SlideShare a Scribd company logo
1 of 27
Symantec Intelligence Report

    August 2011


Symantec Intelligence              1
The Symantec Intelligence Report
The new Symantec Intelligence Report combines the best
research and analysis from Symantec:
• Symantec.cloud MessageLabs Intelligence Report
• Symantec State of Spam & Phishing Report


The Symantec Intelligence Report integrated report provides the
latest analysis of cyber security threats, trends and insights from
the Symantec Intelligence team




Symantec Intelligence                                                 2
August 2011 Highlights
• Spam – 75.9 percent in August
• Phishing – One in 207.7 emails identified as phishing
• Malware – One in 203.3 emails in August contained malware
• Malicious Web sites – 3,441 Web sites blocked per day
• 34.1 percent of all malicious domains blocked were new in August
• 17.3 percent of all Web-based malware blocked was new in August


• Global Debt Crises News Drives Pump-and-Dump Stock Scams
• Are MBR Infections Back in Fashion?
• Phishing Apple’s iDisk
• Phishing Brazilian Brands
• The Truth Behind the Shady RAT
• Spammers take advantage of Unicode normalisation to hide URLs
• Best Practices for Enterprises and Users


Symantec Intelligence                                                3
Global Debt Crises News Drives Pump-and-Dump Stock
Scams




Symantec Intelligence                                4
Global Debt Crises News Drives Pump-and-Dump Stock
Scams




Symantec Intelligence                                5
Bootup malware




Symantec Intelligence   6
Phishing Apple’s iDisk




   http://******.com/test?authenticate_username=******
   [Domain name and User name removed]

Symantec Intelligence                                    7
Phishing Brazilian Brands

 •       12 hosting sites were used to host 4% of
         the phishing sites on Brazilian brands
 •       Banking made up about 39% of the
         brands targeted
 •       Social networking attacks targeted one
         brand and comprised 61%of the total
 •       0.5% spoofed a major airline
 •       Approximately 64% of the phishing sites
         were created using automated phishing
         toolkits; the remaining 36% were unique
         URLs



http://***.***.***.***/~namo/login011/?accounts/ServiceLogin?
http://***.***.***.***/~namo/login008/?accounts/ServiceLogin?
[IP addresses removed]

     Symantec Intelligence                                      8
The Truth Behind the Shady RAT




                        Example attachment names included:
                        •Participant_Contacts.xls
                        •2011 project budget.xls
                        •Contact List -Update.xls
                        •The budget justification.xls

Symantec Intelligence                                        9
The Truth Behind the Shady RAT




              •    www.comto[REMOVED].com/wak/mansher0.gif
              •    www.kay[REMOVED].net/images/btn_topsec.jpg
              •    www.swim[REMOVED[.net/images/sleepyboo.jpg
              •    www.comto[REMOVED].com/Tech/Lesson15.htm



Symantec Intelligence                                           10
Spammers take advantage of Unicode normalisation to
hide URLs
For example, a spam message contains the following URL:


    Unicode character U+217C ("SMALL ROMAN NUMERAL FIFTY")


http://example․ⅼy/xyz
                        Unicode character U+2024 ("ONE DOT LEADER")




Symantec Intelligence                                             11
Spammers take advantage of Unicode normalisation to
hide URLs




Symantec Intelligence                             12
Spam Rate & Sources
                      13
Additional Spam Metrics
Global Spam Categories

     Category Name                August 2011   July 2011
     Pharmaceutical                    40.0%       47.0%
     Adult/Sex/Dating                  19.0%       14.5%
     Watches/Jewelry                   17.5%         7.5%
     Unsolicited Newsletters           11.5%         7.5%
     Casino/Gambling                     7.0%        3.5%
     Unknown/Other                       2.5%        2.0%
     Degrees/Diplomas                    1.5%        2.5%
     Jobs/Recruitments                   1.0%      10.5%
     Discount Products/Software          0.5%      <0.5%
     Scams/Fraud/419                     0.5%      <0.5%


