Exponential increase in new and unknown malware

Report based on monitored security events from over 10,000 organisations worldwide.

  • 9 years ago Posted in

Check Point has issued its 2014 Security Report, its second annual report uncovering the major security events that occurred and impacted organisations across the world in 2013. The report is based on analysis of monitored security events from over 10,000 organisations worldwide, across a range of industry sectors. It shows the network security events that actually occurred within firms during 2013, and the security risks that companies are exposed to.


Key findings include:
Malware activity increased in speed and quantity
Malicious software was downloaded every ten minutes in 84% of the organisations under analysis. Last year, 58% of organisations experienced users downloading malware every two hours or less, compared with just 14% in 2012.
‘Unknown’ malware grows
Smarter and more resilient malware emerged in 2013. 33% of organisations downloaded at least one infected file with unknown malware between June and December 2013. Of those infected file types, 35% were PDFs. New tools called ‘crypters’ enabled malware writers to bypass detection by anti-malware software, so that organisations were hit by 2 pieces of unknown malware every hour – one every 27 minutes.


Bot infestations
Bot infections continued to grow, with a host infected by a bot every 24 hours. In 2013, at least one bot was detected in 73% of organisations, an increase from 63% in 2012. Organisations also struggled with containing bots, as 77% of bots are active for more than four weeks. Bots communicated with their ‘Command & Control’ every three minutes.


Data losses mount
Check Point found that 88% of organisations had experienced at least one potential data loss event, up from 54% in 2012. In fact, in 33% of the financial institutions surveyed by Check Point, credit card information was sent outside of the organisation while 25% of healthcare and insurance institutions sent HIPAA-protected information.


Risky applications result in risky business
Use of high risk applications continued to be on the rise in 2013, with torrents, anonymisers, peer-to-peer (P2P) file sharing applications being used every nine minutes on an average day. P2P file sharing usage increased to 75% in 2013 from 61% of firms in 2012. Also, 56% of firms ran anonymizer proxy applications in 2013, up from 43% in 2012.


“Our 2014 Security Report peeled back more layers to reveal the infiltration and sophistication of malware in 2013. We found organisations at more risk with both the new threats of today, as well as the old threats identified in last year’s Security Report,” said Amnon Bar-Lev, president of Check Point Software Technologies. “It is clear that organisations need more understanding of, and protections for the threats that endanger their networks, with security based on real-time threat intelligence.”


 

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Atos has launched Atos OneCloud Sovereign Shield, a set of solutions, methodologies, and...
New distribution agreement set to bolster Westcon-Comstor’s Zero Trust offering in more markets...
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
This year, over half of MSPs or their end customers have been attacked by ransomware but only 53%...
Trend Micro has published new research revealing that 90% of IT decision makers claim their...
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real...