Cybercriminals are ever focused on infecting as many victims machines or stealing as much personal information with as little effort as possible. By disguising the source of their spam as messages from companies or organisations with widespread appeal, they can increase the number of potential victims likely to fall for their scams, said Christopher Boyd, senior threat researcher at GFI Software. Any notices or confirmation emails that arrive unexpectedly, no matter how legitimate it may appear, should be thoroughly inspected before the user takes any other action. If something seems out of place, users should trust their instincts and use common sense before clicking anything that could make the situation worse.
Throughout the month of June, phony emails claiming to be Amazon order confirmations were sent to unsuspecting victims in the hopes of infecting them with malware. Users who clicked any of the links contained in the email were directed to a web page that contained Blackhole exploit code. The exploit scanned the users system for Adobe Reader and Adobe Flash before loading a Java applet that redirected the victim to web pages that hosted specially-crafted PDF exploit files depending on the version of Adobe Reader found on the system.
Another fake email posing as a Twitter account confirmation linked victims to a Russian website which housed a Blackhole exploit kit. The site deployed exploits that targeted Adobe Reader and Adobe Flash vulnerabilities which were as old as six years. Its important to note that both of these attack campaigns could have been avoided had victims kept their software fully patched and up to date.
A bogus spam email was also discovered disguising itself as a Delta Airlines e-ticket. Users who downloaded the attachment were met with an executable file that infected their system with Sirefef and Live Security Platinum, a rogue antivirus program. This fake AV program blocked the running of all other applications and deployed constant pop-ups and browser redirects to messages alerting the user of an infection and requesting payment to clean up the system.
Analysing Flame
In June, The GFI Software Flame Task Force identified malware behaviour exhibited by Flame not yet reported by other security vendors or malware researchers. To learn how GFI threat researchers were able to generate 100MB of detailed malware behavioural data on Flame in less than 5 minutes using GFI SandBox, please visit http://vimeo.com/44382073.
Top 10 Threat Detections for June
GFIs top 10 threat detection list is compiled from collected scan data of tens of thousands of GFI VIPRE Antivirus customers who are part of GFIs ThreatNet automated threat tracking system. ThreatNet statistics revealed that Trojans continued to dominate the month, taking six of the top 10 spots.
Detection ==================== Type ============== Percent
Trojan.Win32.Generic—————-Trojan————————31.51
GamePlayLabs————————-Browser Plug-in———–5.79
Trojan.Win32.Small——————-Trojan————————2.97
Trojan.Win32.Sirefef.pq (v)———-Trojan————————2.48
Yontoo (v)—————————–Adware ———————2.45
Trojan.Win32.Fakealert.cn (v)——-Trojan———————–1.24
INF.Autorun (v)————————–Trojan————————1.06
GameVance—————————–Adware (General)———-0.96
Trojan.Win32.Ramnit.c (v)———–Trojan————————-0.84
iBryte————————————–Adware (General)———–0.83