Malware found on 70 of top 100 sites, says report

Websense also said that one in five malicious applications linked back to the UK in the last six months.

A report has said that 70 per cent of the top 100 most visited sites around the world either hosts malicious content or contains masked links to malicious websites.

According to the latest Websense State of Security white paper, this represented a 16 per cent increase over the last six months.

Carl Leonard, Websense's threat research manager for EMEA, said the affected sites were those that most people on the internet visit, including search engines and sites which allowed user generated content like Google, Facebook, Windows Live, MySpace and Twitter.

Leonard added that this was of major importance to businesses as they were increasingly using web 2.0 tools, while sites like LinkedIn, Twitter and to a lesser degree Facebook had business uses.

He said: "Sites like YouTube are being increasingly embraced, such as when uploading marketing and promotional videos."

Leonard explained that the 16 per cent increase in targeting the top 100 sites was due to cybercriminals aiming to infect as many sites as possible to broaden their reach. They were increasing the amount of data stealing code so that they could access and trade confidential information.

"The way they are doing this is generally though automated means. Because the top 100 are the most frequently viewed sites, there is a well-established user base there," he said.

He added: "They can affect fewer sites in the top 100 to get as much exposure from more of the less popular websites."

In the last six months, Websense also saw one in five malicious applications linked back to the UK. In September, 60 per cent global malware connected back directly to the UK.

Leonard said: "Traditionally users considered that the sorts of sites that these applications communicated back to were from Russia and China. The number of other countries these malicious applications were linking to is increasing."

Websense suspected that instead of putting their eggs in one basket, malware authors were distributing their code and hosting in different countries, dodging law enforcement as well traditional security solutions.

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Recommended

FBI warns of hackers spoofing its domain
cyber security

FBI warns of hackers spoofing its domain

24 Nov 2020
DeviceSHIELD combats rising cyber attacks and online fraud amid COVID-19
Security

DeviceSHIELD combats rising cyber attacks and online fraud amid COVID-19

24 Nov 2020
350,000 Spotify users hacked in credential stuffing attack
Security

350,000 Spotify users hacked in credential stuffing attack

24 Nov 2020
WAPDropper malware hooks you up to premium telecoms services
Security

WAPDropper malware hooks you up to premium telecoms services

24 Nov 2020

Most Popular

macOS Big Sur is bricking some older MacBooks
operating systems

macOS Big Sur is bricking some older MacBooks

16 Nov 2020
46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020
How computing has revolutionised Formula 1
Sponsored

How computing has revolutionised Formula 1

11 Nov 2020