Welcome!

Adobe Flex Authors: Matthew Lobas, PR.com Newswire, Shelly Palmer, Kevin Benedict

News Feed Item

2012 By the Numbers: Kaspersky Lab Now Detects 200,000 New Malicious Programs Every Day

Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012. The data analyzed in the report was obtained using the Kaspersky Security Network (KSN), the cloud-based infrastructure used by Kaspersky Lab products to report telemetry and to deliver instant protection in the forms of blacklists and heuristic rules, which are designed to catch the newest threats. The 2012 report revealed significant growth of Mac-specific malware and an explosive growth in the number of threats targeting the Android platform. Overall, Kaspersky Lab’s products detected and blocked more than 1.5 billion web-based attacks in 2012 and more than 3 billion infected files.

At the present time Kaspersky Lab detects and blocks more than 200,000 new malicious programs every day, a significant increase from the first half of 2012, when 125,000 malicious programs were detected and blocked each day on average.

Quick Facts

  • In 2012 Kaspersky Lab’s products blocked more than 1.5 billion web-based attacks throughout the year, which is 1.7 times greater than the total amount of web-based attacks in 2011.
  • Kaspersky Lab successfully blocked more than 3 billion local infections on users’ computers in 2012. In total, 2.7 million unique modifications of malware and potentially unwanted programs attempting to launch on users’ computers were detected during these incidents.
  • In 2012, 99% of all mobile malware detected by Kaspersky Lab was designed for the Android platform. Kaspersky Lab identified more than 35,000 malicious Android programs for the year, which is about six times more than in 2011.
  • Mac OS X malware continues to increase as Kaspersky Lab’s antivirus experts created 30% more signatures to detect various Mac Trojans this year compared to 2011.
  • Oracle Java was the most popular vulnerable application targeted by cybercriminals in 2012. The application accounted for 50% of all detected exploit-based attacks targeting vulnerabilities. Adobe Reader ranked second and accounted for 28% of all incidents.
  • Top 5 malware hosting countries: United States, Russia, The Netherlands, Germany and the United Kingdom
  • Top 5 countries with the highest frequency of web attacks: Russia, Tajikistan, Azerbaijan, Armenia, Kazakhstan
  • Top 5 countries where infected files are most frequently discovered: Bangladesh, Sudan, Malawi, Tanzania, Rwanda
  • Top 5 countries with lowest infection rates: Denmark, Japan, Finland, Sweden, Czech Republic

2012 Threats Overview

One of the most important news in the beginning of 2012 was the discovery of Flashback, a 700,000 strong botnet comprised of infected Apple computers running Mac OS X. The significant outbreak was caused by a new variant of the Flashfake malware and the security incident put an end to the perception of the Mac OS X platform as being invulnerable to exploitation. In addition to mass-malware, Mac OS X computers also became frequent victims of targeted attacks. The main reason for this is that Apple products are popular with many influential politicians and prominent businessmen, and the information stored in the devices owned by these people is of interest to a certain category of cybercriminals. In total, Kaspersky Lab’s antivirus experts created 30% more signatures to detect various Mac Trojans in 2012 compared to 2011.

Another key trend of 2012 is the continued rapid growth of Android malware. The Android platform has firmly established itself as the main point of interest for cybercriminals. Although malicious programs for other mobile platforms, such as Symbian, Blackberry or J2ME, are still being developed, 99% of newly discovered malicious programs targeted the Android platform. Despite attempts by Google to introduce its own anti-malware technology, malicious applications continue to appear in the official Google Play store. In 2012 the first incident with an ambiguous app collecting the address book data and sending spam was recorded at Apple App Store as well. Just like traditional PCs, mobile devices are now targeted with high-profile cybercriminal operations, including targeted attacks and creating “mobile” botnets.

In 2012 Kaspersky Lab’s products blocked an average of more than 4 million browser-based attacks every day, with the total number web-based attacks surpassing 1.5 billion for the year. The most frequently used technique for attacking users online is exploiting vulnerabilities in programs or applications. Throughout the year Kaspersky Lab’s experts registered both large-scale and targeted attacks utilizing vulnerable software, with Oracle Java being the most frequently targeted (50% of attacks). Adobe Reader ranked second (28%) and Adobe Flash player occupies the fourth place with only 2% share, thanks to efficient automatic updating system that promptly closes security holes. In addition, some of the exploits actively used targeted older vulnerabilities that still existed in various Windows operating systems. One of the explanations for this is that older versions of Windows are still actively used. For example, share of computers with Windows XP in 2012 was 44%, compared to 63% in 2011 – not a significant drop given Windows 7 has been available for three years and Windows 8 was recently released this year.

More than 3 billion malware incidents were detected and blocked by Kaspersky Lab’s software on users’ local hard drives and external storage. In total, 2.7 million unique modifications of malware and potentially unwanted programs attempting to launch on users’ computers were detected during these incidents. The majority of local infections were blocked by Kaspersky Lab’s behavior-based heuristic technology. It is notable that different versions of years-old Kido (Conficker) and Sality are still present in the list of the most frequently blocked malware. Overall, the number of new malicious applications has increased rapidly: in the first half of 2012 Kaspersky Lab recorded an average number of 125,000 new malware every day. Toward the end of the year this figure has grown to 200,000.

