional ZBot variant made it to the top 10 malware list, yet, even with such high activity rates, ZBot still didn’t grab up the top position. Instead, the online gaming trojan W32/ OnlineGames.BBR maintained its first place position for the third consecutive month.
* Spam Continues to Test the Unsuspecting: While the popular eCard social engineering campaign continued to prey on the innocent, this month’s report highlighted a newly rendered – but an old time classic – money mule scheme. Using a fake job advertisement, this plays on a legitimate company name and the desperation of victims to make a quick buck in a money-laundering scheme. Israel entered the top five regions list for receiving high spam volume, while the USA, Japan and France accounted for the remaining share of detected spam.
* Cause for Remote Code Execution Concern: Marking a consistent trend of increasing software vulnerabilities, threat rates during the August period jumped up from July. Of the 168 new vulnerabilities detected, 62 were reported to be actively exploited in the wild, with a large portion of these attacked vulnerabilities rated as critical. Critical vulnerabilities typically indicate a concern for remote code execution – an easy way for attackers to permeate a system. Two in-the-wild vulnerabilities in Microsoft Office Web Components (MS09-043) and in Adobe Reader/ Flash (APSA09-03) were detected to have consistent exploit activity during this period.
The FortiGuard research team compiled threat statistics and trends for August based on data collected from FortiGate network security appliances and intelligence systems in production worldwide.