Ad

Data Leaks, Mobile Trends, and Risky Small Business–Key Findings


Threat Landscape

Data Leaks, Mobile Workers, and Risky Small Business—Key Findings of Annual User Study

Each year, Trend Micro polls 1600 corporate end users in the U.S., U.K., Germany, and Japan to better understand their perceptions of and experiences with Web threats as they relate to the workplace. Respondents are grouped according to company size, with a small company defined as less than 500 employees in the U.S., U.K., and Germany and less than 250 employees for Japan. A total of 800 computer users from small companies across the U.S., U.K., Germany and Japan were surveyed. The results were then compared to previous studies conducted in 2006 and 2007 to monitor trends. The following article highlights several key findings from 2008 survey results.Data Leaks—A Growing ConcernFor the first time in the Corporate End User Study, Trend Micro surveyed computer users about the prevalence of data leaks within their business environments. Data leaks occur when employees leak sensitive information about customers, finances or intellectual property in violation of security policies or even regulatory requirements. Surprisingly, authorized personnel cause most corporate data breaches—probably because employees have easy access to valuable corporate data. Despite the fact that corporate enterprises have deployed protective measures such as virtual private networks (VPNs), firewalls, and network monitoring to prevent unauthorized external access to proprietary information, these solutions fail to adequately address the rising threat from internal users. Leaks can occur either through deliberate policy breaches, such as stealing data for financial gain, or by accident, such as an employee misplacing a thumb drive or losing a laptop containing customers' account numbers.The explosion of messaging systems, wireless networking, and USB storage devices has also made protecting critical corporate information increasingly difficult. And growing numbers of telecommuting and traveling employees have increased mobile device use and the tendency to transmit sensitive information via email. This creates a challenge for today's companies to protect against the loss or theft of corporate data assets—either by employees or contractors.Because data leaks are becoming an increasing concern, Trend Micro polled end users to determine if users understand which information within their organization is considered confidential and therefore worthy of protection. According to the survey, U.S. end users are more likely than end users in the U.K. or Japan to identify confidential company data. Perhaps this is because U.S. companies adopted the Internet within the workplace early on and therefore developed more policies and regulations to govern the use of proprietary and confidential data.The survey also indicates that end users in large companies in Japan better understand what constitutes confidential company data, compared to smaller organizations. This may be due to the greater likelihood that large companies conduct compliance training compared to smaller organizations, increasing the probability that users would better understand which information is considered confidential. The survey also noted that laptop users in the U.S. and U.K. are more likely to fully understand which information is confidential than desktop or workstation users in those countries.Perhaps most alarming was the percentage of users who reported leaking data. Overall, in all countries surveyed, six percent of end users admitted to leaking confidential information outside the company. This is especially disconcerting because the survey was based on self reporting, which would indicate that actual numbers are probably much higher since most people would not admit leaking confidential information.Also, while six percent of end users admitted to having leaked company information, 16 percent believe other employees caused data leaks. Interestingly, end users in the U.S., U.K., and Germany are more likely to admit to leaking company data, either intentionally or accidentally, than end users in Japan.According to the survey, in all countries, it is more common for large organizations to have established preventative policies than small companies. However, the survey also indicates that employee data leaks are believed to be more common in large organizations. This might indicate that data leaks occur, regardless of whether companies have set policies.The survey also asked end users about the amount of training they received to prevent data leaks. According to survey results, one in seven U.S. end users has been trained on their company's data leak policy and significantly more users in the U.S. have been trained, compared to the U.K. In all countries, a majority of trained end users think they would score highly if tested on their company's data leak policy.The survey results indicate that companies, particularly small businesses, can be more proactive in preventing data leaks. The increasing challenge to effectively manage data breaches is becoming a serious security concern to companies forced to comply with strict government regulations regarding data handling, such as the Gramm-Leach-Bliley Act, the European Union Directive on Data Protection, Sarbanes-Oxley, and the Health Insurance Portability and Accountability Act (HIPAA). Failing to comply can trigger fines and litigation, not to mention brand damage and negative press.Laptop Users' Activities Differ by CountryAccording to the survey, in the U.S., laptop end users are not any more likely to use the Internet for personal reasons while off the company network compared to when they are on the network. UK laptop end users, however, are more likely to check personal email and browse Web sites while connected through their company's network. German and Japanese laptop end users are more likely to download executable files while connected through their company's network—perhaps indicating that users in both countries have faster Internet connections at work. Interestingly, Japanese laptop users are less likely than laptop users elsewhere to connect to the Internet outside the company network, and U.S. users are more likely to connect at airports.In the U.K., Germany, and Japan, mobile users are more likely than desktop users to send confidential information via Instant Messaging or Webmail.Risky BusinessAccording to the survey, in the U.K., Germany, and particularly in Japan, employees of small companies take more online risks while on the company network compared to their counterparts in larger organizations. The study found that certain risky activities such as browsing Web sites unrelated to work, shopping online, visiting social networking sites, downloading executable files, and checking personal Webmail are more likely to occur amongst small businesses.For example, 32 percent of U.K. small business employees admitted to downloading executable files that can potentially lead to Trojan or virus attacks and, ultimately, identity and data theft. Checking personal email is the most popular non-work related online activity for German workers, especially at smaller companies—70 percent of small-business employees check personal email at work, compared to 59 percent in large companies. In Japan, the study revealed that most personal Internet activities that occurred were more likely to happen in small businesses.Despite a higher level of risky online behavior occurring, only about 50 percent or fewer end users within small companies had an IT department, which may explain why spam, phishing, and spyware were more commonly reported within these companies compared to larger organizations.In all countries surveyed, small organizations are less likely to have established preventative policies than large companies. This probably explains why the survey found that small company end users in Japan are less aware of confidential data concerns compared to end users in larger organizations. Only 33 percent of small business end users said they understood what constitutes confidential company data compared to 46 percent from large companies. This held true for users in both the U.S. and the U.K. as well, but the disparity was less.

