Most Websites Remain Alive not even 24-hrs Posing Danger; Blue Coat
Blue Coat has released a report titled "One-Day Wonders: How Malware Hides among the Internet's Short-Lived Websites" that states how 71% of all websites remain active for a period of not even 24-hrs, whilst large numbers of them do considerable harm to people who visit the Web daily, published csmonitor.com, August 26, 2014.
Among a total of fifty domains on top positions which produce short-spanned hostnames, twenty two percent are reportedly dangerous for Web-surfers.
Studying over 660m distinct hostnames for 90 days, Blue Coat discovered that 470m remained active for just 24 hours or even less, with one fresh and distinct hostname emerging daily that the security company named "One-Day Wonder" and which every 15 persons from all over the world accessed.
Creators of numerous of these short-spanned websites are the Yahoo, Amazon and Google Internet giants alternatively the renowned Wordpress, Tumblr and Blogspot blogging sites.
The report cites malware developers who frequently conceal their wares within websites of short existence, since these fresh and previously unfamiliar sites can with little difficulty elude Web-security systems.
Senior Threat Researcher Tim van der Horst of Blue Coat the person giving valuable assistance for completing the report states that individuals who become contaminated with bots chiefly represent household surfers, published csmonitor.com.
Specialists state that with short-lived sites, it's possible for erecting remarkable command-and-control servers which can be easily enforced, however, are hard for tracking. With spam runs, these websites can help in setting distinct sub-domains for every spam mail to evade anti-spam filters.
Overall, such domains, unlike the static ones, are harder to deactivate. Besides, they can largely get past security solutions, with the possibility that the latter will fail to spot a few-or-more of the numerous URLs.
Adding encryption to One-Day Wonders, while inbound malware and/or outbound information theft is executed via SSL, makes organizations most usually overlook the assaults affecting detection, response and prevention abilities of these entities, says Blue Coat.
Notably as per van der Horst, with real-time intelligence, probable threats are possible to assess during the request period instead of waiting for an after-the-incident report alternatively permanent database update. SCMagazine.com published this, August 26, 2014.
ยป SPAMfighter News - 9/3/2014