Summary

The article was published with permission of Sophos Plc.

This document provides an overview of modern malware that uses the Internet for its attacks. Some methods and tools used by hackers are illustrated with examples. Along with "attacking sites" and compromised sites, the article focuses on a number of technologies that can be used for protection.

Author: Fraser Howard, SophosLabs UK

Translation: Artem Konev

Contents

  1. Introduction

  2. The role of the Internet in the modern malware

    1. File storage

    2. Perfect bait

    3. Source of information

  3. Malicious sites

    1. Compromised sites

    2. Infected web servers

    3. Private server attacks

  4. Protection from Internet attacks

    1. Content check

    2. URL filtering

    3. Endpoint protection

    4. Web servers protection

  5. Conclusion.

  6. Further reading