Symantec Intelligence                                       14
Spam Subject Line Analysis
        August 2011                          No. of   July 2011                       No. of
Rank    Total Spam: Top Subject Lines         Days    Total Spam: Top Subject Lines    Days
1       (blank subject line)                    31    drop me a line                     30
        ED-Meds-Antidepressants-And-Pain        31
2                                                     r u online now?                    30
        Relief-Meds-8O%-OFF
        Buy Advanced Penis Enlargement          31
3                                                     hi darling..                       30
        Pill now, it is selling fast.
        Made of the most potent clinically      31
4                                                     new email                          30
        proven natural herbs.
        Permanently increases length and        31
5       width of your erection. Advanced              found you :)                       30
        Penis Enlargement Pill.
        Advanced Penis Enlargement Pill.        31
6       Permanently increases length and              im online now                      30
        width of your erection.
7       my hot pics :)                          23    my new pics :)                     30
8       found you :)                            23    my new email                       30
9       new pics for you..                      24    my hot pics :)                     30
10      im online now                           23    I'm online now…                    30




Symantec Intelligence                                                                          15
Additional Spam Metrics
Spam URL TLD Distribution

                                           Change
TLD                     August    July
                                         (% points)
.com                     57.6%   54.9%        +2.7
.ru                       7.1%   10.6%         -3.5
.info                    18.4%   18.3%        +0.1
.net                      5.8%    6.2%         -0.4

 Average Spam Message Size

                                           Change
Message Size            August    July
                                         (% points)
0Kb – 5Kb                49.7%   65.1%        -15.4
5Kb – 10Kb               35.2%   21.2%       +14.0
>10Kb                    15.0%   13.7%        +1.3



Symantec Intelligence                                 16
Additional Spam Metrics
Spam Attack Vectors

15%

12%
                                                                               At achment
 9%

 6%

 3%
                                                                      NDR
 0%
    10 Jul      13 Jul   16 Jul   19 Jul   22 Jul   25 Jul   28 Jul   31 Jul      03 Aug    06 Aug   09 Aug



Symantec Intelligence                                                                                 17
Phishing Rate & Sources




                          18
Phishing Rate & Sources
    P h is h in g W e b S it e s L o c a tio n s
                                                          C o u n try                  Ju ly
                                                                                      August         J uJuly
                                                                                                         ne
                                     2
                                                   5      U n it e d S t a t e s     4 9 .8 %      49.5%
                4                3
                                                          G e rm a n y                6 .5 %         6.5%
                    1
                                                          U n i t e d K in g d o m    3 .8 %         3.7%
                                                          C anada                     3 .7 %         3.3%
                                                          R u s s ia                  3 .0 %         2.7%
                                                          F ra n c e                  2 .7 %         3.1%
                                                          B ra z il                   2 .6 %         2.2%
                                                          N e t h e rla n d s         2 .3 %         2.1%
                                                          P o la n d                  1 .6 %         1.7%
                                                          C h in a                    2 .5 %         2.8%

                                                                                                A u g u s t 2 0 11



•     The number of phishing Web sites decreased by 6.75% in August
•     The number of phishing Web sites created by automated toolkits decreased by 18.3%
•     The number of unique phishing URLs decreased by 1.67%
•     Phishing Web sites using IP addresses in place of domain names (e.g.
      http://255.255.255.255), increased by 18.34%
•     Legitimate hosting services accounted for approximately 9% of all phishing sites, a
      decrease of 16.81% since July

•     The number of non-English phishing sites saw an increase of 9.07%
•     The most common non-English languages identified in phishing Web sites during August
      included Portuguese, French, Italian and Spanish.
                                                                                                                     19
Tactics of Phishing Distribution




Symantec Intelligence              20
Organizations Spoofed in Phishing Attacks, by Industry
Sector




Symantec Intelligence                                    21
Virus Rate




             22
Most Frequently Blocked Email Malware
   Malware Name                         % Malware
   Exploit/SuspLink-e958                    7.20%
   W32/Bredolab.gen!eml                     4.90%
   Exploit/SuspLink.dam                     4.34%
   W32/Generic.dam                          2.09%
   W32/Generic-6ac4                         2.06%
   Exploit/MimeBoundary003                  1.69%
   W32/Netsky.c-mm                          1.56%
   Exploit/Link-e88c                        1.47%
   VBS/Generic                              1.36%
   W32/Netsky.P-mm                          1.34%



Symantec Intelligence                               23
New Malware and Spyware Sites Per Day




Symantec Intelligence                   24
Policy, Malware & Potentially Unwanted Programs




