News: Cexx forums, with volunteers dedicated to helping you remove malware and stay protected
 
Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
October 25, 2014, 19:35:40
Pages: 1 [2]   Go Down
  Print  
Topic: The growth of malware  (Read 15310 times)
0 Members and 1 Guest are viewing this topic.
« Reply #15 on: September 05, 2012, 05:46:07 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8353



FYI...

McAfee Q2-2012 Threat Report
- https://threatpost.com/en_us/blogs/mobile-malware-way-mcafee-q2-threat-report-090412
Sep 4, 2012 - "McAfee Labs researchers today announced a surge in malware samples this year - particularly threats that take advantage of mobile networks to launch drive-by downloads, control botnets using Twitter and spread ransomware that locks down infected machines and demand payments from users... its researchers say they've unearthed 1.5 million new pieces of malware this year, or an average of nearly 100,000 malware samples a day. More and more malicious code is targeting Google's Android OS, though Apple users are far from immune too. More than 100 new Mac-oriented samples were discovered last quarter... The past quarter was also the busiest ever for ransomware, which holds part or all of a victim's data hostage and demands anonymous payment methods to restore it... Botnets reached a 12-month high last quarter, with more attackers using Twitter to send out commands and get all infected devices to follow them. Additionally, thumb drives containing malware - particularly password-stealing code - remain a popular conduit to infect machines... More Web sites that host malware are gaining bad reputations... The authors note that their figure is at odds with the 9,500 new malicious web sites Google announced in a June blog post*."
* http://googleonlinesecurity.blogspot.com/2012/06/safe-browsing-protecting-web-users-for.html

- http://www.marketwatch.com/story/mcafee-threats-report-shows-largest-malware-rise-in-four-years-2012-09-04
Sep 4, 2012 - "... After the mobile malware explosion in Q1 2012, Android malware shows no signs of slowing down, putting users on high alert. Virtually all new mobile malware detected in Q2 2012 was directed at the Android platform, and was comprised of SMS-sending malware, mobile botnets, spyware and destructive Trojans... Ransomware is especially problematic as it can hold computers and data hostage, instantly damaging machines. Botnets, a network of compromised computers infected with malicious software and used to generate spam, send viruses or cause Web servers to fail, have also taken center stage again this quarter with infections reaching a 12-month high... Thumb drive and password-stealing malware showed significant growth in Q2... Websites with malicious reputations are influenced by the hosting of malware, potentially unwanted programs, or phishing sites... full copy of the McAfee Threats Report, Second Quarter 2012, please visit
http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q2-2012.pdf . "

Largest Malware Rise in Four Years
- http://www.mcafee.com/us/about/news/2012/q3/20120904-01.aspx
Sep 4, 2012

 Evil or Very Mad Evil or Very Mad Shocked
« Last Edit: September 05, 2012, 07:42:45 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #16 on: October 09, 2012, 05:31:46 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8353



FYI...

Malware infection rates - Jan-June 2012 MSIR v13
- https://www.computerworld.com/s/article/9232188/Windows_7_malware_infection_rate_soars_in_2012
Oct 9, 2012 - "... Microsoft ranked the threats facing each version of Windows... some malware families are more successful against, or at least more often aimed at, specific Windows builds*, and thus affect the infection rates... The 146-page Security Intelligence Report Volume 13 can be downloaded from Microsoft's website**."
* https://www.computerworld.com/common/images/site/features/2012/10/Malware%20Infection%20Rates.jpg

** http://www.microsoft.com/security/sir/default.aspx
Vol 13: Jan-June 2012 - Microsoft Security Intelligence Report (SIR)

- http://www.h-online.com/security/news/item/Microsoft-Windows-XP-infected-twice-as-frequently-as-Windows-7-1726811.html?view=zoom;zoom=1
10 Oct 2012

 Sad
« Last Edit: October 10, 2012, 04:52:37 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #17 on: January 05, 2013, 08:29:22 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8353



FYI...

Malware stats to start 2013 ...
- http://www.av-test.org/en/statistics/malware/
1.4.2013 - "... over 100,000 new malicious programs every day..."
Current malware stats: Over 99 million...

 Evil or Very Mad
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #18 on: March 26, 2013, 07:36:22 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8353



FYI...

