{"id":2407,"date":"2007-04-19T00:00:00","date_gmt":"2007-04-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/04\/19\/targeted-attacks-on-the-rise-2\/"},"modified":"2021-12-30T11:41:17","modified_gmt":"2021-12-30T11:41:17","slug":"targeted-attacks-on-the-rise-2","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/04\/19\/targeted-attacks-on-the-rise-2\/","title":{"rendered":"Targeted Attacks on the Rise"},"content":{"rendered":"<p>It&#8217;s the other end of the threat spectrum: Instead of a massive attack on hundreds of your users, it&#8217;s one message, sent to a single user, containing a backdoor Trojan &#8212; or worse.  Such narrowly-targeted attacks are becoming more popular than ever, according to a new report issued today by MessageLabs.  The messaging security company says it identified 716 emails in 249 targeted attacks last month.  Most of the email attacks came in the form of malware hidden in a Microsoft Office document.  Some 45 percent of the attachments were PowerPoint; 35 percent were MS Word files.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Previously, they may have been lost in the general noise of one to two million pieces of malware per day,&#8221; the report states.  &#8220;Target organizations are those with data worth stealing,&#8221; the report says.<\/p>\n<p>&#8220;One gang has been using the same two attack files since November 2006,&#8221; the report says.  The Taiwan gang changes its source IP address frequently, making it hard to detect, MessageLabs says.  The IP address hosting the Web server that dishes out the malware is registered to China United Telecommunications Corp. in Beijing.  Emails from the Taiwan gang are not particularly attractive, generally showing only a string of unreadable characters and carrying attachments.<\/p>\n<p>Many antivirus applications do not yet detect the Trojan, according to the messaging security company.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=122009&#038;WT.svl=news2_5<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2407","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2407"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2407\/revisions"}],"predecessor-version":[{"id":4894,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2407\/revisions\/4894"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}