400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked or compromised in some way. This puts your visitors and your reputation on the line, so every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. 1 2013 Norton Report. Slide 10. http://uk.norton.com/cybercrimereport Arm yourself with knowledge I 2
ATTACK - THE DANGERS OF A CYBERCRIME ATTACK 1 in 500 61% One in 500 websites are infected with malware. These sites are often legitimate websites (worryingly 61% of websites serving malware are legitimate sites) that have been infiltrated by online criminals. Criminals can buy off the shelf software toolkits to attack websites, or more accurately the servers that run them, in the same way that computer viruses attack people s home and business PCs meaning that today almost anyone can access the tools required to hack a website. These attack kits can scan thousands of sites a minute over the internet and spot known weaknesses and vulnerabilities, which are then used to insert malicious software onto vulnerable websites. There are other ways to break into a website server too. Hackers can use social engineering, phishing attacks or spyware to steal the user name and password of an administrator and simply give themselves access to the system so don t give them a chance! 2 ISTR 18 http://www.symantec.com/security_response/publications/threatreport.jsp 3 ISTR 18 http://www.symantec.com/security_response/publications/threatreport.jsp Attack I 3
How identity theft and phishing work Identity theft is one of the most insidious forms of online crime. It takes different forms from the theft of a credit card number to a complete takeover of someone s online identity. This is what happened to journalist Mat Honan 4 in 2012 when hackers progressively broke into his email and other online accounts and then remotely wiped his computer and smart phone. In the process, he lost a year s worth of photos, covering the entire lifespan of his daughter as well as documents and emails. Regaining access to all his accounts and reclaiming his digital life took a huge amount of time and effort 5. Honan was the victim of a clever series of social engineering attacks designed to get access to one system after another but many more people are tricked into giving away their user names and passwords on increasingly convincing sophisticated phishing sites. With phishing, a victim gets an email or social media message or clicks on a link from a seemingly legitimate website. They then arrive at a fake website that looks exactly like the real thing a bank, a social media site or whatever and they enter in their login details. Except that now it s the criminals who have those details. Some security suites include tests that scan for fake sites and forward-thinking website owners use advanced security technology such as extended validation SSL certificates to prove that they are a real site and not an imposter; but without this help it is often very difficult to spot the difference between a real site and a phishing replica. With phishing, a victim gets an email or social media message or clicks on a link from a seemingly legitimate website. 4 http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/ 5 http://www.wired.com/gadgetlab/2012/08/mat-honan-data-recovery/ Attack I 4
How botnets work Because of the way movies portray internet hackers, it s easy to imagine a lone genius sitting in a darkened basement room trying to hack into your website. In practice, that s extremely unlikely. Instead, criminal gangs use botnets on a large scale to probe millions of PCs and websites automatically. A botnet is a collection of computers that have been taken over by malware, often without the users knowledge, so that they can run software for the botnet operator. One common method of recruitment is drive-by attacks when users visit infected websites. Individual botnets can include thousands or tens of thousands of individual machines. Botnet operators can use them to: Send spam on a vast scale. Host phishing websites. Probe PCs and legitimate websites using attack toolkits. Click on adverts generating fraudulent revenue. Launch denial of service attacks that stop people using online services. Botnets give internet criminals processing power and internet connectivity on a huge scale. This is how they are able to send out millions of spam emails or infect millions of PCs an hour. Attack I 5
INFECTION - THE ALARMING TRUE COST OF DATA THEFT Once criminals have infiltrated a website, they can use it to make money and quite often in many cases a lot of money. For example, they can install spyware on visitors computers that steal personal information like credit card details. The installation software hides on regular web pages so often it s impossible to spot without the right security software. Alternatively, they can stealthily redirect visitors to other sites or change the contents of a site. Stealth works in the criminals favour. If people know they re a victim, they are likely to try to do something about it but most site owners don t know that their site has been infected and most visitors don t know they ve been attacked. The consequences for visitors are potentially serious but the risks for a business with a corrupted website is equally grave: Loss of customer trust and goodwill. Redirection of site visitors away to other sites. Interception of private information entered on the site. Blacklisting by search engines (For example, Google blocks 10,000 infected sites a day 6 ). Stealth works in the criminals favour. If people know they re a victim, they are likely to try to do something about it 6 http://mobile.businessweek.com/articles/2012-05-07/protect-your-companys-website-from-malware Infection I 6
The size of the cybercrime problem Cybercrime is a serious issue for website owners. It s also a problem for the economy as a whole. It represents a sort of criminal tax on internet commerce of up to 83 billion annually, according to the 2013 Norton Cybercrime Report 7. There are more than a million victims every day and the average cost per victim is 220. CRIMINAL INTERNET COMMERCE TAX 83 BILLION VICTIMS OF CYBERCRIME PER DAY 2 MILLION What does this mean on a practical level? Four in ten people who used the internet have fallen victim to attacks such as malware, viruses, hacking, scams, fraud and theft. And this means: Spending hours trying to repair their computer, for example removing a virus (24 percent of respon ents). Losing money to fraudsters who lock an infected computer using Ransomware and demand payment to release it. Losing their identity to criminals who clone credit cards, apply for loans and destroy credit records, leaving victims with months of work trying to sort out the damage. Having their computer turned into stealthy slave PCs in a criminal s botnet (see What is a botnet for more on this). On a broader scale, it means a loss of confidence and trust in the internet, which reduces people s freedom of choice and action. 7 go.symantec.com/norton-report-2013 Infection I 7