Preferred Targets for Malware ...
- http://www.paloaltonetworks.com/news/press/2013/palo-alto-networks-research-shows-real-time-apps-and-ftp-are-preferred-targets-for-malware.html
March 25, 2013 - "... traditional antivirus solutions are not identifying the vast majority of malware infecting networks via real-time applications such as web browsing. The Modern Malware Review is the first industry report to examine the behavior of unknown malware throughout its entire lifecycle, beginning when it enters the network, how it behaves once it is on the infected device and finally the outgoing traffic it generates. Key findings include:
• 94 percent of the fully undetected malware found on networks was delivered via web browsing or web proxies.
• 70 percent of malware left identifiers in their traffic or payload that can be used by security teams for detection.
• 40 percent of seemingly unique malware are actually repackaged versions of the same code.
• FTP is a highly-effective method for introducing malware to a network. 95 percent of malware delivered via FTP went undetected by antivirus solutions for more than 30 days.
• Modern malware is highly adept at remaining undetected on a host device. The review identified 30 different techniques for evading security and more than half of all malware behaviors were focused on remaining undetected...
The review identified 26,000 different malware samples on networks that had gone completely undetected by their antivirus solutions..."
Full report - PDF: http://www.paloaltonetworks.com/mmr

Graph: https://threatpost.com/sites/default/files/paloaltomalware.jpg
___

- http://www.av-test.org/en/statistics/malware/
3.16.2013 - "... over 130,000 new malicious programs every day..."
Current malware stats: at 100 million...

 Shocked Sad
« Last Edit: March 27, 2013, 11:51:57 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #19 on: April 16, 2013, 03:15:46 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8353



FYI...

Mobile malware up 163%
- https://www.net-security.org/malware_news.php?id=2466
April 15, 2013 - "Mobile malware threats increased 163% to more than 65,000 in 2012, according to NQ Mobile*. The problem is becoming more complex as smarter mobile malware can better target connected devices... Nearly 95 percent of all mobile malware discovered in 2012 targeted Android. The top three methods for delivering malware in 2012 were app repackaging, malicious URLs, and smishing. NQ Mobile estimates that these forms of malware helped infect an estimated 32.8 million Android devices in 2012... Key findings:
• Over 32.8 million Android devices were infected in 2012 vs. 10.8 million in 2011 – an increase of over 200 percent
• The top five markets for infected mobile devices were China (25.5%), India (19.4%), Russia (17.9%), United States (9.8%) and Saudi Arabia (9.6%)
• 65% of malware discovered in 2012 falls into a broader category of Potentially Unwanted Programs (or PUPs). PUPs include root exploits, spyware, pervasive adware and Trojans (surveillance hacks)
• 28% of mobile malware discovered in 2012 was designed to collect and profit from a user's personal data
• 7% of malware was simply designed to make a user's device stop working (i.e., "bricking" their phones)
• Looking ahead, NQ Mobile estimated that over 10 million devices have already been infected in the first quarter of 2013..."
* http://www.nq.com/2012_NQ_Mobile_Security_Report.pdf

- http://bgr.com/2012/12/12/android-malware-2013/
"... a majority of consumers will never run into malware -unless- they use an unofficial app marketplace, pirate apps illegally or unknowingly click on a malicious link."
___

Symantec 2013 Internet Security Threat Report
- https://www.symantec.com/security_response/publications/threatreport.jsp?om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2013Apr_worldwide_ISTR18
April 16, 2013 - "... Key Findings:
• 42% increase in targeted attacks in 2012.
• 31% of all targeted attacks aimed at businesses with less than 250 employees.
• One waterhole attack infected 500 organizations in a single day.
• 14 zero-day vulnerabilities.
• 32% of all mobile threats steal information.
• A single threat infected 600,000 Macs in 2012.
• Spam volume continued to decrease, with 69% of all email being spam.
• The number of phishing sites spoofing social networking sites increased 125%.
• Web-based attacks increased 30%.
• 5,291 new vulnerabilities discovered in 2012, 415 of them on mobile operating systems..."
Overview and Analysis - 58 pages, 5.5 MB (PDF):
- http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf
Additional Stats and Information - 96 pages, 5 MB (PDF)
- http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_appendices_v18_2012_221284438.en-us.pdf

 Evil or Very Mad
« Last Edit: April 16, 2013, 05:42:33 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #20 on: April 23, 2013, 03:07:38 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8353



FYI...

MS SIRv14 released
- https://isc.sans.edu/diary.html?storyid=15659
Last Updated: 2013-04-23 - "... Microsoft released volume 14 of its Security Intelligence Report (SIRv14) which includes new threat intelligence from over a billion systems worldwide... network worms are on the decrease and web-based attacks are all the rage*. Interesting report highlights include:
• The proportion of Conficker and Autorun threats reported by enterprise computers each decreased by 37% from 2011 to 2H12
• In the second half of 2012, 7 out of the top 10 threats affecting enterprises were associated with malicious or compromised websites...
• Enterprises were more likely to encounter the iFrame redirection technique than any other malware family tracked in 4Q12
• One specific iFrame redirection family called IframeRef, increased fivefold in the fourth quarter of 2012 to become the number one malicious technique encountered by enterprises worldwide
• IframeRef was detected nearly 3.3 million times in the fourth quarter of 2012 ..."

