Scary Data – Trends in Malware, Phishing, Site Cleaning and Bad Networks

Almost Half a Million Malware Sites

The number of Malware sites continues to grow, hitting a new peak of 489,801 in October of 2015. That is up over 160% from the same time the previous year. As we have discussed before, a website that is infected with malware can install malicious software on your computer if you visit it. Attackers use the software to steal sensitive information from you such as credit card information and social security numbers.

As an internet user, the growth in malware sites means that the odds of you accidentally visiting one and becoming infected continue to increase. Google and the other search engines do a decent job of flagging them, but they can’t catch all of them in time to provide complete protection.

As a website owner, it means that attackers are having more success than ever compromising websites. It goes without saying that we think you should take website security seriously.

150% Growth in Phishing Sites in 7 Months

According to Google there are now 293,747 phishing sites on the internet, up from 113,132 in July of last year. This represents growth of over 150% in a mere seven months. A phishing site attempts to trick you into thinking it is legitimate, like your online bank or an online retailer. They then lure you into providing login credentials or other sensitive information. In the Introduction to WordPress Security article in our Learning Center we talk about how attackers are even using phishing tactics to steal WordPress credentials.

It’s taking webmasters up to 90 days to respond

Google measures how long it takes for webmasters to take action after they have received notice that their site has been compromised. Over the last year, the fastest average webmaster response time reported was 61 days, and for much of the year it was 90 or worse.

Which neighborhoods to avoid on the internet

Google provides very interesting data about the rate of infection for differentAutonomous Systems on the internet. An Autonomous System is a network level designation that represents a pool of IP addresses that are under the control of one or more networks on behalf of a single entity. You can think of it roughly as the group of IP addresses that have been assigned to an ISP. The data is very interesting, and aligns with what we learned in the analysis of brute force attacks we did a few weeks ago.

The thing that jumps out the most to us is the incredibly high penetration of infection on some Autonomous Systems. With infection rates as high 49%, there are areas of the internet that we would strongly encourage you to avoid. If you want to check out what Autonomous System your IP address belongs to, simply enter it into this handy tool. The good news is that the large majority of Autonomous Systems have infection rates of 1% or lower. We hope that Google’s reporting will serve as a call to action for the networks with the biggest problems.

More information about this: https://www.wordfence.com/blog/2016/02/trends-malware-phishing/?utm_source=list&utm_medium=email&utm_campaign=trendsmal1

Free Ecommerce/Web Dev Security Training

ecommerce secuirty course
ecommerce secuirty course

This training program is conducted in partnership with Isaac Sabas and Jonathan Mantua of Pandora Security Labs. (offers advance IT security training and provider of WebRanger – an online security monitoring and attack blocking service)

Training objectives:

  • Learn about web application security threats and how to mitigate them.
  • Learn and apply secure programming best practices.
  • Learn and perform web application testing.

Target audience:

  1. Entrepreneurs who would like to under how e-commerce security works and become tech-savvy when dealing with web developers and Internet security specialists.
  2. E-Commerce developers who would like to level-up their capabilities by building and maintaining secure websites.

More Details: http://ecommercebootcamp.digitalfilipino.com/course/e-commerce-security-course/

Philippines Network Operators Group (PHNOG)

imgpsh_fullsize

Philippines Network Operators Group (PHNOG) is a non-profit organization established to promote coordination among Network Operators in Philippines. Focus is given to knowledge development of all members as well as the Philippines IT community as a whole through discussions on technical issues/concerns regarding the Internet and network management.

This coming January, PhNOG will hold a conference themed \\\’All over IP\\\’ (AoIP) -touching the different facets of Internet, entwined to our daily lives. Maybe unknown to many, almost everything is over IP. Local and foreign experts will share their knowledge and experiences that will enable the continuous development of the Philippine Internet.

PHNOG Conference 2016

PHNOG

The Department of Science and Technology – Advanced Science and Technology Institute (DOST-ASTI), in partnership with the Philippine Network Operators’ Group (PhNOG), and Trans-Eurasia Information Network (TEIN) Network Cooperation Center (TEIN*CC) will be conducting a one (1)-day Conference with the theme ‘”All over IP’ (AoIP) – touching the different facets of Internet, entwined to our daily lives” on 25 January 2016 at the Marriott Grand Ballroom, Marriott Hotel Manila, Pasay City, Metro Manila.

 

1100 Big Data Analytics Applied in Network Operations Wilson Chua/Bitstop
1130 IXP Next steps (advantages and disadvantages) Daishi Shima/BBIX
1200 Lunch break  
130 Management and Sustainability of the IXP – taking it to the next level – Global Examples / DNSSEC Jane Coffin/ISOC, Kevin Meynell/ISOC
200 Internet enabled businesses (challenges/milestones) Rhett Jones/Rise
230 CDNs and Internet traffic Analystics Kam-Sze Yeung/Akamai
300 Role of a Peering Manager Jake Chin/Google
330 Break time  
400 Network Security Mon Nunez
430 Internet BCPs Amante Alvaran/Brocade
500 Evolution of the Network Engineer Job Role Ceejay Dideles
530 IOT Benjie Tan
600 Closing  

 

Said activity aims to gather participants from the R&D and IT/ICT communities together with the current PhNOG members to discuss the opportunities that can be derived from joining and using the TEIN Network. TEIN is a high speed international research network which provides access to researchers and research institutions within participating countries in Asia and Europe. Through TEIN, international joint research projects pertaining to climate change, remote medical service, remote cultural performances, agriculture, and information technology have been conducted. Local and foreign experts will also share their knowledge and experiences that will enable the continuous development of the Philippine Internet.

