Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • PC Hardware

    Malware Authors Crank Engines, Reach 20 Million Mark in 2010

    By
    Brian Prince
    -
    November 24, 2010
    Share
    Facebook
    Twitter
    Linkedin

      Malware authors have been very busy this year.

      How busy? According to Panda Security, 20 million new strains of malware have already been created this year-the same total as in all of 2009. The shortened lifespan of the malware combined with the increased number of variants demonstrates a shift in the cyber-crime landscape, where many variants are now being created to infect a small number of systems before they disappear, the vendor said.

      “Since 2003, new threats have increased at a rate of 100 percent or more,” said Luis Corrons, technical director of PandaLabs, the company’s research arm, in a statement. “Yet so far in 2010, purely new malware has increased by only 50 percent, significantly less than the historical norm.

      “This doesn’t mean that there are fewer threats or that the cyber-crime market is shrinking,” he said. “On the contrary, it continues to expand, and by the end of 2010 we will have logged more new threats in Collective Intelligence than in 2009. It seems hackers are applying economies of scale, reusing old malicious code or prioritizing the distribution of existing threats over the creation of new ones.”

      The average number of new threats created each day has reached 63,000 to date, the company said, a figure roughly the same as what was reported in recent research from McAfee.

      Panda also found however that the average lifespan of 54 percent of malware has been cut to just 24 hours. Thirty-four percent of all active malware threats were created this year, the company said.

      Some of those threats are undoubtedly infecting users via malicious Websites promoted through black hat search engine optimization (SEO) efforts. A report by CyberDefender Research Labs noted keyword combinations such as “Thanksgiving Lunch Invitations,” “Thanksgiving Invitation Template” and “Thanksgiving Printable Invitations” were drawing malicious results.

      Out of 50 search results for each of the three terms, roughly 20 directed users to infected URLs, the firm said. Waiting for the user is a fake antivirus scan page that tells the person they need an immediate scan of their PC, followed by a prompt to download malware.

      “SEO attackers most likely to target holiday shopping keywords are those that push fake/rogue antivirus software aka scareware,” said Sean Sullivan, security adviser for F-Secure. “Typically these types of attackers react to trending topics such as celebrity deaths and other newsworthy events. The holiday season and shopping-related searches offer these attackers a proactive set of topics to focus on. They know in advance what the likely trending topics will be.”

      Brian Prince

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×