Brazil: Orkut Phishing Mail Leads to Data-Stealing Malware



Trend people recently captured a spam email that appeared to be from Orkut. It is written in Portuguese, and translates to the following (via GoogleTranslate):

Problems with your account.

Dear User,

We received some complaints against your profile saying you are "using copyrighted material," and before Orkut disables your account unfairly, asks for you to contact us stating the problem.

Some information from the complaint:

Your Profile: {malicious link to phishing page}
Report: {directly download malware}

* Please do not reply to this email, follow the instructions in the report of the complaint.

Warning: Your period for justification is 48h.

Regards,
{name}
Administration Orkut.com

Note: *We are taking measures in accordance with the laws in your country. (Brazil)
* Please meet the requirements of the report within the stipulated period.

Figure 1 shows the Portuguese Orkut spam (click to view larger version). Users who click on the first link on the email are led to a phishing page (see Figure 2). At this point users may be led to key in their credentials at this fake site, compromising access to their Orkut accounts. When the browser opens to the phishing page, the browser also automatically downloads a certain file which, should the user accept the download, when saved and run, introduces a BANKER variant (TROJ_BANKER.GAT) to the system.

Click for larger view
Click for larger view


BANKER variants and their components are notorious malware that together sit silently in victims’ PCs waiting until users browse online banking sites. These then either change the online banking site from the real site to a fake one or directly steal keyed in information such as user names and passwords.

Online banking is a commonly accepted method of transaction and managing funds in Latin America because of the sites’ ease of use and offer of convenience. This compounds the risk of this targeted attack netting in more users than usual. Furthermore, the Orkut spam is written in Portuguese, which unknowing users may take to mean that the mail is valid.

