Vulnerabilities / Threats

1/5/2011
12:01 PM
50%
50%

Attackers Broke Malware Records In 2010

Over the past year, online criminals created one-third of all viruses and 34% of all malware ever seen.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010
Last year saw a record-setting number of new threats appear online. In particular, criminals managed to create one-third of all viruses ever seen, 34% of all malware in existence, and 40% of all known fake AV.

Those findings come from a study released Wednesday by PandaLabs, the malware research arm of antivirus vendor Panda Security. The firm said it had analyzed 99.4% of the 134 million unique files its systems automatically collected in 2010. Of those files, 60 million were malware -- viruses, worms, Trojans, and other threats.

The report also found that the volume of new malware created -- about 20 million new strains -- remained roughly constant from 2009 to 2010, while the number of new threats overall increased. Between the beginning and end of 2010, according to PandaLabs, "the average number of new threats created every day has risen from 55,000 to 63,000."

While names such as Zeus and Bredolab continue to make headlines -- since they're behind many attacks -- most unique instances of malware appear to be nearly disposable. Indeed, whereas many attacks used to circulate for months before disappearing, Panda found that 52% of new malware in 2010 existed for only 24 hours. According to PandaLabs, "as antiviruses become able to detect new malware, hackers modify them or create new ones so as to evade detection."

Unsurprisingly, given the financial incentive behind many attacks, the most prevalent type of malware in 2010 was the banking Trojan, which comprised 56% of all new malware, followed by those perennial favorites viruses (22%), worms (10%), and adware (10%). Interestingly, spyware declined from comprising 6% of all malware in 2009 to just 0.34% in 2010. Meanwhile, roughly 1% of threats in 2010 collectively comprised dialers, hacking tools, PUPs (potentially unwanted program), security risks, jokes, or tracking cookies.

Interestingly, Panda found that 53% of all computer users experienced a malware infection in 2010, even when using up-to-date antivirus scanners and signatures.

SEE ALSO:

Massive 'Fake AV' Attack Launched

Spam Attack Captures Government Data

Hackers, Insiders Behind Most Identity Theft

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10428
PUBLISHED: 2018-05-23
ILIAS before 5.1.26, 5.2.x before 5.2.15, and 5.3.x before 5.3.4, due to inconsistencies in parameter handling, is vulnerable to various instances of reflected cross-site-scripting.
CVE-2018-6495
PUBLISHED: 2018-05-23
Cross-Site Scripting (XSS) in Micro Focus Universal CMDB, version 10.20, 10.21, 10.22, 10.30, 10.31, 10.32, 10.33, 11.0, CMS, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1 and Micro Focus UCMDB Browser, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1. This vulnerability could be remotely exploited to al...
CVE-2018-10653
PUBLISHED: 2018-05-23
There is an XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10654
PUBLISHED: 2018-05-23
There is a Hazelcast Library Java Deserialization Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10648
PUBLISHED: 2018-05-23
There are Unauthenticated File Upload Vulnerabilities in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.