G Data Malware Report Semi-Annual Report July-December 2009

G Data Malware Report Semi-Annual Report July-December 2009

G Data Malware Report Semi-annual report July-December 2009 Ralf Benzmüller & Sabrina Berkenkopf G Data SecurityLabs MalwareReport_2_2009 Go safe. Go safer. G Data. G Data Malware Report July-December 2009 Contents At a Glance ..................................................................................................................................................3 Malware: Facts and Figures .....................................................................................................................4 Unlimited Growth? .........................................................................................................................................................4 Malware Categories........................................................................................................................................................5 Multi-variant Families ....................................................................................................................................................6 Primary Target of Attack: Windows .........................................................................................................................8 Outlook for 2010 ........................................................................................................................................9 Outlook................................................................................................................................................................................9 Web 2.0: Social Networks ......................................................................................................................10 Problem Case: Data Protection ............................................................................................................13 Events and Trends in the Second Half of 2009 .................................................................................14 July 2009 ...........................................................................................................................................................................14 August 2009 ....................................................................................................................................................................14 September 2009 ............................................................................................................................................................15 October 2009 ..................................................................................................................................................................16 November 2009 .............................................................................................................................................................16 December 2009 .............................................................................................................................................................18 Copyright © 2010 G Data Software AG 2 G Data Malware Report July-December 2009 At a Glance In the second half of 2009, 924,053 new types of malware were discovered. This is 39% higher than in the first half of the year and 60% up on the previous year's total, and hence a new record. Throughout the whole of 2009 1,588,005 types of malware were discovered - 78% more than in 2008. The proportion of Trojan horses has risen by 9.0%. With 42.6% they represent the largest part of the flood of malware. Malware classified as worms, exploits and viruses has risen at an above-average rate. The number of types of malware that use PDFs has almost tripled. The volume of new adware has dropped by 25%. Over the year as a whole 2,908 families emerged, against 3,069 in 2008. This means that the new record result can be traced back to fewer active malware families. The most productive malware families are 'Genome' (3), 'PcClient' (new) and 'Hupigon' (1)1. Windows is still the primary target for attacks, at 99.0%. A reduction of 0.3% over the first half of 2009 is accounted for by .NET malware (0.3%). Script languages for web applications maintain their share, at 0.5%. Forecast Downloaders, backdoors and rootkits will retain their share. They have a solid place in the under- ground economy. Exploits will also be put to use at lightning speed in the coming year. Web applications are becoming ever more significant targets for attacks. The significance of social networks such as MySpace, Facebook and Twitter as platforms for spam and sources of information for preparing and carrying out criminal activities will increase. Data theft is and will remain a lucrative business. Banking trojans, spyware and keyloggers will retain their share. Events ‘Koobface’ is one year old and more active than ever. ‘Gumblar’ is the malware that infects the most web pages. Numerous data leaks and data protection violations have shaken users' trust in the reliability of businesses, including in the credit card and banking sectors. 1 Numbers in brackets refer to the position in the first half of 2009. Copyright © 2010 G Data Software AG 3 G Data Malware Report July-December 2009 Malware: Facts and Figures Unlimited Growth? For years, the number of new types of malware has been growing continuously, as shown in Diagram 1. In the second half of 2009 once again, the number of new types of malware has risen to a new record level of 924,053. 1,800,000 1,588,005 1,600,000 1,400,000 1,200,000 1,000,000 894,250 800,000 600,000 400,000 200,000 133,253 29,782 31,849 39,670 0 2004 2005 2006 2007 2008 2009 Diagram 1: Number of new types of malware per annum since 2004 The growth rate of 39% compared to the fi rst half of 2009 and 60% compared to the same period last year is lower than the values in previous years. In 2009 as a whole, 1,588,005 types of malware were discovered - 78% more than in 2008. The number of new types of malware discovered in 2004 is now being matched in one week. 250,000 200,000 150,000 100,000 50,000 0 Jan Feb March April May June July Aug Sep Oct Nov Dec Diagram 2: Number of new types of malware per month for 2008 and 2009 Copyright © 2010 G Data Software AG 4 G Data Malware Report July-December 2009 Malware Categories The number of Trojan horses rose significantly in the second half of the year. Their proportion is - as Table 1 shows at 42.6% - 9.0% higher than in the first half of the year. Hence they are by far the most common category of malware. The number of downloaders, backdoors and tools is also growing. The figures are somewhat less than the average increase of 39% over the first half of the year and 60% over the same period last year. However, these categories represent the most signifi- cant elements of the black market in malware. Downloaders are used for distribution; backdoors enable computers to be controlled remotely (botnets); and tools are needed to give novices a way into the world of malware and to make everyday work easier for professionals. Worms also recorded an above-average increase. Their number has almost doubled against the first half of the year and nearly tripled against the same period last year. The ‘Basun’ family has contributed to this: it is the first worm for years to make it back into the Top 10. ‘Autorun’ was the frontrunner among worms in the first half of the year. The number of exploits has increased more than average. This is in contrast to the significant reduction in the number of security holes reported in CVE. At 4,594 weaknesses reported in 2009, this was significantly lower than the record level of 2008 where 7,250 weaknesses were recorded. The number of security holes discovered is therefore a poor reflection of the number of weak- nesses being exploited by malware. And this number has increased significantly. Security holes in widely distributed software are being exploited more and more often, largely for attacking com- puters via the internet. Computers with out-of-date software are soft targets for cybercriminals. However, the category that recorded the biggest growth is one considered already dead - viruses. This category includes classic file infectors that attack executable files. The popularity of USB sticks and other removable data carriers lends itself to their use in such activities. However, with a share of 0.1%, its spread has been limited. Diff. Diff. # 2009 # 2009 2009H2 # 2008 2009H2 Category H2 Share H1 Share 2009H1 H2 Share 2008H2 Trojan horses 393,421 42.6% 221,610 33.6% +78 155,167 26.9% +154 Downloaders/ Droppers 187,958 20.3% 147,942 22.1% +27 115,358 20.0% +63 Backdoors 137,484 14.9% 104,224 15.7% +32 125,086 21.7% +10 Spyware 86,410 9.4% 97,011 14.6% -11 96,081 16.7% -10 Worms 51,965 5.6% 26,542 4.0% +96 17,504 3.0% +197 Adware 30,572 3.3% 34,813 5.3% -12 40,680 7.1% -25 Tools 14,516 1.6% 11,413 1.6% +27 7,727 1.3% +88 Rootkits 11,720 1.3% 12,229 1.9% -4 6,959 1.2% +68 Exploits 3,412 0.4% 2,279 0.3% +50 1,841 0.3% +85 Viruses 637 0.1% 143 0.0% +345 167 0.0% +281 Diallers 415 0.0% 1,153 0.2% -64 1,013 0.2% -59 Miscellaneous 5,543 0.5% 4,593 0.7% +21 8,419 1.5% -34 Total 924,053 100.0% 663,952 100.0% +39 576,002 100.0% +60 Table 1: Number and percentage of new malware categories in the first and second halves of 2009 and their change On the other hand, the number of new types of spyware has gone down. Their proportion has dropped to 9.4%, which is 5.2% less than in the first half of 2009 and 7.3% less than a year ago. Copyright © 2010 G Data Software AG 5 G Data Malware Report July-December 2009 However, this does not mean

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    18 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us