Web threat

A web threat is any threat that uses the World Wide Web to facilitate cybercrime. Web threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as links in email or IM, or malware attachments or on servers that access the Web. They benefit cybercriminals by stealing information for subsequent sale and help absorb infected PCs into botnets.

Web threats pose a broad range of risks, including financial damages, identity theft, loss of confidential information/data, theft of network resources, damaged brand/personal reputation, and erosion of consumer confidence in e-commerce and online banking.

It is a type of threat related to information technology (IT). The IT risk, i.e. risk affecting has gained and increasing impact on society due to the spread of IT processes.[1][2][3]

Reaching path

Web threats can be divided into two primary categories, based on delivery method – push and pull.[4] Push-based threats use spam, phishing, or other fraudulent means to lure a user to a malicious (often spoofed) website which then collects information and/or injects malware. Push attacks use phishing, DNS poisoning (or pharming), and other means to appear to originate from a trusted source.

Precisely-targeted push-based web threats are often referred to as spear phishing to reflect the focus of their data gathering attack. Spear phishing typically targets specific individuals and groups for financial gain. In other push-based web threats, malware authors use social engineering such as enticing subject lines that reference holidays, popular personalities, sports, pornography, world events and other hot topics to persuade recipients to open the email and follow links to malicious websites or open attachments with malware that accesses the Web.

Pull-based web threats are often referred to as “drive-by” threats by experts (and more commonly as “drive-by downloads” by journalists and the general public), since they can affect any website visitor. Cybercriminals infect legitimate websites, which unknowingly transmit malware to visitors or alter search results to take users to malicious websites. Upon loading the page, the user's browser passively runs a malware downloader in a hidden HTML frame (IFRAME) without any user interaction.


Growth of web threats

Giorgio Maone wrote in 2008 that "if today’s malware runs mostly runs on Windows because it’s the commonest executable platform, tomorrow’s will likely run on the Web, for the very same reason. Because, like it or not, the Web is already a huge executable platform, and we should start thinking of it this way, from a security perspective."[5][unreliable source?]

The growth of web threats is a result of the popularity of the Web – a relatively unprotected, widely and consistently used medium that is crucial to business productivity, online banking, and e-commerce as well as the everyday lives of people worldwide. The appeal of Web 2.0 applications and websites increases the vulnerability of the Web. Most Web 2.0 applications make use of AJAX, a group of web development programming tools used for creating interactive web applications or rich Internet applications. While users benefit from greater interactivity and more dynamic websites, they are also exposed to the greater security risks inherent in browser client processing.[6][unreliable source?]

Examples

In September 2008, malicious hackers broke into several sections of BusinessWeek.com to redirect visitors to malware-hosting websites. Hundreds of pages were compromised with malicious JavaScript pointing to third-party servers.[7]

In August 2008, popular social networking sites were hit by a worm using social engineering techniques to get users to install a piece of malware. The worm installs comments on the sites with links to a fake site. If users follow the link, they are told they need to update their Flash Player. The installer then installs malware rather than the Flash Player. The malware then downloads a rogue anti-spyware application, AntiSpy Spider.[8] by humanitarian, government and news sites in the UK, Israel and Asia. In this attack the compromised websites led, through a variety of redirects, to the download of a Trojan.

In September 2017, visitors to TV network Showtime's website found that the website included Coinhive code that automatically began mining for Monero cryptocurrency without user consent.[9] The adoption of online services has brought about changes in online services operations following the advancement of mobile communication techniques and the collaboration with service providers as a result, the online service technology has become more conductive to individuals. One of the most recent mobile technological wonders The Coinhive software was throttled to use only twenty percent of a visiting computer's CPU to avoid detection.[9] Shortly after this discovery was publicized on social media, the Coinhive code was removed.[9] Showtime declined to comment for multiple news articles.[9][10] It's unknown if Showtime inserted this code into its website intentionally or if the addition of cryptomining code was the result of a website compromise. Coinhive offers code for websites that requires user consent prior to execution, but less than 2 percent of Coinhive implementations use this code.[11] German researchers have defined cryptojacking as websites executing cryptomining on visiting users' computers without prior consent.[12] With 1 out of every five hundred websites hosting a cryptomining script, cryptojacking is a persistent web threat.[12]

Prevention and detection

Conventional approaches have failed to fully protect consumers and businesses from web threats. The most viable approach is to implement multi-layered protection—protection in the cloud, at the Internet gateway, across network servers and on the client.

