Conventional antivirus solutions are failing to protect users from attacks according to a Malwarebytes report.
The study is based on real-world clean up scans performed by Malwarebytes. Nearly 40 percent (39.18percent) of all malware attacks cleaned on endpoints with an AV installed occurred on endpoints that had two or more traditional AV solutions registered.
In addition 39.16 percent of attacks on endpoints with a non-OS bundled AV installed occurred on an endpoint running one of the four leading traditional AV solutions.
"The results of these scans clearly indicate the ineffectiveness of today's traditional AV solutions and, more importantly, the unknown risks to users that depend only on these AV platforms to stay safe," says Marcin Kleczynski, CEO of Malwarebytes. "Antiquated AV technology is no longer enough to protect from sophisticated cyberthreats. It's crucial that consumers and businesses understand this now before they become a victim of the next attack."
The findings also show the top ransomware types detected on compromised machines are Hidden Tear (41.65 percent) and Cerber (18.26 percent). Botnets most often detected include IRCBot (61.56 percent) and Kelihos (26.95 percent). The most prevalent Trojan types bypassing traditional AV detections are Fileless (17.76 percent) and DNSChangermalware (17.51 percent).
Of ransomware attacks 48.59 percent of Hidden Tear and 26.78 percent of Cerber events were found on a compromised endpoint that had at least one of the four leading traditional AV brands installed.
To show how widespread the problem is, Malwarebytes has produced a real-time heatmap that shows each time Malwarebytes remediates instances of malware on endpoints that have a traditional AV registered. It also shows the numbers of attacks missed by leading antivirus programs.
Source: betanews.com
Showing posts with label Antivirus. Show all posts
Showing posts with label Antivirus. Show all posts
Monday, 1 January 2018
Saturday, 17 November 2012
Ransomware - A Major Threat To Internet Security
Ransomware is
emerging as a major cybercrime strategy, threatening to oust fake anti-virus
software as the most popular cyber-attack next year, new research by IT
security firm Symantec shows.
A total of 2.8% of victims of ransomware pay a "ransom" of up to £280 to regain access to their computers which have been blocked by cryptoviruses. Victims are tricked into making the payments after receiving fake messages that look like they have been issued by police authorities. Such messages often tell users they must pay a penalty for browsing illegal content.
Cybercriminals pocket £3 million annually from blackmailing users to pay to free their PCs from the malicious software, with one criminal group having tried to plague 495,000 computers in just 18 days, Symantec said, as quoted by IT Pro.
The first cases of ransomware were found in 2009 and were mainly limited to Eastern Europe and
Russia.
However, this type of cybercrime is spreading to Western Europe, the USA and Canada, Symantec said. Criminal gangs have been traced back to a single unidentified person who apparently creates ransomware on request.
As consumer demand shifts to mobile devices and the cloud, cyber-attacks will increasingly focus on Secure Sockets Layer (SSL) certificates used by mobile apps, Symantec believes. Meanwhile,
according to an earlier report by IT Pro, security experts have
identified a new malware strand that steals image files from PCs and dispatches
them to a remote server.
Labels:
Antivirus,
cryptovirus,
cybercriminal,
IT Pro,
Norton,
ransomware,
SSL,
Symantec
Thursday, 12 August 2010
Online banking virus Zeus v3 fleeces thousands
By Tom McTague 12/08/2010
The scammers have stolen about £675,000 from customers at a top high street bank, which remained unnamed last night. About 3,000 people are thought to have been hit between July 5 and August 4 - and the theft is said to be still going on.
Accounts have been raided after people had their computers infected by a new Trojan virus - known as Zeus v3 - as they surfed the net.
The software steals a customer's online banking ID and, if there is more than £800 in the account, money is transferred to a different account. Internet protection firm M86 Security discovered the scam which is believed to have been carried out from Eastern Europe.
The company said: "Criminals continuously seek new, sophisticated ways to steal information and money without detection."
Victims of online banking fraud usually have the money refunded.
Labels:
anti-virus software,
Antivirus,
computer virus,
fraud,
hacker,
internet virus,
scammer,
trojan virus,
Zeus v3
Subscribe to:
Posts (Atom)