The analysis carried out by the Centre for McAfee Labs showed that the number of new cases has increased in the last quarter of ransomware threats as much as 26 percent compared with the same time last year. Also increased once again, the number of new samples of malware for mobile devices.
Disturbing report results is an important warning for all of us, said Arkadiusz Krawczyk, Country Manager of Intel Security. We draw your attention particularly to open source the ransomware and ransomware (as a service), which remain the most lucrative attacks for cyber criminals. Analysis of attack under the name of the Crypto Wall 3 carried out in October 2015 by researchers from McAfee Labs showed that only one such campaign generated revenue from paid ransoms at 325 million dollars.
Are there ways to combat criminals? Is there anything, what companies can do to counter the risks of enforcement ransoms? According to Intel Security, the most effective way to close cooperation and activity of companies in terms of sharing information about the dangers of (CTI-cyber-threat intelligence).
The Centre of McAfee Labs to investigate, as this issue goes 500 specialists. Cybersecurity from North America, Asia and Europe. Respondents answered questions viewed “knowledge on information about cyber threats, reviews about their value to the security of the company and about the main obstacles on the way to implement such procedures as part of the security strategy.
Only 42% of polled specialists in cybersecurity uses information about cyber threats. Out of that number up 97 per cent believes that it can ensure us a better protection
Almost unanimously (91%) respondents showed interest in information about the Guide. With regard to sectors such as financial services and critical infrastructure, which are the target of the most sophisticated attacks and could most benefit from the cooperation in the framework of CTI.
72% believe that the most important and most provided by the company are about malware, in second place was mentioned the reputation of URLs (58%), then the reputation of external IP addresses (54%), reputation (43%) and reputation (37%)
Respondents found that the biggest barrier in sharing data about the dangers of cyber policies (54%), business rules (24%) and the lack of information about how to use them (24%).
Taking into account the determination that they show criminals, sharing information about the threats may become a useful tool in an attempt to tilt the line of victory to a party struggling with the attackers, said Vincent Weafer, Vice President of McAfee Labs, Intel Security. Our survey shows that, in order to efficiently use the potential of the made available information about the risks, you first need to overcome the obstacles in the form of corporate policies, regulatory restrictions, liability risks and lack of knowledge of the deployment.
Statistics in the fourth quarter by 2015:
Mobile malware has been reporting growth. In the fourth quarter by 2015 (compared to the fourth quarter of 2014) number of new samples of mobile malware increased by 72%. This suggests that new viruses are created faster.
A general upward trend. After three quarters of low interest total number of new samples of malware again made a breakthrough in the fourth quarter. Amounted to 42 million, or 10% more than in the third quarter. This is the second highest score so far observed by McAfee Labs.
Busting in the rootkits. The number of new rootkit samples fell dramatically in the fourth quarter. This is a continuation of the long-term downtrend in this area. Experts from McAfee Labs combine this phenomenon of shifting customers for Intel ® 64-bit and Microsoft Windows 64-bit. Features that these technologies are equipped with (Kernel Patch and Secure a Protection Boot), offer better protection against rootkits.
Malicious signed binaries in the back. The number of new malicious binaries signed declined in each quarter last year, reaching the lowest level by 2015 in the fourth quarter from the SECOND quarter of 2013.