Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Daily New Malware Count Drops by 15,000: Kaspersky

The number of new malware files detected each day dropped by roughly 15,000 in 2015 when compared to the last year, according to a recent report from Kaspersky Lab.

The number of new malware files detected each day dropped by roughly 15,000 in 2015 when compared to the last year, according to a recent report from Kaspersky Lab.

According to the security company, its products detected 310,000 new malware files each day in 2015, compared to 325,000 in 2014. The company notes in a blog post that the decrease is likely due to the fact that the coding of new malware is expensive and cybercriminals have been switching to intrusive advertising programs or legitimate digital signatures in their attacks.

Security researchers at Kaspersky Lab believe that this approach appears to be working for cybercriminals. Although they have been cutting costs associated with malware creation, the number of users attacked in 2015 has increased by 5 percent, the security firm notes.

The decrease in in the number of new malicious files detected by Kaspersky Lab follows a slower increase observed last year. In 2012 and 2013, however, the security firm observed a rapid increase in the number of new malicious files detected, from 200,000 per day in 2012, to 315,000 in 2013.

According to the security firm, cybercriminals looking for a quick return have decided that complex coding tools such as rootkits, bootkits or replicating viruses, come at a cost (often of several tens of thousands of dollars) that reduces their overall margins and revenue. Additionally, researchers note that these complex malicious programs are not protected from increasingly sophisticated antivirus software that can detect and analyze even more complicated malware.

Due to the decrease in spending associated with malware creation, 2015 marked an increase in the use of adware. It also shows an evolution in cybercriminal tactics, as bad actors are now acting almost as businesses, being engaged in selling quasi-legitimate commercial software, activity and more, the security company says.

Additionally, Kaspersky notes that cybercriminals and advanced, state-sponsored threat actors, are moving to the use of legal certificates for digital products. Bought or stolen certificates allow attackers to deceive security software that has been designed to trusts an officially-signed file more than a regular one.

Advertisement. Scroll to continue reading.

“Cybercrime has lost the last touch of romance. Today, malware is created, bought and resold for specific tasks. The commercial malware market has settled, and is evolving towards simplification. I think will we no longer see malicious “code for the code.” This trend is also observed among the operators of targeted attacks,” Vyacheslav Zakorzhevsky, Head of Anti-Malware Team at Kaspersky Lab, said.

 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.