Security Slideshow: How Malware Spreads

By Ericka Chickowski  |  Posted 05-05-2010

How Malware Spreads

File-sharing ExecutablesUsed in 72% of attacks

How Malware Spreads

How Malware Spreads - Page 2

File-sharing ExecutablesLeveraged by viruses and worms to copy themselves onto removable media (e.g., thumb drives) and thence into machines, this was a favorite method of the Downadup.B virus.

How Malware Spreads - Page 2

How Malware Spreads - Page 3

Common Internet File System (CIFS) File TransferUsed in 42% of attacks

How Malware Spreads - Page 3

How Malware Spreads - Page 4

Common Internet File System (CIFS) File TransferCIFS just passed e-mail as a means of propagation; allows hackers to spread infection to file servers and rapidly attack an enterprise network.

How Malware Spreads - Page 4

How Malware Spreads - Page 5

E-mail Attachment File TransferUsed by 25% of attacks

How Malware Spreads - Page 5

How Malware Spreads - Page 6

E-mail Attachment File TransferWith something like 90% of all email reported as spam, this remains a target-rich environment.

How Malware Spreads - Page 6

How Malware Spreads - Page 7

Remotely Exploitable VulnerabilityUsed by 24% of attacks

How Malware Spreads - Page 7

How Malware Spreads - Page 8

Remotely Exploitable VulnerabilityUse of this vector doubled between 2008 and 2009, partially due to Downadup, which used this as another means to mushroom.

How Malware Spreads - Page 8

How Malware Spreads - Page 9

File sharing , P2PUsed by 5% of attacks

How Malware Spreads - Page 9

How Malware Spreads - Page 10

File sharing , P2PThe latest Taylor Swift MP3? No, malicious code. Save the Taylor Swift jokes, those are different things.

How Malware Spreads - Page 10

How Malware Spreads - Page 11

HTTP, Embedded URI, Instant MessengerUsed by 4% of attacks

How Malware Spreads - Page 11

How Malware Spreads - Page 12

HTTP, Embedded URI, Instant MessengerComputers hosting public services and applications that use web and messaging apps are often untended, unpatched, and accessible to attackers

How Malware Spreads - Page 12

How Malware Spreads - Page 13

SQLUsed by 2% of attacks

How Malware Spreads - Page 13

How Malware Spreads - Page 14

SQLMass SQL injection attacks hit unprotected sites, then use them to commit drive-by downloads and efficiently infect thousands of machines.

How Malware Spreads - Page 14