Most users think that spam emails are mainly used for phishing attacks. That is a fairly reasonable assumption, however, the number of malware attacks initiated using emails is also on the rise. In a recent example of this, attackers used fake LinkedIn contact requests to lure their victims to websites primed with exploit kits.
The emails tell the recipients that they have received a contact request in the self-proclaimed "world's largest professional network on the Internet." It is often suggested that the contact comes from a renowned company and that there are other messages waiting for the user. In addition, the email is marked as high priority to make it as appealing as possible.
The fake email features a simple but professional design and there is hardly anything indicating that it is a fraud if you compare it to an original. However, what is notable is that the spam email is a mixture of a LinkedIn contact request email (subject line) and a reminder email (text).
Clicking on one of the three links in the email opens a connection to a forwarding website. The victim is taken to a website that has been primed for attacks using an exploit kit. Depending on the version of the exploit kit, this tool contains a number of different attacks on vulnerabilities (exploits) and is used as a means of attack.
If a user visits one of these primed websites, the exploit kit is used to check the configuration of the user's computer for applications that can be attacked (browser, software, OS, ...). If the configuration that is read contains one or more vulnerabilities, a suitable exploit is sent to the client, which uses the discovered security flaw to secretly download additional malware code to the vulnerable computer (drive-by download), for example.
Exploit kits are among the most wide-spread attack tools in use and are popular with attackers because they are relatively easy to use. They also enable less experienced cyber criminals to use manipulated websites for attacks and deliver all types of malware to visitors to the site. Both actual exploit kits and complete attack packages with all servers, settings etc. can be acquired as services on the black market.
Vulnerabilities in operating systems or software are among the main gateways for all types of malware code and very popular with cyber criminals. The Internet is the greatest gateway. All it takes for an infection is to visit a primed website!
It is absolutely irrelevant whether the website offers adult content, is a news website or represents the local sports club. Hence, a website's theme offers no indication as to whether it is currently dangerous or harmless to users. Of course, popular websites with many visitors are more attractive to attackers, but anyone who surfs the net is a potential victim, irrespective of the sites they visit!
In June 2012, the experts at Google reported that they discover about 9,500 new malicious websites every day and the G Data Security Labs determined that the number of new exploit type signature variants registered by G Data increased by almost 58% in the second half of 2012.
For more statistics on the spread of dangerous websites and developments in the area of malware for PCs as well as mobile devices, see the G Data Malware Report H2/2012.
PC security depends on the combination of security software used and operating system updates as well as software updates. Multi-level protection is a must!
Vulnerabilities in Oracle's Java, Adobe Flash and Adobe Reader are often publicised in the media and therefore brought to the users' attention, but many think "I don't have to update, nothing is going to happen to me" or "there is nothing worthwhile on my computer." However, this assumption is wrong because every infected computer is of value to the attackers.
However, merely keeping the three aforementioned programs up-to-date is not enough! To eliminate known vulnerabilities, all programs and the operating system must always be kept up-to-date with patches and updates.