Who is most at risk of cybercrime? According to the 2013 Norton Cybercrime Report which surveyed 13,022 online adults around the world: Men are more likely to be victims than women. People who use mobile devices, social networks and public or unsecured Wi-Fi are also more at risk. Parents of children 8-17 are more vulnerable! When it comes to websites, botnets and attack toolkits don t differentiate between big companies or small ones, famous names or anonymous family businesses, profitable companies or charities. They probe as many websites as they can find. By their very nature, no website is invincible and consequently every site is a target. How website malware works Home and business users should regularly update their computers with recommended patches and updates for programs, operating systems etc... This is because software companies and security researchers find new glitches and weaknesses that hackers can exploit and so send patches out for them. Hackers know about these vulnerabilities too and they can use them to take control of unpatched computers: installing viruses or accessing private information, for example. It s the same with the servers that run websites. They have an operating system, like you have Windows or Mac OS on a regular computer. There is also application software that serves up web pages to site visitors. Increasingly, websites also use content management systems to allow non-technical users to create and edit web pages. Each of these layers of software could contain vulnerabilities that might allow criminals to change the contents of a website. Once they have control, they can use the site as a springboard to attack visitors. Internet criminals take different forms. Some look for software vulnerabilities, some write attack toolkits that use vulnerabilities to attack websites and others specialise in using these toolkits to attack sites. There are online black markets where different specialists can meet and trade tips and tricks and buy these toolkits. Attack toolkits are like any other kind of commercial software; they are updated regularly, come with warranties and include technical support. One particularly popular toolkit, known as Blackhole accounted for 41 percent of all web-based attacks in 2012 8. 8 ISTR 18 http://www.symantec.com/security_response/publications/threatreport.jsp Infection I 8
PROTECTION - WHAT INDIVIDUALS CAN DO TO PROTECT THEMSELVES Individuals, whether they are home users or your employees and colleagues, can protect themselves a by using a bit of online common sense: Delete suspicious emails and social media messages without clicking on links. Install up-to-date antivirus security software Keep your computer up-to-date with the latest software patches and updates. Backup your PC to an external drive or cloud based backup service. Be security-conscious on social media sites: log out when you re done and don t connect to people you don t know. Regularly change and use strong passwords and don t share them with anyone. Be careful about what you share online don t give away more personal information than you need to on social media sites and be careful about what you upload to online file stores. Look for trust marks like the Norton Secured Seal and Extended Validation SSL certificates when you visit a site don t entrust your confidential information to a site you don t trust. How to tell if your site is vulnerable The growing risk of website corruption from internet criminals using attack toolkits means that website owners, even if they are not technically inclined, need to take steps to protect their sites, their visitors and their reputation Nearly a quarter of IT managers don t know how secure their website is and more than half have never conducted a vulnerability assessment on their website 9 You can sign up for Google s free Webmaster Tools. This will warn you if Google has blocked your site because of malware but that s a bit like spotting that the stable door is open after the horse has bolted. A more proactive alternative is to choose Symantec Extended Validation or Pro SSL Certificates for your site, which includes Symantec s Web Site Malware Scanning 10 service. This checks your site daily and warns you if there is a problem. In addition, these certificates also include a weekly Vulnerability Assessment 11 to highlight critical problems that may leave your site vulnerable to attack. These services allow you to be proactive rather than reactive. 9 http://www.symantec.com/connect/blogs/website-vulnerabilities-which-countries-websites-are-most-vulnerable-malware 10 http://www.symantec.com/en/uk/page.jsp?id=ssl-resources 11 http://www.symantec.com/en/uk/page.jsp?id=ssl-resources Protection I 9
What can you do to protect your website? Having read this guide, you already understand the risks and the need to scan your website for malware and vulnerabilities. However, you can do more to keep your site and visitors safe, including: Use the Norton Secured Seal, which shows visitors that we scan your site regularly for malware and vulnerabilities. It is the most recognised trust mark on the Internet 12 and 94% of consumers are likely to continue an online purchase when they see it 13. Choose Extended Validation SSL Certificates to show your visitors that they are on a real site, not a fake phishing site and to confirm the identity of the company behind the site. Online shoppers are more likely to enter their credit card and/or other confidential financial information into a website with the EV green bar 14. Keep your server software up-to-date. If you host or control your own web servers, keep them up to date with patches and updates. If you use a content management system such as WordPress, keep that up to date too, including any third party plugins. Symantec research suggests that toolkits mainly tend to target well-known existing vulnerabilities for which there are already fixes. Control access to web servers. Use strong passwords for content management systems and web servers. Don t allow users to share passwords and ensure that admin-level passwords are limited to users with a strict need to know. Consider an always-on approach to SSL. Well-known sites like Facebook and Twitter use SSL on every page, not just on forms and checkout pages. This encrypts and protects all the information given by a user on the site and makes it less vulnerable to so-called man in the middle attacks. Understanding the cybercrime threat to your website is not just good for security, it s good for business. Put simply: if customers feel safe, they will buy more. Symantec is your partner in protecting your site and its range of Website Security Solutions make it easier to stay ahead of the criminals and increase trust for your customers. 12 International Online Consumer Research: U.S., Germany, U.K. July 2012 13 Symantec U.S. Online Consumer Study, February 2011 14 Symantec Online Consumer Study (UK, France, Germany, Benelux, US and Australia) conducted in January 2011 Protection I 10
SYMANTEC CYBERCRIME SURVIVAL GUIDE VIDEOS Don t let their next victim be you or your organisation watch our three-part video series and arm yourself with the knowledge you need to defend against attacks. Discover how many websites are currently infected and why even legitimate sites may not be safe. See how easy it now is to become a data thief, and learn what methods will be used to try to steal your valuable information. Discover the alarming true cost of data theft and learn what steps you can take to safeguard yourself and your organisation. www.symantec-wss.com/uk/cybercrime/social For more information about Symantec, www.symantec.com Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Circle Logo and the Norton Secured Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Survival Guide Videos I 11