Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/3/2015
01:40 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

PandaLabs neutralized 75 million new malware samples in 2014, twice as many as in 2013

PandaLabs recorded an average of 200,000 new malware strains per day; and 34% of all malware ever created was coded in 2014.

Bracknell, March 02, 2015 -- PandaLabs, the anti-malware laboratory of Panda Security, detected and neutralized 75 million malware samples in 2014. This figure more than doubles the number recorded in 2013: nearly 30 million new malware strains.

In all, the total number of malware specimens detected by PandaLabs throughout its history has reached 220 million, which means that 34 percent of all malware ever created was coded in 2014. In fact, last year Panda Security recorded an average of 200,000 new malware strains per day. The year 2014 can be considered the year of massive cyber-attacks, with some of the world’s biggest corporations falling victim to large-scale data breaches.

 

Trojans continue to account for most new malware

Trojans are still the most common type of malware way ahead of other malware specimens. In fact, in 2014 Trojans accounted for almost 70 percent of all new malware created, followed by viruses (12.33 percent), other malware (10 percent), worms (6 percent) and adware/spyware (3 percent). In this respect, CryptoLocker was one of the most destructive Trojans unleashed last year. “CryptoLocker is one of the nastiest pieces of malware to have targeted users in 2014. This ransomware encrypts victims’ files and requires a ransom in order to decrypt them. Thousands of computers have fallen victim to it, from home users to businesses and financial institutions”, said Luis Corrons, Technical Director of PandaLabs at Panda Security.

 

Malware and infections

Trojans, once again, accounted for more infections (65 percent) than any other malware, although there was a notable increase in the ‘Other’ category. This category includes PUPs (Potentially Unwanted Programs): applications which, despite not being malicious per se, install unwanted software without properly informing the user.

 

China tops the list of infections

Despite being one of the worst years for IT security, the global infection rate in 2014 was 30.42 percent, a significant decrease on 2013’s figure. Country by country, China once again had the most infections with a rate of 49 percent, followed by Ecuador (42.33 percent) and Turkey (41.53 percent). These countries were also at the top of the infection rankings last year, although in a different order: China, Turkey and Ecuador.

Other countries with rates above the global average in 2014 include Colombia (33 percent), Uruguay (33 percent) and Chile (31 percent).

 

Sweden the safest country

Europe was the area with the lowest infection rate, with nine countries ranked among the ten least infected nations, whereas Japan was the only non-European country to appear in the ranking. The list was topped by Scandinavian countries: Sweden (20 percent), Norway (20 percent) and Finland (21 percent).

Europe was the area with the lowest infection rate, with nine countries ranked among the ten least infected nations, whereas Japan was the only non-European country to appear in the ranking. The list was topped by Scandinavian countries: Sweden (20 percent), Norway (20 percent) and Finland (21 percent) - closely followed in fourth by the UK with an infection rate of 22.14 percent.

“We live in an Internet-connected world, and as such we are exposed to cyber-attacks now more than ever before. Security threats will increase in 2015, and both companies and home users must prepare themselves to respond to them. It is not a question of whether their security will be compromised but rather when and how, so in this case prevention is key”, concluded Corrons.

The full report is available here.

 

About Panda Security

Founded in 1990, Panda Security is the world’s leading provider of cloud-based security solutions. With head offices in Spain, the company has direct presence in over 80 countries, products translated into more than 23 languages and millions of customers around the world. The company’s mission is to simplify complexity, creating new and improved solutions to protect users’ digital lives.

As part of its Corporate Social Responsibility policy, Panda Security collaborates with The Stella Project, a program aimed at promoting the incorporation into the community and workplace of people with Down syndrome and other intellectual disabilities.

For more information, visit http://www.pandasecurity.com/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
US Counterintelligence Director & Fmr. Europol Leader Talk Election Security
Kelly Sheridan, Staff Editor, Dark Reading,  10/16/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9417
PUBLISHED: 2020-10-20
The Transaction Insight reporting component of TIBCO Software Inc.'s TIBCO Foresight Archive and Retrieval System, TIBCO Foresight Archive and Retrieval System Healthcare Edition, TIBCO Foresight Operational Monitor, TIBCO Foresight Operational Monitor Healthcare Edition, TIBCO Foresight Transaction...
CVE-2020-15264
PUBLISHED: 2020-10-20
The Boxstarter installer before version 2.13.0 configures C:\ProgramData\Boxstarter to be in the system-wide PATH environment variable. However, this directory is writable by normal, unprivileged users. To exploit the vulnerability, place a DLL in this directory that a privileged service is looking ...
CVE-2020-15269
PUBLISHED: 2020-10-20
In Spree before versions 3.7.11, 4.0.4, or 4.1.11, expired user tokens could be used to access Storefront API v2 endpoints. The issue is patched in versions 3.7.11, 4.0.4 and 4.1.11. A workaround without upgrading is described in the linked advisory.
CVE-2019-9080
PUBLISHED: 2020-10-20
DomainMOD before 4.14.0 uses MD5 without a salt for password storage.
CVE-2020-15931
PUBLISHED: 2020-10-20
Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a ...