Adobe Reader and IE feel brunt of web-based malware

Symantec's latest annual report shows PDF-based attacks accounted for nearly half of all online attacks in 2009, with 240 million new threats identified in total.

security attacks

Adobe Reader and Internet Explorer were the two most vulnerable programs as web-based attacks saw a dramatic increase in 2009, Symantec has revealed.

The security software maker's annual Internet Security Threat Report revealed that last year saw a 100 per cent rise in new malware year-on-year, with more than 240 million new malicious programs having been discovered. In addition, a new botnet-infected PC is discovered every 4.6 seconds.

The single most exploited vulnerability in 2009 was a hole in Microsoft's Windows SMB2, followed by vulnerabilities in Adobe's Reader and Flash Player, and issues with Internet Explorer 7.

The most popular method of attack was through PDF file downloads, which represented nearly half of all web-based attacks.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Symantec said that while Internet Explorer was the most vulnerable to attack, in many ways it was a victim of its own success. Indeed, the total of 45 reported vulnerabilities in Internet Explorer was less than a third of the 169 holes reported in Firefox.

"This shows that attacks on software are not necessarily based on the number of vulnerabilities in a piece of software, but on its market share and the availability of exploit code as well," the report read.

In addition, Symantec urged Apple to step up its efforts to combat the increasing number of threats targeting its Safari browser, with 94 new vulnerabilities having been discovered for the browser in 2009.

"It takes IE and Firefox less than a day of exposure before a patch is available, but it's about 13 days with Safari. Apple is going to have to catch up because that's quite a long time to be exposed," the company warned.

According to Symantec, hackers are increasingly using web browser plug-ins as a way into unsuspecting users' computers. It discovered 321 holes affecting browser plug-ins last year: 134 using ActiveX, 84 for Java SE and 49 for Adobe Reader. The figures actually represent a decline in the number of ActiveX holes, with the cross-platform nature of Java and Adobe Reader making them increasingly attractive to scammers.

Symantec put the significant increase in malicious software overall down to an increasingly organised and sophisticated underground market where criminals buy, sell and trade tools for putting together DIY online attacks. For example, the company found nearly 90,000 unique variations of the basic Zeus toolkit, available for as little as $700.

Advertisement - Article continues below

The US continues to lead the way as both the top country of attack origin and also the top country in terms of number of infected computers. China remained in second place, with Brazil emerging as a new malware hotspot in third place, illustrating a trend for hackers to increasingly base their operations in less developed countries, where laws and controls might be less well developed.

The steep rise in malware was driven largely by the growing popularity of easy to use toolkits that novice cyber criminals are using to turn out their own malware, said Tony Osborne, a technology manager for the public sector at Symantec.

Some of the kits were available for free, but others cost a lot of money, Osborne claimed. One, called Zeus, was available for around $700 (458) and many had become so successful that their creators now offer telephone support for those who cannot get them to work.

During 2009, Symnatec say more than 90,000 variants of the Zeus kit and it was responsible for the growth of one of the most prolific malware families during the year.

Advertisement
Advertisement - Article continues below

Zeus relies on spam to lure people to websites where victims will be tricked into installing malicious code or which sneaks on to a computer via a known vulnerability.

Often this can help criminals set up botnets - networks of hijacked home PCs that can be used to send spam or plundered for lucrative personal data, according to the report. In 2009, Symantec saw almost seven million distinct PCs that were members of botnets.

Featured Resources

How inkjet can transform your business

Get more out of your business by investing in the right printing technology

Download now

Journey to a modern workplace with Office 365: which tools and when?

A guide to how Office 365 builds a modern workplace

Download now

Modernise and transform your sales organisation

Learn how a modernised sales process can drive your business

Download now

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now
Advertisement

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/pdf-software/29855/why-it-s-time-to-take-your-documents-digital
document management systems (DMS)

Why it’s time to take your documents digital

7 Feb 2020
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020
Visit/operating-systems/microsoft-windows/354739/windows-7-bug-blocks-users-from-shutting-down-their-pcs
Microsoft Windows

Windows 7 bug blocks users from shutting down their PCs

10 Feb 2020
Visit/hardware/354723/coronavirus-starts-to-take-its-toll-on-the-tech-industry
Hardware

Coronavirus starts to take its toll on the tech industry

6 Feb 2020