Specifically, in 2008, McAfee identified a total of 1.5 million different types of malware. But certainly, the number of 2009 is much larger than that.
" In the first half of this year, we found that the number of malware has tripled compared to the same period last year. This tremendous growth is a very worrying sign, because it demonstrates one thing: destructive software. is penetrating more and more into every platform that we think is reliable ".
McAfee also revealed that about 40% of password-stealing Trojans are hiding within games-related websites and virtual worlds. 80% of the bank-related emails that web users receive are phishing scams of cyber criminals. On average, each victim of phishing schemes costs up to £ 520 / case.
Meanwhile, another reputable security firm, F-Secure, warns about the danger of new malware generation, which they say is difficult to crack and the ability to attack is particularly effective.
" Today's wave of malware has reached a high level of coding and convergence of the predecessors' trojans, viruses, and worms. Increasingly, hackers equip malware with self-defense and self-hiding mechanisms. Vietnamese, a sign of increasing professionalization in cybercrime communities ".
Expand the goal
Like McAfee, F-Secure found that in the first half of this year, the number of targeted users, businesses, and organizations targeted by malware has skyrocketed.
Typically, an attacker will profile the victim's identity, then send a series of emails impersonating that person's name / position. The content is compiled very tightly to prevent suspicion in the recipient.
Even visiting trusted sites does not mean you are safe, Symantec said.
In many cases, hackers have attacked and defeated the website, then implanted a malicious software / invisible malicious code. When users visit the site, they will be directed to another web server, which is controlled by an attacker.
Another worrying fact is that the transactions of vulnerabilities and malware are taking place very excitingly, crowded on the black market. Cyber criminals buy, sell software that can attack automatically, or even deal with spam-spreading botnets. The stolen data is also publicly available, accompanied by a "guarantee" from the seller.