SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Our researchers examined data gathered from Malwarebytes products
deployed on millions of endpoints throughout the world over a six-month
period—June to November 2016—to determine the state of malware today.
STATE OF MALWARE 2017
Our telemetry was gathered from:
Almost
1 billion
malware
detections
1BNearly 100 million
Windows and
Android devices
100M
Over 200
countries
200
Measuring the impact of six threat categories:
Europe the most malware-ridden continent
49%
Europe leads all continents in
ransomware detections with 49 percent.
20%
Among the malware categories
examined in this report, Europe
saw 20 percent more infections
than North America.
Europe
NorthAmerica
17x
Europe had 17
times more malware
infections than Oceania.
Ransomware AdwareBotnetsAd fraud
malware
Android
malware
Banking
Trojans
01011010$10110011101000110101
01101110110101010101010111010101001101001101010
0110111011010101010101001101001101010
11001010100101101001101001100011
1110101$0011010010111101
1010101101010110110010101
01101010110101010101011010111011010111010111010101001101001011010
0110101011010101010111010111010101001101001011010
110010101010101011$1001100011
Ransomware the favorite attack
method used against businesses
Nearly 400 variants of
ransomware were cataloged in
the fourth quarter of 2016 alone.
Ransomware distribution
increased by 267 percent
between June and
November 2016.
Globally, 12.3 percent of enterprise
detections were ransomware, compared
to only 1.8 percent on the consumer side.
400
267%
12.3%
!
JUNNOV
70%
Ad fraud malware a substantial threat for US
Nearly 70 percent of all
ad fraud detections
were in the US.
Kovter, a sophisticated
form of ad fraud, led ad
fraud detections in the
US, with 68.6 percent.
3%
The second most
impacted country was
Canada, at only 3 percent.
69%
Asia and Europe saw an
increase in botnet variants
Kelihos
IRCBot
Qbot
Germany saw a 550 percent increase in
the amount of botnet detections from
2015 to 2016.550%
960%The Kelihos botnet grew 960
percent in October 2016.
667%
IRCBot grew 667 percent
in August 2016.
261%
Qbot grew 261 percent
in November 2016.
To learn more about the latest developments in
cybersecurity, go to blog.malwarebytes.com.

Contenu connexe

Plus de Infographic Box IDS

IBM - The New C-Suite Power Team.pdf
IBM - The New C-Suite Power Team.pdfIBM - The New C-Suite Power Team.pdf
IBM - The New C-Suite Power Team.pdfInfographic Box IDS
 
Verilogue - Alzheimer’s Disease
Verilogue - Alzheimer’s DiseaseVerilogue - Alzheimer’s Disease
Verilogue - Alzheimer’s DiseaseInfographic Box IDS
 
XO Communications 2016 - The Year of the Zettabyte
XO Communications 2016 - The Year of the ZettabyteXO Communications 2016 - The Year of the Zettabyte
XO Communications 2016 - The Year of the ZettabyteInfographic Box IDS
 
Gillette - Every Knot You Need to Know
Gillette - Every Knot You Need to KnowGillette - Every Knot You Need to Know
Gillette - Every Knot You Need to KnowInfographic Box IDS
 
Mesothelioma - Asbestos in the Home
Mesothelioma - Asbestos in the HomeMesothelioma - Asbestos in the Home
Mesothelioma - Asbestos in the HomeInfographic Box IDS
 
Smithsonian - Transforming Science Education
Smithsonian - Transforming Science EducationSmithsonian - Transforming Science Education
Smithsonian - Transforming Science EducationInfographic Box IDS
 
Philips - Americans Crave More Meaning at Work
Philips - Americans Crave More Meaning at WorkPhilips - Americans Crave More Meaning at Work
Philips - Americans Crave More Meaning at WorkInfographic Box IDS
 
Western Digital - HDD Industry At-a-Glance
Western Digital - HDD Industry At-a-GlanceWestern Digital - HDD Industry At-a-Glance
Western Digital - HDD Industry At-a-GlanceInfographic Box IDS
 
Trusted Computing Group - Protect Your Data
Trusted Computing Group - Protect Your DataTrusted Computing Group - Protect Your Data
Trusted Computing Group - Protect Your DataInfographic Box IDS
 
iForex - These people make more money!
iForex - These people make more money!iForex - These people make more money!
iForex - These people make more money!Infographic Box IDS
 
Garcon Model - Men’s Underwear Trends
Garcon Model - Men’s Underwear TrendsGarcon Model - Men’s Underwear Trends
Garcon Model - Men’s Underwear TrendsInfographic Box IDS
 
WebPowerUp - Growth Hacking Strategies
WebPowerUp - Growth Hacking StrategiesWebPowerUp - Growth Hacking Strategies
WebPowerUp - Growth Hacking StrategiesInfographic Box IDS
 

Plus de Infographic Box IDS (20)

Origin - The NEM Explained
Origin - The NEM ExplainedOrigin - The NEM Explained
Origin - The NEM Explained
 
IBM - The New C-Suite Power Team.pdf
IBM - The New C-Suite Power Team.pdfIBM - The New C-Suite Power Team.pdf
IBM - The New C-Suite Power Team.pdf
 
Visual.ly - Messi vs Ronaldo
Visual.ly - Messi vs RonaldoVisual.ly - Messi vs Ronaldo
Visual.ly - Messi vs Ronaldo
 
Verilogue - Alzheimer’s Disease
Verilogue - Alzheimer’s DiseaseVerilogue - Alzheimer’s Disease
Verilogue - Alzheimer’s Disease
 
Visual Toy - Beer Consumption
Visual Toy - Beer ConsumptionVisual Toy - Beer Consumption
Visual Toy - Beer Consumption
 
Waterpik - Got Floss?
Waterpik - Got Floss?Waterpik - Got Floss?
Waterpik - Got Floss?
 
