Malware Dramatically Increasing; Almost All Users Have Clicked on Malicious Links

##AUTHORSPLIT##<--->

Web security services firm ScanSafe reported that the total number of Web-based malware blocks has increased by 87 percent in July 2008 compared to the previous month. Specifically, the first two weeks in July have shown an extraordinarily high volume of malware blocks. ScanSafe sells online security services, which scan Web requests from its customers and blocks malicious content.

The company said the increase in Web-based malware was driven by the ongoing compromise of Web sites, which represented 83 percent of all malware blocks for the month. The increase was largely the result of the continued SQL injection attacks, which were responsible for 75 percent of all malware blocks in July 2008. As a result, July has had an overwhelming number of malware blocks--34 percent more blocks than the whole of 2007.

"In June 2008 we reported a 278 percent increase for the first six months of the year. That alarming trend has continued with the number of Web-based malware blocks exploding in the first two weeks of July," said Mary Landesman, senior security researcher at ScanSafe.

July 2008 also saw an increase in social engineering e-mail scams designed to install malware--including backdoor Trojans and rogue scanners--on victims' computers. According to the report, 95 percent of ScanSafe customers fell for the scams and attempted to click through to the malicious sites. The malware scanning service blocked customers from inadvertently getting to the malicious content.

"Although this may not seem like a high percentage, it is extremely significant given that these scams are now able to get past spam filters, which typically provide a high level of protection from this type of socially engineered malware," Landesman said. "It is disconcerting that cyber criminals are becoming increasingly sophisticated in creating these scams, so much so that more and more people are falling for them."

The ScanSafe "Global Threat Report" (PDF) is based on an analysis of more than 10 billion Web requests the company scans each month on behalf of business customers in over 60 countries across five continents.

Get daily news from THE Journal's RSS News Feed


About the author: Dian Schaffhauser is a writer who covers technology and business for a number of publications. Contact her at [email protected].

Proposals for articles and tips for news stories, as well as questions and comments about this publication, should be submitted to David Nagel, executive editor, at [email protected].

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • DreamBox Math

    Discovery Education Announces Updates to Experience, DreamBox Math

    K-12 learning solution provider Discovery Education has announced enhancements to its Discovery Education Experience and DreamBox Math products, designed to create a more personalized, engaging learning experience for students.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • digital dashboard featuring a shield icon, graphs, a world map, and network nodes

    IBM Launches Agentic AI Governance and Security Platform

    IBM has introduced a new software stack for enterprise IT teams tasked with managing the complex governance and security challenges posed by autonomous AI systems.

  • laptop and fish hook

    Security Researchers Identify Generative AI 'Vishing' Attack

    A new report from researchers at Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.