Panda Security: New Malware Hit 230,000 Per Day in 2015

New malware will grow exponentially in 2016, with cyber-criminals increasingly taking to JavaScript and PowerShell to launch successful attacks against their victims, according to Panda Security.

The Spanish security vendor claimed the pattern would repeat 2015, when the number of new malware samples discovered daily hit 230,000.

It warned of an increase in infections via JavaScript and Windows admin tool PowerShell.

The latter is a scripting tool designed to automate the administration of the OS and associated apps, but it is being favored by cyber-criminals keen to fly under the radar of traditional defenses.

Panda’s prediction of an exponential rise in new malware is not quite in line with the predictions of some of its rivals, who see malware growth slowing.

Kaspersky Lab said earlier this month, for example, that the volume of new malware it discovered in 2015 dropped by 15,000—from 325,000 in 2014 to 310,000.

Elsewhere, Panda predicted mobile and Internet of Things devices would be increasingly under fire next year. When it comes to Android, cyber-criminals are likely to launch more threats designed to root the device—making it almost impossible for AV tools to stop.

Rootkits will also be favored to help the bad guys hide from security tools, it said.

Mobile payment platforms in particular could be under threat—especially those which attract a large number of users, said Panda.

And there’ll be no let-up in the volume of ransomware attacks which have become a major headache for consumers and corporate users alike.

“The extra security measures being discussed are moving beyond just having an antivirus on your PC, but also including having mobile device protection installed on tablets and phones,” PandaLabs director, Luis Corrons, told Infosecurity.

“Ensure all devices, including where possible IoT devices such as routers, have the latest updates installed. Where possible have advanced security solutions installed that analyze and classify the behavior of all executables.”

 

SOURCE: Phil Muncaster | Infosecurity Magazine

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s