|By Business Wire||
|December 10, 2012 09:11 AM EST||
Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012. The data analyzed in the report was obtained using the Kaspersky Security Network (KSN), the cloud-based infrastructure used by Kaspersky Lab products to report telemetry and to deliver instant protection in the forms of blacklists and heuristic rules, which are designed to catch the newest threats. The 2012 report revealed significant growth of Mac-specific malware and an explosive growth in the number of threats targeting the Android platform. Overall, Kaspersky Lab’s products detected and blocked more than 1.5 billion web-based attacks in 2012 and more than 3 billion infected files.
At the present time Kaspersky Lab detects and blocks more than 200,000 new malicious programs every day, a significant increase from the first half of 2012, when 125,000 malicious programs were detected and blocked each day on average.
- In 2012 Kaspersky Lab’s products blocked more than 1.5 billion web-based attacks throughout the year, which is 1.7 times greater than the total amount of web-based attacks in 2011.
- Kaspersky Lab successfully blocked more than 3 billion local infections on users’ computers in 2012. In total, 2.7 million unique modifications of malware and potentially unwanted programs attempting to launch on users’ computers were detected during these incidents.
- In 2012, 99% of all mobile malware detected by Kaspersky Lab was designed for the Android platform. Kaspersky Lab identified more than 35,000 malicious Android programs for the year, which is about six times more than in 2011.
- Mac OS X malware continues to increase as Kaspersky Lab’s antivirus experts created 30% more signatures to detect various Mac Trojans this year compared to 2011.
- Oracle Java was the most popular vulnerable application targeted by cybercriminals in 2012. The application accounted for 50% of all detected exploit-based attacks targeting vulnerabilities. Adobe Reader ranked second and accounted for 28% of all incidents.
- Top 5 malware hosting countries: United States, Russia, The Netherlands, Germany and the United Kingdom
- Top 5 countries with the highest frequency of web attacks: Russia, Tajikistan, Azerbaijan, Armenia, Kazakhstan
- Top 5 countries where infected files are most frequently discovered: Bangladesh, Sudan, Malawi, Tanzania, Rwanda
- Top 5 countries with lowest infection rates: Denmark, Japan, Finland, Sweden, Czech Republic
2012 Threats Overview
One of the most important news in the beginning of 2012 was the discovery of Flashback, a 700,000 strong botnet comprised of infected Apple computers running Mac OS X. The significant outbreak was caused by a new variant of the Flashfake malware and the security incident put an end to the perception of the Mac OS X platform as being invulnerable to exploitation. In addition to mass-malware, Mac OS X computers also became frequent victims of targeted attacks. The main reason for this is that Apple products are popular with many influential politicians and prominent businessmen, and the information stored in the devices owned by these people is of interest to a certain category of cybercriminals. In total, Kaspersky Lab’s antivirus experts created 30% more signatures to detect various Mac Trojans in 2012 compared to 2011.
Another key trend of 2012 is the continued rapid growth of Android malware. The Android platform has firmly established itself as the main point of interest for cybercriminals. Although malicious programs for other mobile platforms, such as Symbian, Blackberry or J2ME, are still being developed, 99% of newly discovered malicious programs targeted the Android platform. Despite attempts by Google to introduce its own anti-malware technology, malicious applications continue to appear in the official Google Play store. In 2012 the first incident with an ambiguous app collecting the address book data and sending spam was recorded at Apple App Store as well. Just like traditional PCs, mobile devices are now targeted with high-profile cybercriminal operations, including targeted attacks and creating “mobile” botnets.
In 2012 Kaspersky Lab’s products blocked an average of more than 4 million browser-based attacks every day, with the total number web-based attacks surpassing 1.5 billion for the year. The most frequently used technique for attacking users online is exploiting vulnerabilities in programs or applications. Throughout the year Kaspersky Lab’s experts registered both large-scale and targeted attacks utilizing vulnerable software, with Oracle Java being the most frequently targeted (50% of attacks). Adobe Reader ranked second (28%) and Adobe Flash player occupies the fourth place with only 2% share, thanks to efficient automatic updating system that promptly closes security holes. In addition, some of the exploits actively used targeted older vulnerabilities that still existed in various Windows operating systems. One of the explanations for this is that older versions of Windows are still actively used. For example, share of computers with Windows XP in 2012 was 44%, compared to 63% in 2011 – not a significant drop given Windows 7 has been available for three years and Windows 8 was recently released this year.