See also

References

  1. ^ Cortada, James W. (2003-12-04). The Digital Hand: How Computers Changed the Work of American Manufacturing, Transportation, and Retail Industries. USA: Oxford University Press. p. 512. ISBN 0-19-516588-8.
  2. ^ Cortada, James W. (2005-11-03). The Digital Hand: Volume II: How Computers Changed the Work of American Financial, Telecommunications, Media, and Entertainment Industries. USA: Oxford University Press. ISBN 978-0-19-516587-6.
  3. ^ Cortada, James W. (2007-11-06). The Digital Hand, Vol 3: How Computers Changed the Work of American Public Sector Industries. USA: Oxford University Press. p. 496. ISBN 978-0-19-516586-9.
  4. ^ Trend Micro (2008) Web Threats: Challenges and Solutions from http://us.trendmicro.com/imperia/md/content/us/pdf/webthreats/wp01_webthreats_080303.pdf
  5. ^ Maone, Giorgio (2008) Malware 2.0 is Now! from http://hackademix.net/2008/01/12/malware-20-is-now/
  6. ^ Horwath, Fran (2008) Web 2.0: next-generation web threats from http://www.it-director.com/technology/security/content.php?cid=10162
  7. ^ Naraine, Ryan (2008) Business Week site hacked, serving drive-by exploits from [1]
  8. ^ Danchev, Dancho (2008) Compromised Web Servers Serving Fake Flash Players from http://ddanchev.blogspot.com/2008/08/compromised-web-servers-serving-fake.html
  9. ^ a b c d Liao, Shannon (2017-09-26). "Showtime websites secretly mined user CPU for cryptocurrency". The Verge. Retrieved 2019-02-20.
  10. ^ Jones, Rhett (25 September 2017). "Showtime's Websites May Have Used Your CPU to Mine Cryptocoin While You Binged on Twin Peaks". Gizmodo. Retrieved 2019-02-20.
  11. ^ Leyden, John (27 February 2018). "Opt-in cryptomining script Coinhive 'barely used' say researchers". The Register. Retrieved 2019-02-20.
  12. ^ a b Musch, M., Wressnegger, C., Johns, M., & Rieck, K. (2018). Web-based Cryptojacking in the Wild. arXiv preprint arXiv:1808.09474.

Read other articles:

この記事は検証可能な参考文献や出典が全く示されていないか、不十分です。出典を追加して記事の信頼性向上にご協力ください。(このテンプレートの使い方)出典検索?: コルク – ニュース · 書籍 · スカラー · CiNii · J-STAGE · NDL · dlib.jp · ジャパンサーチ · TWL(2017年4月) コルクを打ち抜いて作った瓶の栓 コルク(木栓、蘭&…

Look up tailpiece in Wiktionary, the free dictionary. This violin tailpiece has one fine tuner on the E string. Bass guitar tailpiece A tailpiece is a component on many stringed musical instruments that anchors one end of the strings, usually opposite the end with the tuning mechanism (the scroll, headstock, peghead, etc.). Function and construction Mandolin tailpiece, which simply anchors the strings solidly The tailpiece anchors the strings, so it must be strong enough to withstand their combi…

Upazila in Chittagong, BangladeshThanchi থানচিUpazilaAmiakhum FallsCoordinates: 21°47.2′N 92°25.7′E / 21.7867°N 92.4283°E / 21.7867; 92.4283Country BangladeshDivisionChittagongDistrictBandarbanArea • Total1,020.82 km2 (394.14 sq mi)Population (2011) • Total23,591 • Density23/km2 (60/sq mi)Time zoneUTC+6 (BST)WebsiteOfficial Map of Thanchi Thanchi (Bengali: থানচি) is an upazila of…

