McAfee reports big spike in malware
Quarterly threat report finds password-stealing Trojans on the rise
IDG News Service - PC malware had its "busiest quarter in recent history," according to McAfee's quarterly security report released Wednesday.
The security company registered the biggest increase in malware in four years during the first quarter of this year, bringing the total number of samples to 83 million. Fake antivirus programs declined in popularity, but software with faked security signatures, rootkits and password-stealing Trojans rose.
McAfee counted about 200,000 new examples of password-stealing Trojan horses. A Trojan horses is a stand-alone program that represents itself as some form of legitimate software.
Rootkits are stealth programs designed to enable privileged access to the user's computer. The report calls rootkits "one of the nastiest classifications of malware." The Koutodoor rootkit spread fastest last quarter.
Software is "signed" by the vendor to tell users it's safe to install. A user is more likely to trust Microsoft or McAfee, for example, than an unknown vendor. Scammers capitalize on that trust when they forge the digital signature of a trusted provider in order to boost the chances of having their malware successfully installed on the user's computer.
Among botnets, Cutwail was most active during the quarter, recruiting more than a million new machines. Nearly half of all new botnet control servers were in the U.S.
The McAfee report also noted a dramatic increase in malware designed to attack mobile devices that run Android. The total number of identified threats to Android devices more than quadrupled in the first quarter, reaching 8,000. However, part of the bump came from improved detection, according to the report. Most mobile malware aimed at Android did not come from apps offered through the Google Play app marketplace.
The report also found that most mobile malware originated in and targeted China and Russia.
Malware targeting Apple computers also continued to rise steadily. New malware for the Mac exploded in the second quarter of 2011, but this last quarter saw the most new cases since then with about 250.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Malware and Vulnerabilities White Papers | Webcasts