Users are always advised to enter sites requiring logins using their clean bookmarks or by typing in the correct URL at the browser address bar. Also, ignore email (and the links therein) that come from doubtful or unknown sources. Smart Protection Network protects Trend Micro users from this attack by identifying the phishing mail as malicious, by blocking access to the phishing page, by preventing the download of the malicious file, and by detecting the downloaded file (and related malware) as malicious.

How to Avoid Spam:Tips to Avoid Spam




Listed below are a number of suggestions that can help prevent your email address from becoming a target to spammers.

  • Do not post your e-mail address in an unobfuscated form on the Internet. If you need to post your e-mail address, obfuscate it so it cannot be easily harvested such as “name –at- hotmail – dot- com,” Or if you need to include your e-mail address in your signature, include a small graphic image containing your e-mail address.
  • Check to see if your e-mail address is visible to spammers by typing it into a Web search engine such aswww.google.com. If your e-mail address is posted to any Web sites or newsgroups, remove it if possible to help reduce how much spam you receive.
  • Lots of ISPs provide free e-mail addresses. Set up two e-mail addresses, one for personal e-mail to friends and colleagues, and use the other for subscribing to newsletters or posting on forums and other public locations. If you have a more complex e-mail address, it is less likely to receive spam than one that could be easily dictionary-attacked.
  • Many ISPs also offer free spam filtering. If this is available, enable it. Report missed spam to your ISP, as it helps reduce how much spam you and other members of the same ISP receive. If your ISP does not offer spam filtering, use anti-spam software to reduce the amount of spam delivered to your inbox.
  • When replying to newsgroup postings, do not include your e-mail address.
  • When filling in Web forms, check the site's privacy policy to ensure it will not be sold or passed on to other companies. There may be a checkbox to opt out of third party mailings. Consider opting out to receive less opt-in e-mail.
  • Never respond to spam. If you reply, even to request removing your e-mail address from the mailing list, you are confirming that your e-mail address is valid and the spam has been successfully delivered to your inbox, not filtered by a spam filter, that you opened the message, read the contents, and responded to the spammer. Lists of confirmed e-mail addresses are more valuable to spammers than unconfirmed lists, and they are frequently bought and sold by spammers.
  • Do not open spam messages wherever possible. Frequently spam messages include "Web beacons" enabling the spammer to determine how many, or which e-mail addresses have received and opened the message. Or use an e-mail client that does not automatically load remote graphic images, such as the most recent versions of Microsoft® Outlook® and Mozilla Thunderbird.
  • Do not click on the links in spam messages, including unsubscribe links. These frequently contain a code that identifies the e-mail address of the recipient, and can confirm the spam has been delivered and that you responded.
  • Never buy any goods from spammers. The spammers rely on very small percentages of people responding to spam and buying goods. If spamming becomes unprofitable and takes lots of effort for little return, spammers have less incentive to continue spamming. Would you risk giving your credit card details to an unknown, unreputable source?
  • If you have an e-mail address that receives a very large amount of spam, consider replacing it with a new address and informing your contacts of the new address. Once you are on lots of spammers' mailing lists, it is likely that the address will receive more and more spam.
  • Make sure that your anti-virus software is up to date. Many viruses and Trojans scan the hard disk for e-mail addresses to send spam and viruses. Avoid spamming your colleagues by keeping your anti-virus software up to date.
  • Use the firewall included with your operating system, or use a firewall from a reputable company, to avoid your computer being hacked or infected with a worm and used as a spam-sending zombie.
  • Do not respond to e-mail requests to validate or confirm any of your account details. Your bank, credit card company, eBay, Paypal, etc., already have your account details, so would not need you to validate them. If you are unsure if a request for personal information from a company is legitimate, contact the company directly or type the Web site URL directly into your browser. Do not click on the links in the e-mail, as they may be fake links to phishing Web sites.
  • Do not click on unusual links. Confirm the sender did send the e-mail if it looks suspicious.
  • Never give out your login details to anyone.
  • IT departments should train their users not to give out sensitive information.