Symantec Intelligence                             25
Most Frequently Blocked Malware at the Endpoint
  Malware Name                                                                                                                             % Malware
  W32.Ramnit!html                                                                                                                                      8.68%
  W32.Sality.AE                                                                                                                                        8.44%
  Trojan.Bamital                                                                                                                                       8.10%
  W32.Ramnit.B!inf                                                                                                                                     6.84%
  W32.Downadup.B                                                                                                                                       3.63%
  W32.SillyFDC.BDP!lnk                                                                                                                                 2.59%
  W32.Virut.CF                                                                                                                                         2.58%
  W32.Almanahe.B!inf                                                                                                                                   2.38%
  W32.SillyFDC                                                                                                                                         1.75%
  Trojan.ADH.2                                                                                                                                         1.74%

                        [1] For further information on these threats, please visit: http://www.symantec.com/business/security_response/landing/threats.jsp




Symantec Intelligence                                                                                                                                          26
Where to next?
• Web:
    – www.symanteccloud.com/intelligence
    – www.symantec.com/spam


• Twitter:
    – @symanteccloud




Symantec Intelligence                      27

More Related Content

What's hot

Asia’s social media map and users’ online (june 2010)
Asia’s social media map and users’ online (june 2010)Asia’s social media map and users’ online (june 2010)
Asia’s social media map and users’ online (june 2010)Michael Netzley, Ph.D.
 
Admob regional traffic growth 2010
Admob regional traffic growth 2010Admob regional traffic growth 2010
Admob regional traffic growth 2010matafnet
 
Nielsen亚太SNS研究
Nielsen亚太SNS研究Nielsen亚太SNS研究
Nielsen亚太SNS研究weichengwendao
 
Analyse de 150 pages avec Facebook Login (ex Facebook Connect)
Analyse de 150 pages avec Facebook Login (ex Facebook Connect)Analyse de 150 pages avec Facebook Login (ex Facebook Connect)
Analyse de 150 pages avec Facebook Login (ex Facebook Connect)Mickael Bentz
 
Analysis of 150 Websites Using Facebook Login
Analysis of 150 Websites Using Facebook LoginAnalysis of 150 Websites Using Facebook Login
Analysis of 150 Websites Using Facebook LoginNeolane, Inc.
 

What's hot (6)

Asia’s social media map and users’ online (june 2010)
Asia’s social media map and users’ online (june 2010)Asia’s social media map and users’ online (june 2010)
Asia’s social media map and users’ online (june 2010)
 
Danis lsssg
Danis lsssgDanis lsssg
Danis lsssg
 
Admob regional traffic growth 2010
Admob regional traffic growth 2010Admob regional traffic growth 2010
Admob regional traffic growth 2010
 
Nielsen亚太SNS研究
Nielsen亚太SNS研究Nielsen亚太SNS研究
Nielsen亚太SNS研究
 
Analyse de 150 pages avec Facebook Login (ex Facebook Connect)
Analyse de 150 pages avec Facebook Login (ex Facebook Connect)Analyse de 150 pages avec Facebook Login (ex Facebook Connect)
Analyse de 150 pages avec Facebook Login (ex Facebook Connect)
 
Analysis of 150 Websites Using Facebook Login
Analysis of 150 Websites Using Facebook LoginAnalysis of 150 Websites Using Facebook Login
Analysis of 150 Websites Using Facebook Login
 

Similar to Symantec Intelligence Report August 2011

2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report2011 September Symantec Intelligence Report
2011 September Symantec Intelligence ReportSymantec
 
2011 October Symantec Intelligence Report
2011 October Symantec Intelligence Report2011 October Symantec Intelligence Report
2011 October Symantec Intelligence ReportSymantec
 
Create Values from Big Data & Social Media Mash-Up
Create Values from Big Data & Social Media Mash-UpCreate Values from Big Data & Social Media Mash-Up
Create Values from Big Data & Social Media Mash-UpPam Didner
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec
 
Gerry McGovern - Earth Experience Design (Camp Digital 2022)
Gerry McGovern - Earth Experience Design (Camp Digital 2022)Gerry McGovern - Earth Experience Design (Camp Digital 2022)
Gerry McGovern - Earth Experience Design (Camp Digital 2022)Nexer Digital
 
