Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:06 PM
George V. Hulme
George V. Hulme

Malware Counts: Uncomfortably Numb

McAfee's security research group Avert Labs shows a more than doubling of malware from the first half of 2009 compared with the same period in 2008: that's 1.2 million unique malware applications up from about 500,000 in 2008. With the numbers now reaching the millions in a six-month period -- does virus and malware counting really provide us any value anymore?

McAfee's security research group Avert Labs shows a more than doubling of malware from the first half of 2009 compared with the same period in 2008: that's 1.2 million unique malware applications up from about 500,000 in 2008. With the numbers now reaching the millions in a six-month period -- does virus and malware counting really provide us any value anymore?Those exponentially-growing dire numbers come from the McAfee Avert Labs Blog, and they broke the numbers down much the same way a sales rep would tell you the cost of that new snazzy stereo is just pennies a day. Only they're going for the inverse and a number designed not to look small, but to look big, and to put the F in FUD. (Fear, Uncertainty, and Doubt.):

For you math and data junkies that comes out to an average of 200,000 unique pieces monthly or more than 6,000 daily. Yep-that was over 6,000 on a daily basis.

McAfee then went on to define what they mean by unique malware: something that requires a new signature capable of spotting the malicious code.

Seems a handful of years ago, annual malware counts were tallied in the tens of thousands. That then grew to the hundreds of thousands. Now, after 2009 hits the history books, the tally could top 2 million with ease.

Should these numbers raise your concern? Not really.

The bad guys are out there, and they're active. We know this. What these numbers show is how easy malcode is morphed. Malware authors have created ways to change their code, in fact, sometimes each time a page is refreshed new code is generated. Does it matter that it is "new" each time the page is reloaded? No. What matters is how vulnerable your systems and your users are to the types of attacks, or threats, coming at them.

These "malware" threats range from old school viruses, keystroke logging Trojans, and backdoors to new complex bots (which make it possible for infected systems to send spam or launch denial of service attacks); to modern redirectors that will send users to fraudulent Web sites regardless of what the user types in the URL bar, and downloaders that are used to plant any type of malware the attacker wishes on a user's system.

And most of this scourge today is being delivered from the Web. And it's raining down from legitimate and fraudulent sites alike. And the attackers are using a mix of social engineering with technical exploits (like the Adobe flaw that was used in attacks this week).

It is no doubt dangerous out there. And it's getting worse. It's also a good time to revisit the basics.

Make sure operating systems, applications, and Web browsers are patched -- at least this will raise the bar on the types of technical attacks that would be successful. And make users aware of zero-day attacks when they are underway (those software applications being attacked, while the vendor has yet to release a security update). If there's an Adobe PDF, or Microsoft ActiveX, or Java, or whatever flaw being attacked -- ask them to be careful or to avoid using the application until the patch is out.

Reminding users about good computing and Web hygiene will go a long way to helping them to protect themselves by staying aware and using some common sense. Urge them not to click on unnecessary links. Remind them not to open attachments that look sketchy. Remind them that if someone sends a link in Facebook, and it seems totally out of character for that friend: to skip it, or to ask the connection if they actually sent that "Funky Nekked Video." Remind them that whether a system is fully patched or not one bad click can swiftly lead to compromise -- and that compromise can then lead to stolen data, credentials, and deeper compromises on the network.

Patch levels and awareness will help when your anti-virus and firewalls and URL filters fail you. This may all seem trite to those seasoned in IT and information security. But to the front line worker, using corporate systems for personal and business use every day: they need to hear it. And they need to hear it repeatedly.

Because when they hear that there were 1.2 million unique malware applications spotted in the first half of the year, it is simply a mind-numbing number to them. Meaninglessly numb.

So, no. Simple malware counts don't matter. What does matter is how well your users and systems are positioned against the threats.

For my mobile security and business observations, consider following me on Twitter.

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Major Brazilian Bank Tests Homomorphic Encryption on Financial Data
Kelly Sheridan, Staff Editor, Dark Reading,  1/10/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft Patches Windows Vuln Discovered by the NSA
Kelly Sheridan, Staff Editor, Dark Reading,  1/14/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Post a Comment
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-17
openQA before commit c172e8883d8f32fced5e02f9b6faaacc913df27b was vulnerable to XSS in the distri and version parameter. This was reported through the bug bounty program of Offensive Security
PUBLISHED: 2020-01-17
The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and...
PUBLISHED: 2020-01-17
The docker-kubic package in SUSE CaaS Platform 3.0 before 17.09.1_ce-7.6.1 provided access to an insecure API locally on the Kubernetes master node.
PUBLISHED: 2020-01-17
In SaltStack Salt through 2019.2.0, the salt-api NEST API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
PUBLISHED: 2020-01-17
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.