Overview of the main threats and trends 2012
Last year was quite intense, and new versions already known malware families, as well as new threats that consolidated its presence in our "Top Ten".
The objectives pursued by criminals involved in the spread of malware, known for a long time and, in general, have changed little.
Passed in 2012 remembered:
- The largest epidemic Trojan Backdoor.Flashback.39 for MAC;
- Detection and contamination lots of varieties Trojans encoders;
- Detection of botnets based file virus Win32.Rmnet.12;
- Increased variety of threats to the mobile platform Google Android.
Top Ten of the most active threats as follows.
|The most common threats in 2012|
Similar statistics in 2011, is to compare and evaluate the dynamics.
|The most common threats in 2011|
Dynamics of activity shows that in 2012 there were "newbies" like Dorkbot, we also see a noticeable lack of Trojans aimed at stealing information (passwords) online games - OnLineGames. Upward trend displayed HTML / Iframe.B and HTML / SrcInject.B - malware that are embedded in Web pages. Obviously, the absolute leader in this year, as in the past, remains INF / Autorun, under such a common name, we find. INF startup files that are used by malicious programs to be started in the system (eg, Conficker). And Conficker and INF / Autorun are among the most common malware is not accidental, Conficker botnet is still alive and includes a large number of bots, as well as the number of systems with no auto shut features from removable media (INF / Autorun), which it is actively enjoys.
Below provides statistics on the dynamics of growth in the number of detectable us INF / Autorun files threats and malicious programs that infect websites to download malicious programs. Here we observe a decrease in the dynamics and predict a slowdown in the future for Autorun elements, on the other hand, it is obvious to us in the future, the growth of the number of infected sites and detected malware on them.
|Autorun malware dynamics, January 2011 - September 2012|
As you can see in the diagram, by early 2011 the activity of malicious objects, which are embedded in compromised Web sites, is virtually nonexistent. At the same time, in 2011, Autorun activity fell. In addition, both HTML and JS and experienced significant growth over the time. This allows us to say that in 2013 they will be subjected to sustainable growth, ie, the number of infected sites will increase.
Related post: TOP-10 threats for Windows