For example, in 2007, 52 per cent of data-stealing malware were trojans. In 2008, that number increased to 87 per cent, according to the report, entitled Focus Report: Data Stealing Malware.
As of the first quarter of 2009, 93 per cent of data-stealing malware were trojans.
In addition, trojans and trojan spyware are the predominant type of data-stealing malware in every region monitored by TrendLabs, Trend Micro's research arm, which includes Australia, Asia, Africa, South America, North America and Europe.
“Virtually anyone with a computer and internet access can wreak havoc,” said Paul Ferguson, senior threat researcher at TrendLabs, in a statement.
The data-stealing malware problem strikes small-to-medium businesses particularly hard, Ferguson said.
“Smaller organizations have a limited IT budget and few IT staff so they hire a third party to build a web site,” he said. “Over time, the site fails to be maintained or upgraded, exposing vulnerabilities.”
One of the most damaging aspects of cybercrime has been the huge hit on consumer confidence, which is especially damaging in today's economy, Ferguson said.
“At a time when the economy could benefit most from consumer confidence, unchecked online criminal activity is causing many consumers to turn away from using the internet,” he said.
The criminal underground seems to mushroom on itself, Ferguson said. Cybercriminals steal online banking credentials, credit card numbers, Social Security numbers and passwords from compromised networks and PCs, then cycle the stolen data back into the cybercrime economy, fueling an underground financial system driven by criminal networks that traverse geopolitical boundaries.
See original article on scmagazineus.com
Trojans are fastest-growing data-stealing malware
Most of the rise in cybercrime can be linked to data-stealing malware, and trojans are the fastest growing category, according to a report released by Trend Micro.
Got a news tip for our journalists? Share it with us anonymously here.
Sponsored Whitepapers

See everything. Do more.

Lindentech Secures Digital Identity with Zero Trust and Microsoft Entra

Diamond IT Delivers GRC Transformation with Microsoft Purview

Linktech Powers Energy Trader’s Essential Eight Compliance in Just Eight Weeks

Byte Delivers Future-Ready IT: Transforming Endpoint Security and Productivity with a Cloud-First Strategy