Verisign® MalDetector

Verisign® MalDetector

Malware continues to grow and proliferate across the Web. Verisign MalDetector is designed to help prevent malware from infecting other websites.

Email Us

Verisign MalDetector

Now that the Internet plays an increasingly significant role in commerce, entertainment, information and social media, cyber criminals can be found lurking right alongside us. Today, the challenge is to develop more effective and powerful tools to combat the risks posed by malicious agents in our connected world. Verisign MalDetector is designed to help prevent malware from infecting other websites.

MALWARE STATISTICS*

  • In 2010 there were 20 million new strains of malware created.
  • The number of consumer complaints made to the FTC about malware, spyware and adware more than tripled from 6,012 issues in 2009 to 22,813 in 2010, the FTC said in a report.
  • The average number of new daily threats created jumped from 55,000 to 63,000 by the end of 2010.
  • Approximately 51% of the Web’s daily top search terms lead to malicious sites.
  • Poisoned pages typically have up to five malicious links.

*Source: Panda Labs, 2010 Report/2011 Q1 Report and Federal Trade Commission Consumer Sentinel Network Data Book/March 2011


MALWARE DELIVERY METHOD GRAPH

On the left side of the graph below you can see different types of malware and how they are distributed through code on a website. Once you’ve been exposed to an attack, a download is activated through an exploit kit. That download can then infect a user’s computer to corrupt it, or steal information. Scroll over the information icons to read more about each delivery method.

Types of Malware
Distribution
Payload
Malvertising: Malicious ads displayed on websites leading to Exploit Kits
Malvertising
SEO Poisoning: Malicious attackers inject common search terms in an iframe script designed to send victims to other sites hosting malicious code. The search term and iframe redirect and get cached in search engines such as Google. Victims who click on the links are sent to sites hosting malicious code.
SEO Poisoning
Typosquatting: Also known as “URL hijacking,” it is a form of cybersquatting which relies on typographical errors made by an internet user when typing a web address into a browser. If an incorrect website is entered, the user is led to a rogue website owned by a cybersquatter.
Typosquatting
Social Engineering: Make use of URL shorteners, or social network like-jacking to disguise malicious links
Social Engineering
Exploit Kits: Drive-by downloads that can be activated simply by visiting a website with your browser. This is the most dangerous form of malware. No user interaction, or click, is needed to infect a user’s computer.
Exploit Kits
Trojan: After installed on your system, this program will steal information to tunnel to outside parties (credentials, personally identifiable information (PII), espionage).
Trojan
Fake AV: A rouge antivirus program designed to mislead people by posing as a legitimate antivirus program, but in reality it is only a fake version of the original software which gains access to a system with the help of bogus online scanners, insecure websites and Trojans.
Fake AV
Dropper Downloader: Downloads additional malware to an infected user’s computer, without their knowledge or consent.
Dropper Downloader

Want to learn more or speak with a Verisign expert?
Learn More
Malware Scanning

¿NECESITA MÁS INFORMACIÓN?