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...McKinley Advisors
 
2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report2012 February Symantec Intelligence Report
2012 February Symantec Intelligence ReportSymantec
 
Perils of Perception December 2018
Perils of Perception December 2018Perils of Perception December 2018
Perils of Perception December 2018Ipsos Public Affairs
 
5 steps of curation service
5 steps of curation service5 steps of curation service
5 steps of curation serviceSeungyul Kim
 
Ibm advanced analytics platform for m&e
Ibm advanced analytics platform for m&eIbm advanced analytics platform for m&e
Ibm advanced analytics platform for m&eUnited Partners
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad BotsDistil Networks
 
Turning Social Data Into Strategic Advantage: What Marketers Need to Know
Turning Social Data Into Strategic Advantage: What Marketers Need to KnowTurning Social Data Into Strategic Advantage: What Marketers Need to Know
Turning Social Data Into Strategic Advantage: What Marketers Need to KnowDataSift
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchMehul Doshi
 
Brave New World: The End of Survey Research
Brave New World: The End of Survey ResearchBrave New World: The End of Survey Research
Brave New World: The End of Survey ResearchMichael Bystry
 
Delvinia Digital Diseases Presentation Smei
Delvinia Digital Diseases Presentation SmeiDelvinia Digital Diseases Presentation Smei
Delvinia Digital Diseases Presentation SmeiDelvinia
 
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudGraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudNeo4j
 
Riding Wave Social Networking 24 Mar 2009
Riding Wave Social Networking 24 Mar 2009Riding Wave Social Networking 24 Mar 2009
Riding Wave Social Networking 24 Mar 2009Erick Caniso
 
How Consumers Engage with Mobile Apps
How Consumers Engage with Mobile AppsHow Consumers Engage with Mobile Apps
How Consumers Engage with Mobile AppsSIXTY
 

Similar to Symantec Intelligence Report August 2011 (20)

2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report2011 September Symantec Intelligence Report
2011 September Symantec Intelligence Report
 
2011 October Symantec Intelligence Report
2011 October Symantec Intelligence Report2011 October Symantec Intelligence Report
2011 October Symantec Intelligence Report
 
Create Values from Big Data & Social Media Mash-Up
Create Values from Big Data & Social Media Mash-UpCreate Values from Big Data & Social Media Mash-Up
Create Values from Big Data & Social Media Mash-Up
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 
Gerry McGovern - Earth Experience Design (Camp Digital 2022)
Gerry McGovern - Earth Experience Design (Camp Digital 2022)Gerry McGovern - Earth Experience Design (Camp Digital 2022)
Gerry McGovern - Earth Experience Design (Camp Digital 2022)
 
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
Breaking Bad Habits: Transitioning to Intentional and Thoughtful Member Commu...
 
Big datamarket022812rv
Big datamarket022812rvBig datamarket022812rv
Big datamarket022812rv
 
2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report2012 February Symantec Intelligence Report
2012 February Symantec Intelligence Report
 
Perils of Perception December 2018
Perils of Perception December 2018Perils of Perception December 2018
Perils of Perception December 2018
 
Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
 
5 steps of curation service
5 steps of curation service5 steps of curation service
5 steps of curation service
 
Ibm advanced analytics platform for m&e
Ibm advanced analytics platform for m&eIbm advanced analytics platform for m&e
Ibm advanced analytics platform for m&e
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
 
Turning Social Data Into Strategic Advantage: What Marketers Need to Know
Turning Social Data Into Strategic Advantage: What Marketers Need to KnowTurning Social Data Into Strategic Advantage: What Marketers Need to Know
Turning Social Data Into Strategic Advantage: What Marketers Need to Know
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
 
Brave New World: The End of Survey Research
Brave New World: The End of Survey ResearchBrave New World: The End of Survey Research
Brave New World: The End of Survey Research
 
Delvinia Digital Diseases Presentation Smei
Delvinia Digital Diseases Presentation SmeiDelvinia Digital Diseases Presentation Smei
Delvinia Digital Diseases Presentation Smei
 
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudGraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
 
Riding Wave Social Networking 24 Mar 2009
Riding Wave Social Networking 24 Mar 2009Riding Wave Social Networking 24 Mar 2009
Riding Wave Social Networking 24 Mar 2009
 
