Connect with us

Hi, what are you looking for?


Malware & Threats

Daily New Malware Count Drops by 15,000: Kaspersky

The number of new malware files detected each day dropped by roughly 15,000 in 2015 when compared to the last year, according to a recent report from Kaspersky Lab.

The number of new malware files detected each day dropped by roughly 15,000 in 2015 when compared to the last year, according to a recent report from Kaspersky Lab.

According to the security company, its products detected 310,000 new malware files each day in 2015, compared to 325,000 in 2014. The company notes in a blog post that the decrease is likely due to the fact that the coding of new malware is expensive and cybercriminals have been switching to intrusive advertising programs or legitimate digital signatures in their attacks.

Security researchers at Kaspersky Lab believe that this approach appears to be working for cybercriminals. Although they have been cutting costs associated with malware creation, the number of users attacked in 2015 has increased by 5 percent, the security firm notes.

The decrease in in the number of new malicious files detected by Kaspersky Lab follows a slower increase observed last year. In 2012 and 2013, however, the security firm observed a rapid increase in the number of new malicious files detected, from 200,000 per day in 2012, to 315,000 in 2013.

According to the security firm, cybercriminals looking for a quick return have decided that complex coding tools such as rootkits, bootkits or replicating viruses, come at a cost (often of several tens of thousands of dollars) that reduces their overall margins and revenue. Additionally, researchers note that these complex malicious programs are not protected from increasingly sophisticated antivirus software that can detect and analyze even more complicated malware.

Due to the decrease in spending associated with malware creation, 2015 marked an increase in the use of adware. It also shows an evolution in cybercriminal tactics, as bad actors are now acting almost as businesses, being engaged in selling quasi-legitimate commercial software, activity and more, the security company says.

Advertisement. Scroll to continue reading.

Additionally, Kaspersky notes that cybercriminals and advanced, state-sponsored threat actors, are moving to the use of legal certificates for digital products. Bought or stolen certificates allow attackers to deceive security software that has been designed to trusts an officially-signed file more than a regular one.

“Cybercrime has lost the last touch of romance. Today, malware is created, bought and resold for specific tasks. The commercial malware market has settled, and is evolving towards simplification. I think will we no longer see malicious “code for the code.” This trend is also observed among the operators of targeted attacks,” Vyacheslav Zakorzhevsky, Head of Anti-Malware Team at Kaspersky Lab, said.


Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

A vulnerability affecting IBM’s Aspera Faspex file transfer solution, tracked as CVE-2022-47986, has been exploited in attacks.


The recent ransomware attack targeting Rackspace was conducted by a cybercrime group named Play using a new exploitation method, the cloud company revealed this...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...