On the other hand, Philippines Network Operators Group (PHNOG) is a nonprofit organization established to promote coordination among Network Operators in Philippines. Focus is given to knowledge development of all members as well as the Philippines IT community as a whole through discussions on technical issues/concerns regarding the Internet and network management.

In line with this, we would like to invite you as one of the participants in this one (1)-day activity. Registration for this activity is free. Please take note that the activity only offers limited slots, which will be granted on a first come, first served basis. Deadline for registration is on 15 January 2016. To reserve your seat, kindly register at this link: https://www.apan41manila.com/events/register/xphilippine-network-operators-group-conferenc

Should you have any clarifications, please feel free to contact Mitz Ann N. Montañez at mitz@asti.dost.gov.ph or Marie Antoinette F. Bangabang at meiann@asti.dost.gov.ph. You may also call +63 2 4269760 loc. 1603 / loc.1408.

Joomla GoogleMap Proxy Vulnerability

Google Map proxy

If you are using Joomla and have the Googlemaps plugin, your webserver may be under attack and being used to attack others via cross site scripting.

The problem with the Joomla! Googlemaps plugin lies in the fact anyone can request the/plugins/system/plugin_googlemap2_proxy.php in their browser or script, to execute cURL HTTP requests to remote websites. The url parameter is vulnerable for Cross Site Scripting (XSS) attacks, and allows the retrieval of remote website content. When this happens a lot, a website becomes overloaded and unresponsive, making a Denial-of-Service attack succesfully executed. This is not only a problem for the website owner on the remote end, or its hosting company. Your web servers transmit a lot of HTTP traffic to remote ends, increasing server load, usage and network bandwidth (for which you pay). Therefor it’s important to stop this abuse.

To remedy this, you can remove the plugin or restrict access to the file via your .htaccess.

More info here: https://www.saotn.org/joomla-websites-abused-open-proxy-denial-service-attacks/

Google Map proxy

Plesk 12 Editions

The four new Plesk 12 editions are designed to help infrastructure providers create targeted solutions for web administrators, application developers, web professionals, and hosting service providers.

Each edition simplifies core web management activities to align with the way infrastructure is being used for hosting websites and web applications today.

Plesk 12 also includes a tightly integrated set of mass-management and security tools that can be used to profit from the growing demand for WordPress hosting.

All editions have added built-in server-to-site security, leading to more reliable infrastructure and reduced support costs.

Use the table below to compare what’s included in each Plesk 12 edition.

plesk

http://www.odin.com/products/plesk/plesk-editions/

Bitstop Network Services now Supports IPv6

The Bitstop Network Services now supports the latest version of Internet Protocol(IP) – IPv6.

Internet Protocol version 6 (IPv6) is the latest version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. – wikipedia

With IPv6, everything from appliances to automobiles can be interconnected. But an increased number of IT addresses isn’t the only advantage of IPv6 over IPv4. In honor of World IPv6 Day, here are six more good reasons to make sure your hardware, software, and services support IPv6.

  1. More Efficient Routing
    IPv6 reduces the size of routing tables and makes routing more efficient and hierarchical. IPv6 allows ISPs to aggregate the prefixes of their customers’ networks into a single prefix and announce this one prefix to the IPv6 Internet. In addition, in IPv6 networks, fragmentation is handled by the source device, rather than the router, using a protocol for discovery of the path’s maximum transmission unit (MTU).
  2. More Efficient Packet Processing
    IPv6’s simplified packet header makes packet processing more efficient. Compared with IPv4, IPv6 contains no IP-level checksum, so the checksum does not need to be recalculated at every router hop. Getting rid of the IP-level checksum was possible because most link-layer technologies already contain checksum and error-control capabilities. In addition, most transport layers, which handle end-to-end connectivity, have a checksum that enables error detection.
  3. Directed Data Flows
    IPv6 supports multicast rather than broadcast. Multicast allows bandwidth-intensive packet flows (like multimedia streams) to be sent to multiple destinations simultaneously, saving network bandwidth. Disinterested hosts no longer must process broadcast packets. In addition, the IPv6 header has a new field, named Flow Label, that can identify packets belonging to the same flow.
  4. Simplified Network Configuration
    Address auto-configuration (address assignment) is built in to IPv6. A router will send the prefix of the local link in its router advertisements. A host can generate its own IP address by appending its link-layer (MAC) address, converted into Extended Universal Identifier (EUI) 64-bit format, to the 64 bits of the local link prefix.
  5. Support For New Services
    By eliminating Network Address Translation (NAT), true end-to-end connectivity at the IP layer is restored, enabling new and valuable services. Peer-to-peer networks are easier to create and maintain, and services such as VoIP and Quality of Service (QoS) become more robust.
  6. Security
    IPSec, which provides confidentiality, authentication and data integrity, is baked into in IPv6. Because of their potential to carry malware, IPv4 ICMP packets are often blocked by corporate firewalls, but ICMPv6, the implementation of the Internet Control Message Protocol for IPv6, may be permitted because IPSec can be applied to the ICMPv6 packets.

Network Computing

 

 

Sign Up Now to Unleash the Power of IPv6

Email us at team@bnshosting.net

or Call us (075) 515-8750-54

see our Contact Page for more details.