How Consumers Engage with Mobile Apps
How Consumers Engage with Mobile AppsHow Consumers Engage with Mobile Apps
How Consumers Engage with Mobile Apps
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Symantec Intelligence Report August 2011

  • 1. Symantec Intelligence Report August 2011 Symantec Intelligence 1
  • 2. The Symantec Intelligence Report The new Symantec Intelligence Report combines the best research and analysis from Symantec: • Symantec.cloud MessageLabs Intelligence Report • Symantec State of Spam & Phishing Report The Symantec Intelligence Report integrated report provides the latest analysis of cyber security threats, trends and insights from the Symantec Intelligence team Symantec Intelligence 2
  • 3. August 2011 Highlights • Spam – 75.9 percent in August • Phishing – One in 207.7 emails identified as phishing • Malware – One in 203.3 emails in August contained malware • Malicious Web sites – 3,441 Web sites blocked per day • 34.1 percent of all malicious domains blocked were new in August • 17.3 percent of all Web-based malware blocked was new in August • Global Debt Crises News Drives Pump-and-Dump Stock Scams • Are MBR Infections Back in Fashion? • Phishing Apple’s iDisk • Phishing Brazilian Brands • The Truth Behind the Shady RAT • Spammers take advantage of Unicode normalisation to hide URLs • Best Practices for Enterprises and Users Symantec Intelligence 3
  • 4. Global Debt Crises News Drives Pump-and-Dump Stock Scams Symantec Intelligence 4
  • 5. Global Debt Crises News Drives Pump-and-Dump Stock Scams Symantec Intelligence 5
  • 7. Phishing Apple’s iDisk http://******.com/test?authenticate_username=****** [Domain name and User name removed] Symantec Intelligence 7
  • 8. Phishing Brazilian Brands • 12 hosting sites were used to host 4% of the phishing sites on Brazilian brands • Banking made up about 39% of the brands targeted • Social networking attacks targeted one brand and comprised 61%of the total • 0.5% spoofed a major airline • Approximately 64% of the phishing sites were created using automated phishing toolkits; the remaining 36% were unique URLs http://***.***.***.***/~namo/login011/?accounts/ServiceLogin? http://***.***.***.***/~namo/login008/?accounts/ServiceLogin? [IP addresses removed] Symantec Intelligence 8
  • 9. The Truth Behind the Shady RAT Example attachment names included: •Participant_Contacts.xls •2011 project budget.xls •Contact List -Update.xls •The budget justification.xls Symantec Intelligence 9
  • 10. The Truth Behind the Shady RAT • www.comto[REMOVED].com/wak/mansher0.gif • www.kay[REMOVED].net/images/btn_topsec.jpg • www.swim[REMOVED[.net/images/sleepyboo.jpg • www.comto[REMOVED].com/Tech/Lesson15.htm Symantec Intelligence 10
  • 11. Spammers take advantage of Unicode normalisation to hide URLs For example, a spam message contains the following URL: Unicode character U+217C ("SMALL ROMAN NUMERAL FIFTY") http://example․ⅼy/xyz Unicode character U+2024 ("ONE DOT LEADER") Symantec Intelligence 11
  • 12. Spammers take advantage of Unicode normalisation to hide URLs Symantec Intelligence 12
  • 13. Spam Rate & Sources 13
  • 14. Additional Spam Metrics Global Spam Categories Category Name August 2011 July 2011 Pharmaceutical 40.0% 47.0% Adult/Sex/Dating 19.0% 14.5% Watches/Jewelry 17.5% 7.5% Unsolicited Newsletters 11.5% 7.5% Casino/Gambling 7.0% 3.5% Unknown/Other 2.5% 2.0% Degrees/Diplomas 1.5% 2.5% Jobs/Recruitments 1.0% 10.5% Discount Products/Software 0.5% <0.5% Scams/Fraud/419 0.5% <0.5% Symantec Intelligence 14
