Micro-managed attacks that consist of one email targeting one person are up more than 10 times over last year's levels, according to message security company Messagelabs.
These targeted attacks aim a very low number of spam messages - more often than not just one - at individuals working at companies or government agencies with data that criminals prize. Like spam that’s blasted in massive quantities, these messages come with a malicious payload that tries to compromise the recipient's PC, usually by bundling multiple exploits against zero-day vulnerabilities or bugs that users haven't gotten around to patching.
MessageLabs said it intercepted 716 messages from 249 targeted attacks last month; those attacks were aimed at 263 domains representing 216 customers.
Last year, said Alex Shipp, a MessageLabs research engineer, the company was seeing two a day on average. "Two years ago it was two attacks a week, last year two a day," he said.
Most of the attacks rely on malformed Microsoft Office documents, in particular Word and PowerPoint files, said Shipp. "They're not just using one exploit, but several" in a single malicious file, he added. Together, Office attack documents made up 84 percent of March's detected one-offs.
Those exploits are so successful, said Shipp, that one Chinese hacker gang has relied on the same two attack files since November 2006, and used the pair more than 150 times in the last five months.
Almost a fourth of March's victims were categorized by MessageLabs as Public Sector, meaning governments and governmental agencies. "All of these are data-stealing attacks," said Shipp. "They want to get information, and they all eventually use some kind of PC remote control malware to exploit the organisation." Shipp declined to go into more detail, citing customer confidentiality.
Microsoft's Office suite was patched numerous times in 2006, and more fixes were released in January and February of this year for Excel and Word, respectively. PowerPoint, however, hasn't been patched since October 2006. Several PowerPoint bugs have yet to be fixed, including one acknowledged by the Microsoft Security Response Center (MSRC) last year. Because the MSRC determined that the flaw wasn't remote exploitable, however, it decided not to release a patch.
Shipp wouldn't hesitate to guess at the PowerPoint vulnerability attackers might have exploited in March, but the MessageLabs report offered some detail. "It may be a PowerPoint record length exploit, but there are several other areas of interest in the files which may be the trigger," the report said.
While the attackers seem to be concentrated in China, their victims are scattered across the globe, said Shipp.
The MessageLabs report can be found online.