iTnews

2009 a record-breaking malware year

By Angela Moscaritolo on Jan 6, 2010 11:50AM

55,000 new samples being identified each day.

Cybercriminals pumped out more malware in 2009 than they did in nearly 20 years, according to anti-virus vendor Panda Security.

During 2009, PandaLabs, the anti-malware division of Panda Security, identified 25 million new malware samples, according to Panda Security's Annual Malware Report. Before 2009, PandaLabs had identified a total of 15 million pieces of malware in 19 years.

Cybercriminals have developed tools to automate the process of replicating malware, allowing them to quickly create several thousand variants of the same malware file, Sean-Paul Correll, threat researcher at PandaLabs, told SCMagazineUS.com. In some cases, they also sell these services to others.

“Cybercriminals have figured out that they can saturate anti-virus labs by creating millions of samples,” Correll said. “By doing that they can slow down the response times and their infection ratio would be more successful.”

Currently, more than 40 million pieces of malware have been identified by PandaLabs and 55,000 new samples are being identified each day on average, the report states. Trojans are the most predominant type of malware, making up 66 per cent of all samples identified by PandaLabs in 2009.

“The biggest threat in the malware landscape right now is banking trojans,” Correll said.

Banking trojans, such as the notorious Zeus trojan, are popular because they allow cybercriminals to obtain victims' online banking credentials which can result in fast cash.

One of the primary malware distribution methods in 2009 was through social networking sites, such as Twitter, Facebook and YouTube, a trend that will carry over this year, Correll says.

“Given the increase in malware samples, end-users are going to have to pay more attention to security threats in 2010 and get as much education as they can,” Correll said.

End-users should be especially careful of where they click on social networking sites, he added.  

“Anything can be a potential attack vector,” Correll said. 

See original article on scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
2009labsmalwarenetworkingpandarecordsamplesecuritysocialyear

Partner Content

Security through visibility: supporting Essential Eight cyber mitigation strategies
Promoted Content Security through visibility: supporting Essential Eight cyber mitigation strategies
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
How a 'micro data centre' enables your business, your way
Promoted Content How a 'micro data centre' enables your business, your way
The case for postponing mainframe migration has eroded
Partner Content The case for postponing mainframe migration has eroded

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Angela Moscaritolo
Jan 6 2010
11:50AM
0 Comments

Related Articles

  • RBA pushes first IaaS workload into Azure
  • Google adds phishing protection to Workspace apps
  • FBI Cyclops Blink operation disinfected thousands of WatchGuard appliances
  • Cisco next to turn up Spring4Shell-vulnerable products
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Digital Nation

The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.