Servers located in the United States were the most frequently used to host and deliver malicious objects (25.5% of all incidents). Russia occupies the second place with 19.6% followed by the Netherlands, Germany and the United Kingdom. This is a significant change compared to years past: in 2010 the majority of malware was hosted in China. Changes in domain registration policies and other regulations taken by Chinese authorities resulted in the rapid decline of malicious hosts originating from the country. On the contrary, the United States, Russia and other European countries have seen a major increase in the number of malicious hosting sites as cybercriminals compromise legitimate online resources in large quantities in addition to registering purely malicious websites.

Based on the number of blocked web attacks and local malicious files, Kaspersky Lab’s experts calculated the “risk level” for different countries, defined as the share of attacked users. Russia and former USSR republics occupy the top places in the web attacks chart, but 31 countries (including UK, Australia and Canada) in total have also joined them in the “high risk” group. In these countries at least 41% of users were attacked online in 2012. Bangladesh, Sudan, Malavi, Tanzania and Rwanda form the top five countries where users are most frequently attacked with local malware infections. 7 countries in total were categorized as “maximum risk”, where 75% or more users were at least once attacked with a malicious file. Another 41% countries joined the “high risk” group (56-75% of attacked users), including Indonesia, Ethiopia and Kenya. In contrast, Denmark was deemed as the safest country, as the country had the lowest rate of infected computers (15%). Japan, Finland, Sweden and Czech Republic were the other countries listed with the lowest infection rates.

Quote

Costin Raiu, Director of Global Research & Analysis Team
Kaspersky Lab

“What 2012 has shown is the strong inclination of cybercriminals to steal data from all devices used by consumers and businesses, be it a PC, Mac, smartphone or tablet. This is one of the most important trends of 2012. We are also observing a strong increase in the overall number of threats, affecting all popular software environments.”

Useful Links

About Kaspersky Lab

Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions. The company is ranked among the world’s top four vendors of security solutions for endpoint users*. Throughout its 15-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for consumers, SMBs and large enterprises. The company currently operates in almost 200 countries and territories across the globe, providing protection for over 300 million users worldwide. Learn more at www.kaspersky.com.

For the latest in-depth information on security threat issues and trends, please visit www.securelist.com. Follow @Securelist on Twitter. For the most up-to-date world security news, visit www.threatpost.com.

*The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2010. The rating was published in the IDC report Worldwide IT Security Products 2011-2015 Forecast and 2010 Vendor Shares - December 2011. The report ranked software vendors according to earnings from sales of endpoint security solutions in 2010.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 20th Cloud Expo, which will take place on June 6-8, 2017 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 add...
Multiple data types are pouring into IoT deployments. Data is coming in small packages as well as enormous files and data streams of many sizes. Widespread use of mobile devices adds to the total. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the tools and environments that are being put to use in IoT deployments, as well as the team skills a modern enterprise IT shop needs to keep things running, get a handle on all this data, and deli...
The age of Digital Disruption is evolving into the next era – Digital Cohesion, an age in which applications securely self-assemble and deliver predictive services that continuously adapt to user behavior. Information from devices, sensors and applications around us will drive services seamlessly across mobile and fixed devices/infrastructure. This evolution is happening now in software defined services and secure networking. Four key drivers – Performance, Economics, Interoperability and Trust ...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
@ThingsExpo has been named the Most Influential ‘Smart Cities - IIoT' Account and @BigDataExpo has been named fourteenth by Right Relevance (RR), which provides curated information and intelligence on approximately 50,000 topics. In addition, Right Relevance provides an Insights offering that combines the above Topics and Influencers information with real time conversations to provide actionable intelligence with visualizations to enable decision making. The Insights service is applicable to eve...
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
SYS-CON Events announced today that Hitachi, the leading provider the Internet of Things and Digital Transformation, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Hitachi Data Systems, a wholly owned subsidiary of Hitachi, Ltd., offers an integrated portfolio of services and solutions that enable digital transformation through enhanced data management, governance, mobility and analytics. We help globa...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in compute, storage and networking technologies, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Judith Hurwitz is president and CEO of Hurwitz & Associates, a Needham, Mass., research and consulting firm focused on emerging technology, including big data, cognitive computing and governance. She is co-author of the book Cognitive Computing and Big Data Analytics, published in 2015. Her Cloud Expo session, "What Is the Business Imperative for Cognitive Computing?" is scheduled for Wednesday, June 8, at 8:40 a.m. In it, she puts cognitive computing into perspective with its value to the busin...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Grape Up is a software company, specialized in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the USA and Europe, we work with a variety of customers from emerging startups to Fortune 1000 companies.
Cybersecurity is a critical component of software development in many industries including medical devices. However, code is not always written to be robust or secure from the unknown or the unexpected. This gap can make medical devices susceptible to cybersecurity attacks ranging from compromised personal health information to life-sustaining treatment. In his session at @ThingsExpo, Clark Fortney, Software Engineer at Battelle, will discuss how programming oversight using key methods can incre...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in compute, storage and networking technologies, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/...