Wednesday , June 1 2016
Breaking News
Home / Tech Updates / General news / Over 1.5bn web-based attacks detected and blocked: Kaspersky

Over 1.5bn web-based attacks detected and blocked: Kaspersky

Kaspersky Lab has revealed in an official statement that it detects and blocks more than 200,000 new malicious programs each day – a significant increase from the first half of 2012, when 125,000 malicious programs were detected and blocked each day on an average.


Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012. The data analysed in the report was obtained using the Kaspersky Security Network (KSN), the cloud- based infrastructure used by Kaspersky Lab products to report telemetry and to deliver instant protection in the forms of blacklists and heuristic rules that are designed to catch the newest threats. The 2012 report revealed significant growth of Mac-specific malware and an explosive growth in the number of threats targeting the Android platform. Overall, Kaspersky Lab’s products detected and blocked more than 1.5 billion web-based attacks in 2012 and more than 3 billion infected files.

Kaspersky Lab products

Kaspersky Security Bulletin



Providing statistics highlighting its findings, Kaspersky Lab shares:

  • In 2012, Kaspersky Lab’s products blocked more than 1.5 billion web-based attacks throughout the year, which is 1.7 times greater than the total amount of web-based attacks in 2011.
  • Kaspersky Lab successfully blocked more than 3 billion local infections on users’ computers in 2012. In total, 2.7 million unique modifications of malware and potentially unwanted programs attempting to launch on users’ computers were detected during these incidents.
  • In 2012, ninety-nine percent of all mobile malwares detected by Kaspersky Lab were designed for the Android platform. Kaspersky Lab identified more than 35,000 malicious Android programs for the year, which is about six times more than the previous year.
  • Mac OS X malware continues to increase as Kaspersky Lab’s antivirus experts created 30 percent more signatures to detect various Mac Trojans this year compared to 2011.
  • Oracle Java was the most popular vulnerable application targeted by cybercriminals in 2012.
  • The application accounted for 50 percent of all detected exploit-based attacks targeting vulnerabilities.
  • Adobe Reader ranked second and accounted for 28 percent of all incidents.
  • Top 5 malware hosting countries: United States, Russia, The Netherlands, Germany and the United Kingdom
  • Top 5 countries with the highest frequency of web attacks: Russia, Tajikistan, Azerbaijan, Armenia and Kazakhstan
  • Top 5 countries where infected files are most frequently discovered: Bangladesh, Sudan, Malawi, Tanzania and Rwanda
  • Top 5 countries with lowest infection rates: Denmark, Japan, Finland, Sweden and Czech Republic


The report highlighted that the discovery of Flashback turned out to be one of the most important news in the beginning of 2012. Flashback is a strong botnet comprising 700,000 infected Apple computers running Mac OS X. The significant outbreak was caused by a new variant of the Flashfake malware and the security incident put an end to the perception of the Mac OS X platform as being invulnerable to exploitation. In addition to mass-malware, Mac OS X computers also became frequent victims of targeted attacks.


The main reason for this is that Apple products are popular with many influential politicians and prominent businessmen, and the information stored in the devices owned by these people is of interest to a certain category of cybercriminals. In total, Kaspersky Lab’s antivirus experts created 30 percent more signatures to detect various Mac Trojans in 2012 compared to 2011.


Also spotted was another key trend of 2012, i.e. the continued, rapid growth of Android malware. The Android platform firmly established itself as the main point of interest for cybercriminals. Although malicious programs for other mobile platforms such as Symbian, BlackBerry or J2ME are still being developed, 99 percent of newly discovered malicious programs targeted the Android platform. Despite attempts by Google to introduce its own anti-malware technology, malicious applications continue to appear in the official Google Play store. In 2012, the first incident with an ambiguous app collecting the address book data and sending spam was recorded at Apple App Store as well. Just like traditional PCs, mobile devices are now targeted with high-profile cybercriminal operations, including targeted attacks and

creating “mobile” botnets.


Going further, the report revealed that In 2012, Kaspersky Lab’s products blocked an average of more than 4 million browser-based attacks every day, with the total number of web-based attacks surpassing 1.5 billion for the year. The most frequently used technique for attacking users online is exploiting vulnerabilities in programs or applications. Throughout the year, Kaspersky Lab’s experts registered both large-scale and targeted attacks utilizing vulnerable software, with Oracle Java being the most frequently targeted (50 percent of attacks). Adobe Reader ranked second (28 percent) and Adobe Flash player occupies the fourth place with only 2 percent share thanks to efficient automatic updating system that promptly closes security holes. In addition, some of the exploits actively used targeted older vulnerabilities that still existed in various Windows operating systems. One of the explanations for this is that older versions of Windows are still actively used. For example, share of computers with Windows XP in 2012 was 44 percent compared to 63 percent in 2011 – not a significant drop given Windows 7 has been available for three years and Windows 8 was recently released this year.


More than 3 billion malware incidents were detected and blocked by Kaspersky Lab’s software on users’ local hard drives and external storage. In total, 2.7 million unique modifications of malware and potentially unwanted programs attempting to launch on users’ computers were detected during these incidents. The majority of local infections were blocked by Kaspersky Lab’s behavior-based heuristic technology. It is notable that different versions of years-old Kido (Conficker) and Sality are still present in the list of the most frequently blocked malware. Overall, the number of new malicious applications has increased rapidly: in the first half of 2012, Kaspersky Lab recorded an average number of 125,000 new malware every day. Toward the end of the year, this figure has grown to 200,000.


Servers located in the United States were the most frequently used to host and deliver malicious objects (25.5 percent of all incidents). Russia occupies the second place with 19.6 percent followed by the Netherlands, Germany and the United Kingdom. This is a significant change compared to years past: in 2010, the majority of malware was hosted in China. Changes in domain registration policies and other regulations taken by Chinese authorities resulted in the rapid decline of malicious hosts originating from the country. On the contrary, the United States, Russia and other European countries have seen a major increase in the number of malicious hosting sites as cybercriminals compromise legitimate online resources in large quantities in addition to registering purely malicious websites.


Based on the number of blocked web attacks and local malicious files, Kaspersky Lab’s experts calculated the “risk level” for different countries, defined as the share of attacked users. Russia and former USSR republics occupy the top places in the web attacks chart, but 31 countries (including UK, Australia and Canada) in total have also joined them in the “high risk” group. In these countries, at least 41 percent of users were attacked online in 2012. Bangladesh, Sudan, Malavi, Tanzania and Rwanda form the top five countries where users are most frequently attacked with local malware infections. Seven countries in total were categorised as “maximum risk”, where 75 percent or more users were at least once attacked with a malicious file. Another 41 percent countries joined the “high risk” group (56-75 percent of attacked users), including Indonesia, Ethiopia and Kenya. In contrast, Denmark was deemed as the safest country, as the country had the lowest rate of infected computers (15 percent). Japan, Finland, Sweden and Czech Republic were the other countries listed with the lowest infection rates.


[source : Tech2]



  1. Ive bought the usb stick in my netbook computer , but dont no how you can do the installation on my small netbook computer. Any suggestions ? Thanks Patrick

  2. hi i’ve eset wise security 4 also it keeps discovering a port scan attack. i understand that cyber-terrorist make use of this to go into so my real question is someone attempting to enter my pc? every ten minutes it’ll say another port scan attack happened. however this continues to be happening everyday for any month. would it you need to be my other computer systems within my house disturbing it? or perhaps is someone hacking it. also on my small other computer it states incorrect packet checksum?

  3. tell the ranges also please

Leave a Reply

Your email address will not be published. Required fields are marked *