XO Communications 2016 - The Year of the Zettabyte
XO Communications 2016 - The Year of the ZettabyteXO Communications 2016 - The Year of the Zettabyte
XO Communications 2016 - The Year of the Zettabyte
 
Gillette - Every Knot You Need to Know
Gillette - Every Knot You Need to KnowGillette - Every Knot You Need to Know
Gillette - Every Knot You Need to Know
 
Mesothelioma - Asbestos in the Home
Mesothelioma - Asbestos in the HomeMesothelioma - Asbestos in the Home
Mesothelioma - Asbestos in the Home
 
IBM - Predictive Maintenance
IBM - Predictive MaintenanceIBM - Predictive Maintenance
IBM - Predictive Maintenance
 
Smithsonian - Transforming Science Education
Smithsonian - Transforming Science EducationSmithsonian - Transforming Science Education
Smithsonian - Transforming Science Education
 
Perceptics - Security Concerns
Perceptics - Security ConcernsPerceptics - Security Concerns
Perceptics - Security Concerns
 
SEIA - Top 10 Solar States
SEIA - Top 10 Solar StatesSEIA - Top 10 Solar States
SEIA - Top 10 Solar States
 
Philips - Americans Crave More Meaning at Work
Philips - Americans Crave More Meaning at WorkPhilips - Americans Crave More Meaning at Work
Philips - Americans Crave More Meaning at Work
 
Western Digital - HDD Industry At-a-Glance
Western Digital - HDD Industry At-a-GlanceWestern Digital - HDD Industry At-a-Glance
Western Digital - HDD Industry At-a-Glance
 
Ford - The Living Roof
Ford - The Living RoofFord - The Living Roof
Ford - The Living Roof
 
Trusted Computing Group - Protect Your Data
Trusted Computing Group - Protect Your DataTrusted Computing Group - Protect Your Data
Trusted Computing Group - Protect Your Data
 
iForex - These people make more money!
iForex - These people make more money!iForex - These people make more money!
iForex - These people make more money!
 
Garcon Model - Men’s Underwear Trends
Garcon Model - Men’s Underwear TrendsGarcon Model - Men’s Underwear Trends
Garcon Model - Men’s Underwear Trends
 
WebPowerUp - Growth Hacking Strategies
WebPowerUp - Growth Hacking StrategiesWebPowerUp - Growth Hacking Strategies
WebPowerUp - Growth Hacking Strategies
 

Dernier

Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 

Dernier (20)

Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 

State Of Malware 2017

  • 1. Our researchers examined data gathered from Malwarebytes products deployed on millions of endpoints throughout the world over a six-month period—June to November 2016—to determine the state of malware today. STATE OF MALWARE 2017 Our telemetry was gathered from: Almost 1 billion malware detections 1BNearly 100 million Windows and Android devices 100M Over 200 countries 200 Measuring the impact of six threat categories: Europe the most malware-ridden continent 49% Europe leads all continents in ransomware detections with 49 percent. 20% Among the malware categories examined in this report, Europe saw 20 percent more infections than North America. Europe NorthAmerica 17x Europe had 17 times more malware infections than Oceania. Ransomware AdwareBotnetsAd fraud malware Android malware Banking Trojans 01011010$10110011101000110101 01101110110101010101010111010101001101001101010 0110111011010101010101001101001101010 11001010100101101001101001100011 1110101$0011010010111101 1010101101010110110010101 01101010110101010101011010111011010111010111010101001101001011010 0110101011010101010111010111010101001101001011010 110010101010101011$1001100011 Ransomware the favorite attack method used against businesses Nearly 400 variants of ransomware were cataloged in the fourth quarter of 2016 alone. Ransomware distribution increased by 267 percent between June and November 2016. Globally, 12.3 percent of enterprise detections were ransomware, compared to only 1.8 percent on the consumer side. 400 267% 12.3% ! JUNNOV 70% Ad fraud malware a substantial threat for US Nearly 70 percent of all ad fraud detections were in the US. Kovter, a sophisticated form of ad fraud, led ad fraud detections in the US, with 68.6 percent. 3% The second most impacted country was Canada, at only 3 percent. 69% Asia and Europe saw an increase in botnet variants Kelihos IRCBot Qbot Germany saw a 550 percent increase in the amount of botnet detections from 2015 to 2016.550% 960%The Kelihos botnet grew 960 percent in October 2016. 667% IRCBot grew 667 percent in August 2016. 261% Qbot grew 261 percent in November 2016. To learn more about the latest developments in cybersecurity, go to blog.malwarebytes.com.