More than 3 billion malware incidents were detected and blocked by Kaspersky Lab’s software on users’ local hard drives and external storage. In total, 2.7 million unique modifications of malware and potentially unwanted programs attempting to launch on users’ computers were detected during these incidents. The majority of local infections were blocked by Kaspersky Lab’s behavior-based heuristic technology. It is notable that different versions of years-old Kido (Conficker) and Sality are still present in the list of the most frequently blocked malware. Overall, the number of new malicious applications has increased rapidly: in the first half of 2012 Kaspersky Lab recorded an average number of 125,000 new malware every day. Toward the end of the year this figure has grown to 200,000.
Servers located in the United States were the most frequently used to host and deliver malicious objects (25.5% of all incidents). Russia occupies the second place with 19.6% followed by the Netherlands, Germany and the United Kingdom. This is a significant change compared to years past: in 2010 the majority of malware was hosted in China. Changes in domain registration policies and other regulations taken by Chinese authorities resulted in the rapid decline of malicious hosts originating from the country. On the contrary, the United States, Russia and other European countries have seen a major increase in the number of malicious hosting sites as cybercriminals compromise legitimate online resources in large quantities in addition to registering purely malicious websites.
Based on the number of blocked web attacks and local malicious files, Kaspersky Lab’s experts calculated the “risk level” for different countries, defined as the share of attacked users. Russia and former USSR republics occupy the top places in the web attacks chart, but 31 countries (including UK, Australia and Canada) in total have also joined them in the “high risk” group. In these countries at least 41% of users were attacked online in 2012. Bangladesh, Sudan, Malavi, Tanzania and Rwanda form the top five countries where users are most frequently attacked with local malware infections. 7 countries in total were categorized as “maximum risk”, where 75% or more users were at least once attacked with a malicious file. Another 41% countries joined the “high risk” group (56-75% of attacked users), including Indonesia, Ethiopia and Kenya. In contrast, Denmark was deemed as the safest country, as the country had the lowest rate of infected computers (15%). Japan, Finland, Sweden and Czech Republic were the other countries listed with the lowest infection rates.
Costin Raiu, Director of Global Research & Analysis Team
“What 2012 has shown is the strong inclination of cybercriminals to steal data from all devices used by consumers and businesses, be it a PC, Mac, smartphone or tablet. This is one of the most important trends of 2012. We are also observing a strong increase in the overall number of threats, affecting all popular software environments.”
- Top Ten Security Stories that Shaped 2012 and Security Forecast for 2013
- Kaspersky Security Bulletin: The overall statistics for 2012
- Previous stories
- Kaspersky Security Bulletin
About Kaspersky Lab
Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions. The company is ranked among the world’s top four vendors of security solutions for endpoint users*. Throughout its 15-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for consumers, SMBs and large enterprises. The company currently operates in almost 200 countries and territories across the globe, providing protection for over 300 million users worldwide. Learn more at www.kaspersky.com.
For the latest in-depth information on security threat issues and trends, please visit www.securelist.com. Follow @Securelist on Twitter. For the most up-to-date world security news, visit www.threatpost.com.
*The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2010. The rating was published in the IDC report Worldwide IT Security Products 2011-2015 Forecast and 2010 Vendor Shares - December 2011. The report ranked software vendors according to earnings from sales of endpoint security solutions in 2010.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Oct. 1, 2016 04:30 AM EDT Reads: 1,798
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Oct. 1, 2016 04:00 AM EDT Reads: 5,471
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
Oct. 1, 2016 04:00 AM EDT Reads: 1,653
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Oct. 1, 2016 04:00 AM EDT Reads: 3,123
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Oct. 1, 2016 03:00 AM EDT Reads: 1,970
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Oct. 1, 2016 03:00 AM EDT Reads: 2,447
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Oct. 1, 2016 02:30 AM EDT Reads: 2,715
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Oct. 1, 2016 02:30 AM EDT Reads: 658
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
Oct. 1, 2016 02:30 AM EDT Reads: 550
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Oct. 1, 2016 02:15 AM EDT Reads: 759
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Oct. 1, 2016 02:15 AM EDT Reads: 2,139
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Oct. 1, 2016 02:15 AM EDT Reads: 522
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Oct. 1, 2016 01:45 AM EDT Reads: 523
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Oct. 1, 2016 01:15 AM EDT Reads: 728
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Oct. 1, 2016 01:15 AM EDT Reads: 3,049
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Sep. 30, 2016 11:30 PM EDT Reads: 784
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Sep. 30, 2016 10:45 PM EDT Reads: 1,543
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Sep. 30, 2016 10:00 PM EDT Reads: 1,266
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Sep. 30, 2016 09:30 PM EDT Reads: 4,137
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 30, 2016 09:00 PM EDT Reads: 4,066