  • 15. Spam Subject Line Analysis August 2011 No. of July 2011 No. of Rank Total Spam: Top Subject Lines Days Total Spam: Top Subject Lines Days 1 (blank subject line) 31 drop me a line 30 ED-Meds-Antidepressants-And-Pain 31 2 r u online now? 30 Relief-Meds-8O%-OFF Buy Advanced Penis Enlargement 31 3 hi darling.. 30 Pill now, it is selling fast. Made of the most potent clinically 31 4 new email 30 proven natural herbs. Permanently increases length and 31 5 width of your erection. Advanced found you :) 30 Penis Enlargement Pill. Advanced Penis Enlargement Pill. 31 6 Permanently increases length and im online now 30 width of your erection. 7 my hot pics :) 23 my new pics :) 30 8 found you :) 23 my new email 30 9 new pics for you.. 24 my hot pics :) 30 10 im online now 23 I'm online now… 30 Symantec Intelligence 15
  • 16. Additional Spam Metrics Spam URL TLD Distribution Change TLD August July (% points) .com 57.6% 54.9% +2.7 .ru 7.1% 10.6% -3.5 .info 18.4% 18.3% +0.1 .net 5.8% 6.2% -0.4 Average Spam Message Size Change Message Size August July (% points) 0Kb – 5Kb 49.7% 65.1% -15.4 5Kb – 10Kb 35.2% 21.2% +14.0 >10Kb 15.0% 13.7% +1.3 Symantec Intelligence 16
  • 17. Additional Spam Metrics Spam Attack Vectors 15% 12% At achment 9% 6% 3% NDR 0% 10 Jul 13 Jul 16 Jul 19 Jul 22 Jul 25 Jul 28 Jul 31 Jul 03 Aug 06 Aug 09 Aug Symantec Intelligence 17
  • 18. Phishing Rate & Sources 18
  • 19. Phishing Rate & Sources P h is h in g W e b S it e s L o c a tio n s C o u n try Ju ly August J uJuly ne 2 5 U n it e d S t a t e s 4 9 .8 % 49.5% 4 3 G e rm a n y 6 .5 % 6.5% 1 U n i t e d K in g d o m 3 .8 % 3.7% C anada 3 .7 % 3.3% R u s s ia 3 .0 % 2.7% F ra n c e 2 .7 % 3.1% B ra z il 2 .6 % 2.2% N e t h e rla n d s 2 .3 % 2.1% P o la n d 1 .6 % 1.7% C h in a 2 .5 % 2.8% A u g u s t 2 0 11 • The number of phishing Web sites decreased by 6.75% in August • The number of phishing Web sites created by automated toolkits decreased by 18.3% • The number of unique phishing URLs decreased by 1.67% • Phishing Web sites using IP addresses in place of domain names (e.g. http://255.255.255.255), increased by 18.34% • Legitimate hosting services accounted for approximately 9% of all phishing sites, a decrease of 16.81% since July • The number of non-English phishing sites saw an increase of 9.07% • The most common non-English languages identified in phishing Web sites during August included Portuguese, French, Italian and Spanish. 19
  • 20. Tactics of Phishing Distribution Symantec Intelligence 20
  • 21. Organizations Spoofed in Phishing Attacks, by Industry Sector Symantec Intelligence 21
  • 23. Most Frequently Blocked Email Malware Malware Name % Malware Exploit/SuspLink-e958 7.20% W32/Bredolab.gen!eml 4.90% Exploit/SuspLink.dam 4.34% W32/Generic.dam 2.09% W32/Generic-6ac4 2.06% Exploit/MimeBoundary003 1.69% W32/Netsky.c-mm 1.56% Exploit/Link-e88c 1.47% VBS/Generic 1.36% W32/Netsky.P-mm 1.34% Symantec Intelligence 23
  • 24. New Malware and Spyware Sites Per Day Symantec Intelligence 24
  • 25. Policy, Malware & Potentially Unwanted Programs Symantec Intelligence 25
  • 26. Most Frequently Blocked Malware at the Endpoint Malware Name % Malware W32.Ramnit!html 8.68% W32.Sality.AE 8.44% Trojan.Bamital 8.10% W32.Ramnit.B!inf 6.84% W32.Downadup.B 3.63% W32.SillyFDC.BDP!lnk 2.59% W32.Virut.CF 2.58% W32.Almanahe.B!inf 2.38% W32.SillyFDC 1.75% Trojan.ADH.2 1.74% [1] For further information on these threats, please visit: http://www.symantec.com/business/security_response/landing/threats.jsp Symantec Intelligence 26
  • 27. Where to next? • Web: – www.symanteccloud.com/intelligence – www.symantec.com/spam • Twitter: – @symanteccloud Symantec Intelligence 27