此條目需要补充更多来源。 (2021年7月4日)请协助補充多方面可靠来源以改善这篇条目,无法查证的内容可能會因為异议提出而被移除。致使用者:请搜索一下条目的标题(来源搜索:美国众议院 — 网页、新闻、书籍、学术、图像),以检查网络上是否存在该主题的更多可靠来源(判定指引)。 美國眾議院 United States House of Representatives第118届美国国会众议院徽章 众议院旗帜…

British debit card, 1988–2002 SwitchSwitch logoProduct typeDebit cardOwnerMasterCardCountryUnited KingdomIntroduced1988Discontinued2002Related brandsMaestro Switch was a debit card brand in the United Kingdom from 1988 until 2002. It was then merged with Maestro, which is owned by MasterCard. History Switch was launched in 1988 by Midland Bank, National Westminster Bank and The Royal Bank of Scotland as a multifunction cheque guarantee and cash card. The brand was merged with Maestro, an inter…

2020年夏季奥林匹克运动会波兰代表團波兰国旗IOC編碼POLNOC波蘭奧林匹克委員會網站olimpijski.pl(英文)(波兰文)2020年夏季奥林匹克运动会(東京)2021年7月23日至8月8日(受2019冠状病毒病疫情影响推迟,但仍保留原定名称)運動員206參賽項目24个大项旗手开幕式:帕维尔·科热尼奥夫斯基(游泳)和马娅·沃什乔夫斯卡(自行车)[1]闭幕式:卡罗利娜·纳亚(皮划艇)[2…

2020年夏季奥林匹克运动会波兰代表團波兰国旗IOC編碼POLNOC波蘭奧林匹克委員會網站olimpijski.pl(英文)(波兰文)2020年夏季奥林匹克运动会(東京)2021年7月23日至8月8日(受2019冠状病毒病疫情影响推迟,但仍保留原定名称)運動員206參賽項目24个大项旗手开幕式:帕维尔·科热尼奥夫斯基(游泳)和马娅·沃什乔夫斯卡(自行车)[1]闭幕式:卡罗利娜·纳亚(皮划艇)[2…

Tall, hairy species from Star Wars For other uses, see Wookie (disambiguation). This article describes a work or element of fiction in a primarily in-universe style. Please help rewrite it to explain the fiction more clearly and provide non-fictional perspective. (December 2020) (Learn how and when to remove this message) WookieeIn-universe informationHome worldKashyyykSub-racesSilverback WookieeDistinctionsBrown, white, or black furLanguageShyriiwook, Xaczik Wookiees (/ˈwʊkiːz/) are fictiona…

Welsh privateer This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (October 2021) (Learn how and when to remove this message) Map of the Darien Scheme, drawn in part with information from Lionel Wafer. Lionel Wafer (1640–1705) was a Welsh explorer, buccaneer and privateer. A ship's surgeon, Wafer made several voyages to the South Seas and visited Maritime Southeas…

Господарський суд Хмельницької областіКраїна УкраїнаВид господарський судІнстанція перша інстанціяЮрисдикція Хмельницька областьЗаснований 1991Суддів 16 + 4 вакантнихГолова Муха Микола ЄвгеновичНа посаді з 21 травня 2020[1]Розташування ХмельницькийАдреса майдан Незал…

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Februari 2023. Rolf HädrichLahir(1931-04-24)24 April 1931Zwickau, JermanMeninggal29 Oktober 2000(2000-10-29) (umur 69)Hamburg, JermanPekerjaanSutradaraPenulis naskahTahun aktif1958-1989 Rolf Hädrich (24 April 1931 – 29 Oktober 2000) adalah s…

Russian mathematician This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Boris Galerkin – news · newspapers · books · scholar · JSTOR (July 2020) (Learn how and when to remove this message) This article needs editing to comply with Wikipedia's Manual of Style. Please help improve the content. (February 2024) (Lear…