Malicious Websites Now the Top Threat to the Enterprise
* http://blogs.technet.com/b/security/archive/2013/04/17/malicious-websites-now-the-top-threat-to-the-enterprise.aspx

Latest Security Intelligence Report Shows 24 Percent of PCs are Unprotected
- https://blogs.technet.com/b/microsoft_blog/archive/2013/04/17/latest-security-intelligence-report-shows-too-many-pcs-lack-antivirus-protection.aspx?Redirected=true

- https://blogs.technet.com/b/mmpc/archive/2013/04/22/threats-at-home-and-work.aspx?Redirected=true
22 Apr 2013

- http://www.microsoft.com/sir
___

PC owners have to watch 24 sources for fixes
- http://www.h-online.com/security/news/item/The-update-jungle-PC-owners-have-to-watch-24-sources-for-fixes-1847060.html?view=zoom;zoom=1
22 Apr 2013

 Exclamation
« Last Edit: April 23, 2013, 03:32:09 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #21 on: May 14, 2013, 05:44:48 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8353



FYI...

MS SIRv14 - Updated data shows prevalence of Java malware ...
- https://blogs.technet.com/b/mmpc/archive/2013/05/12/updated-data-shows-prevalence-of-java-malware-in-2012.aspx?Redirected=true
12 May 2013 - "Recently we released the Microsoft Security Intelligence Report volume 14. The report initially presented data showing reduced Java malware detections in Q3 2012 and gaining prevalence in Q4 of 2012. During a later review of the backend data, we found that we were missing some detection counts from our initial calculations. We have revised the data...
> https://www.microsoft.com/security/portal/blog-images/sir-14_1.png
Machine count of detections for each exploit categories
... we can see clearly the sudden rise in Java exploitation... As the HTML/JS category is usually used in delivering other exploit vectors (for example, Blacole pages leading to other Java and PDF, SWF exploits), Java malware is the most prevalent exploit vector that actually tries to exploit vulnerabilities in the software since 2011.
> https://www.microsoft.com/security/portal/blog-images/sir-14_2.png
... breakdown of individual Java exploits
In 2012 we saw four different Java vulnerabilities were used most, CVE-2012-1723, CVE-2012-0507, CVE-2012-4681, CVE-2012-5076.
> https://www.microsoft.com/security/portal/blog-images/sir-14_3.png
... when the vulnerable software is exposed to the malicious Java exploits, the success rate of the exploitation is usually very high compared to memory corruption vulnerabilities... many times the Java vulnerabilities are adopted by malware writers after the updates from Oracle are released..."

 Exclamation  Sad
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #22 on: November 29, 2013, 04:28:28 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8353



FYI...

Malware hits record-high numbers
- https://net-security.org/malware_news.php?id=2636
Nov 27, 2013 - "... the number of new malware samples in circulation in just the first nine months of 2013 has already met the 2012 figure for the entire year. Trojans remained the most pervasive threat, accounting for most new threats and infections worldwide. One of the most notable –and notorious– threats over the past months was CryptoLocker, a new ransomware sample that hijacks users’ documents and demands a ransom for them. There was also a significant increase in the number of attacks that exploit DNS cache poisoning techniques... Trojans once again topped the rankings, accounting for 76.85 percent of all new threats identified by PandaLabs, followed by worms (at a distant 13.12 percent), viruses (9.23 percent) and adware/spyware (0.57 percent). Additionally, Trojans continued to be the weapon of choice for malware writers to infect users’ systems. 78 percent of all computer infections registered in the third quarter of 2013 were caused by Trojans, followed by viruses (6.63 percent), adware/spyware (6.05 percent) and worms (5.67percent)..."

- http://press.pandasecurity.com/news/malware-creation-hits-record-high-numbers-in-2013-according-to-pandalabs-q3-report/

New malware strains - Q3 2013
- http://press.pandasecurity.com/wp-content/uploads/2013/11/new-malware-EN.png
New malware by type - Q3 2013
- http://press.pandasecurity.com/wp-content/uploads/2013/11/malware-type-EN.png

- http://www.av-test.org/typo3temp/avtestreports/malware-all-years_en.png
Nov 17, 2013

 Evil or Very Mad Evil or Very Mad  Sad
« Last Edit: November 29, 2013, 09:06:17 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
 
Pages: 1 [2]   Go Up
  Print  
 
Jump to:  

Powered by SMF 1.1.20 | SMF © 2013, Simple Machines Page created in 0.193 seconds with 20 queries.