Malware By the Numbers
Posted by: Timothy Weaver on 10/31/2016 05:46 PM
[
Comments
]
Conficker is still the most prevalent malware threat accounting for 17% of all malware, according to Check Point’s ThreatCloud World Cyber Threat Map between January and June 2016.
Cryptowall is still the most prevalent of all ransomware, accounting for a 44% share. Cerber, Locky, Teslacrypt and TorrentLocker all hold significant market share.
When it comes to banking trojans, Dorkbot still holds the lead with an infection rate of 31% which makes it the sixth most prevalent malware. Dorkbot is followed by Zeus with 27%, and Tinba, with 16%.
As far as mobile malware, Hummingbird leads the pack with an astonishing 72% infection rate.
“The first half of 2016 demonstrates the nature of today’s cyber-threat landscape,” Check Point noted. “Many old malware threats remain prominent, while at the same time, newcomers arrive and take the world by storm. On top of that, malware demonstrates a long-tail distribution with a small number of families responsible for a major part of the attacks, while thousands of other malware families are rarely seen. Lastly, we see that most cyber-threats are global and cross-regional, with the top threats appearing in all three regions."
Source: Info Security
When it comes to banking trojans, Dorkbot still holds the lead with an infection rate of 31% which makes it the sixth most prevalent malware. Dorkbot is followed by Zeus with 27%, and Tinba, with 16%.
As far as mobile malware, Hummingbird leads the pack with an astonishing 72% infection rate.
“The first half of 2016 demonstrates the nature of today’s cyber-threat landscape,” Check Point noted. “Many old malware threats remain prominent, while at the same time, newcomers arrive and take the world by storm. On top of that, malware demonstrates a long-tail distribution with a small number of families responsible for a major part of the attacks, while thousands of other malware families are rarely seen. Lastly, we see that most cyber-threats are global and cross-regional, with the top threats appearing in all three regions."
Source: Info Security
Comments