Websites as malware slingers

G Data lists the top 10 most dangerous website topics

11/14/2013 | Bochum 

In the past, malware used to be spread by email. These days, websites are the number one distribution channel for worms, Trojans and the like. To this end, cyber criminals manipulate existing websites or create new ones in order to turn them into mass malware slingers and phishing traps. All it takes is a visit to one of these sites to sneak malware onto a PC by means of a drive-by-attacks, for example, to steal passwords or other personal data. To lure unsuspecting users into the trap, criminals use a number of different website topics, including fake or manipulated websites relating to IT and telecommunications, online shops or pornographic platforms and blogs. G Data has summarised the top 10 subject areas of the most dangerous website topics.

 

"These days, websites are the main platform for spreading all types of malware. The perpetrators use drive-by-attacks, where all it takes is a visit to the primed website to infect a PC with malware," explains Ralf Benzmüller, head of G Data SecurityLabs. Computer malware can be lurking on many different sites. Hence the expert believes that Internet users should use a comprehensive security solution that includes a firewall and monitors all http traffic. Ralf Benzmüller also recommends against clicking on links in spam and phishing emails and to always install all available program updates for the installed software.

 



Top 10 subject areas of dangerous websites
Cyber criminals use a number of different tactics and topics to lure unsuspecting victims into the trap. For example, in four out of ten cases, the perpetrators use platforms with information about computers, telecommunications, software and hardware, websites with pornographic contents and websites about individual companies.

In addition, fake or manipulated online shops, health and blog sites are also used. In contrast, the topics sports and fraudulent contributions to forums play a rather minor role.

 

 

 


For more information about the appearance of new computer malware, see the G Data Malware Report 1/2013 at http://www.gdata.de/rdk/dl-en-mwr


Kathrin Beckert