British royal regalia Crown JewelsSt Edward's Crown is the centrepiece of the British coronation regalia.OverviewCountryUnited KingdomLocationTower of London[a]Size≈ 140 objects[2]OldestCoronation Spoon (12th century)NewestCharles III's stole (2023)Stones23,578 including Cullinan I, Cullinan II, Koh-i-Noor, Black Prince's Ruby, Stuart Sapphire, St Edward's SapphireOwnerCharles III in right of the Crown[3]ManagersCrown JewellerRoyal Collection Tr…

Ethnic group in Saudi Arabia Ethnic group Australians in Saudi ArabiaTotal population5,000[1]Regions with significant populationsRiyadh · JeddahLanguagesEnglish (Australian) · ArabicReligionIslam, Roman Catholicism and Protestantism Australians in Saudi Arabia are a sizeable community consisting mainly of expatriates. Their population is estimated to be anywhere up to 5,000 with the majority based in major commercial centres such as Riyadh and Jeddah.[1&…

Douglas XP-48 adalah, pesawat tempur ringan kecil sayap rendah (low wing), dirancang oleh Douglas Aircraft pada tahun 1939 untuk evaluasi oleh Angkatan Udara Amerika Serikat. Dimaksudkan untuk didukung oleh mesin piston inline kecil, kontrak itu dibatalkan sebelum prototipe dapat dibangun, karena kekhawatiran Angkatan Darat tentang proyeksi kinerja pesawat.[1] Referensi ^ Douglas XP-48. National Museum of the United States Air Force. Accessed May 9 2010. Adcock, Al. OS2U Kingfisher in ac…

Halaman ini berisi artikel tentang film dokumenter tahun 1966. Untuk penggunaan lain, lihat Endless Summer (disambiguasi). The Endless SummerPoster rilis layar lebarSutradaraBruce BrownProduserBruce BrownDitulis olehBruce BrownPemeranMike HynsonRobert AugustMiki DoraNaratorBruce BrownPenata musikThe SandalsSinematograferBruce BrownPenyuntingBruce BrownDistributorCinema VMonterey MediaTanggal rilis 15 Juni 1966 (1966-06-15) Durasi95 menitNegaraAmerika SerikatBahasaInggrisAnggaran$50,00…

1812 battle during the French invasion of Russia This article is about the 1812 battle. For the World War II battles around Vyazma, see Battle of Bryansk, Vyazma airborne operation, and Operation Hannover. Battle of VyazmaPart of the French invasion of RussiaBattle of Vyazma, by Peter von HessDate3 November 1812 (22 Oct. by OS)LocationVyazma, Russian Empire55°12′N 34°15′E / 55.200°N 34.250°E / 55.200; 34.250Result Russian victoryBelligerents Russian Empire French …

Biografi ini memerlukan lebih banyak catatan kaki untuk pemastian. Bantulah untuk menambahkan referensi atau sumber tepercaya. Materi kontroversial atau trivial yang sumbernya tidak memadai atau tidak bisa dipercaya harus segera dihapus, khususnya jika berpotensi memfitnah.Cari sumber: Angga Dwimas Sasongko – berita · surat kabar · buku · cendekiawan · JSTOR (Februari 2023) (Pelajari cara dan kapan saatnya untuk menghapus pesan templat ini) Angga Dwimas S…

Бесплодная земляангл. The Waste Land[1] Жанр поэзия Автор Т. С. Элиот[1] Язык оригинала английский Дата первой публикации 1922[1] Издательство Horace Liveright[вд] Бесплодная земля (англ. The Waste Land) — поэма Томаса Стернза Элиота, которая считается одной из самых важных поэм …

Ariton Administration Pays États-Unis État Alabama Comté Dale Type de localité Town Code ZIP 36311 Code FIPS 01-02428 GNIS 151663 Indicatif(s) téléphonique(s) local (locaux) 334 Démographie Population 764 hab. (2010) Densité 58 hab./km2 Géographie Coordonnées 31° 35′ 54″ nord, 85° 43′ 08″ ouest Altitude 281 m Superficie 1 318 ha = 13,18 km2 · dont terre 13,18 km2 (100 %) · dont eau 0 k…