Malware set a number record
Source: PCWorld Security firm McAfee predicts the number of malware raging in 2009 will increase by at least double that of 2008 .
Specifically, in 2008, McAfee identified a total of 1.5 million different types of malware. But certainly, the number of 2009 is much larger than that.
" In the first half of this year, we found that the number of malware has tripled compared to the same period last year. This tremendous growth is a very worrying sign, because it demonstrates one thing: destructive software. is penetrating more and more into every platform that we think is reliable ".
McAfee also revealed that about 40% of password-stealing Trojans are hiding within games-related websites and virtual worlds. 80% of the bank-related emails that web users receive are phishing scams of cyber criminals. On average, each victim of phishing schemes costs up to £ 520 / case.
Meanwhile, another reputable security firm, F-Secure, warns about the danger of new malware generation, which they say is difficult to crack and the ability to attack is particularly effective.
" Today's wave of malware has reached a high level of coding and convergence of the predecessors' trojans, viruses, and worms. Increasingly, hackers equip malware with self-defense and self-hiding mechanisms. Vietnamese, a sign of increasing professionalization in cybercrime communities ".
Expand the goal
Like McAfee, F-Secure found that in the first half of this year, the number of targeted users, businesses, and organizations targeted by malware has skyrocketed.
Typically, an attacker will profile the victim's identity, then send a series of emails impersonating that person's name / position. The content is compiled very tightly to prevent suspicion in the recipient.
Even visiting trusted sites does not mean you are safe, Symantec said.
In many cases, hackers have attacked and defeated the website, then implanted a malicious software / invisible malicious code. When users visit the site, they will be directed to another web server, which is controlled by an attacker.
Another worrying fact is that the transactions of vulnerabilities and malware are taking place very excitingly, crowded on the black market. Cyber criminals buy, sell software that can attack automatically, or even deal with spam-spreading botnets. The stolen data is also publicly available, accompanied by a "guarantee" from the seller.
You should read it
- The number of newly emerging viruses reached a record number
- What is malware analysis? How are the steps taken?
- Can a VPN Fight Malware?
- The number of malware on Macs is nearly double that of Windows
- Online anti-malware tool
- Revealing a new variant of computer virus can destroy itself when detected
- A new kind of malware is spreading through Messenger and Skype spam messages
- Warning: 50% of COVID-19 tracking number maps are infected with malware
May be interested
- Why is Infostealer malware the biggest new malware concern?often distributed in a malware-as-a-service model, infostealer malware is often used to steal data, remaining hidden for as long as possible.
- What is Malware? What kind of attack is Malware?guide you how to recognize malware, how to prevent malware and as well as what to do when you encounter a malware infected website.
- The 4 most common ways to spread malware todayif there's one thing that poses a threat to all users of technology, it's malware. this malware can be extremely dangerous, harmful, and comes in many different forms.
- Welcome Vista with malwareon november 30, microsoft touted vista as a new version with a high-security feature, but on the day vista was released a security company that detected malware in the number of releases could hurt. c
- Learn about polymorphic malware and super polymorphismas mentioned in previous articles, malware (malware) has become a big problem. unrighteous people are taking advantage of ransomware, keyloggers, bank trojans and cryptojacker to redeem themselves from the victims.
- What is Goldoson Malware? How can you protect yourself?an example of malware is goldoson. the malware has infected more than 60 legitimate google play apps, which have been downloaded more than 100 million times in total.
- What is rooting malware? What can you do to protect yourself?rooting malware works by gaining root access to the victim's phone. this gives the malware more control over the phone.
- Some simple tricks to deal with Malwaremalware seems to become more and more intelligent and causes more incalculable consequences than before. installing malware detection tools (malwarebytes, hijackthis, combofix ...) on the computer is not a redundant task. but in some cases, for many reasons (blocked by malware itself) these tools are
- What is Malware Joker? How to fight Malware Joker?joker malware is another threat to your privacy and sensitive information. recently, it attacked android mobile devices globally, resulting in the need to remove some applications from the google play store.
- 5 types of malware on Androidmalware or malware can affect mobile devices as well as computers. a little bit of knowledge and proper precautions can protect you from threats like ransomware and sextortion scam.