SlideShare a Scribd company logo
1 of 20
Avast
Threat Report
2015
QUARTER 1
2
AVAST THREAT REPORT 2015
Contents
Executive summary 	 3
Stories	5
	 It’s called PUBLIC Wi-Fi for a reason	 6
		 Global Wi-Fi experiment	 6
		Open Wi-Fi	 6
		 Percentage of open Wi-Fi networks	 6
		HTTP Browsing	 7
		Weak encryption	 7
		 Percent of weakly encrypted routers	 7
	 Ransomware on steroids	 8
		 PC Ransomware 	 8
		 Mobile Ransomware 	 8
Statistics	9
	 Threat levels by country 	 10
		PC	 10
		Mobile	 11
	Detections	 12
		Domains	 12
		 URL Detections 	 13
		 File Detections 	 14
		 Top PC detections 	 15
		 Top Mobile detections 	 15
	Exploits	 16
	 Operating systems	 17
		 Most used on PC	 17
		 Most used on Android	 18
About Avast	 19
3
Executive
summary
AVAST THREAT REPORT 2015
4
EXECUTIVE SUMMARY
The Avast Virus Lab analyzes, researches, and provides real-time threat intelligence based on
data received daily from nearly 230 million sensors worldwide. We stream more than 250 micro-
updates to active devices every day to prevent attacks. By protecting more devices than any
other security provider, we have the best insight into the threat landscape. This also means we
not only keep up with the latest security threats, but stay ahead of them. This translates into
better protection for our customers.
In Q1 2015, Avast researchers ventured out
of the office and traveled to nine cities on
three continents to research the security of
public Wi-Fi networks. The project’s results
found that users around the world are prone
to Wi-Fi attacks; in Asia even more than in
Europe and the U.S.
In terms of threats, Romania was the most
targeted country, with a 54 percent chance
of users encountering PC threats. Nearly one
out of every three PC users in the United
States and Great Britain were targeted with
PC threats.
Within the mobile sphere, China was
targeted the most, which is most likely
due to the fact that the Google Play
Store is blocked in the region. Potentially
unwanted programs (PUPs) including adware
dominated the top 10 Android detections.
Additionally in Q1, the steady evolution of
ransomware targeting mobile devices and
PCs has shown that this fairly simple way
for malware authors to profit remains as an
invaluable and feasible option.
5
Stories
It’s called PUBLIC Wi-Fi for a reason
Ransomware on steroids
AVAST THREAT REPORT 2015
6
Global Wi-Fi experiment
Avast mobile security experts traveled
to nine cities in the United States (San
Francisco, Chicago, New York), Europe
(Barcelona, London, Berlin), and Asia (Seoul,
Hong Kong, Taipei) to observe public Wi-Fi
activity. Each expert was equipped with a
laptop and a Wi-Fi adapter with the ability
to monitor Wi-Fi traffic in the area. For
this purpose, we developed a proprietary
app, monitoring the wireless traffic at 2.4
GHz frequency. It’s important to mention
that there are commercial Wi-Fi monitoring
apps like this available in the market that are
easy-to-use and free of charge.
Our observations revealed major security
flaws in Wi-Fi hotspots and showed how
easy it is for hackers to see browsing
activity, searches, passwords, videos,
emails, and other personal information.
While security issues were found in all cities,
the experiment showed that users in Asia
are more prone to attacks than users in
Europe and the U.S. Users in Berlin and San
Francisco were most likely to take steps to
protect their browsing.
Open Wi-Fi
Asian cities proved to have the most open
Wi-Fi networks with an average of 42.3% of
Wi-Fi networks being public, followed by the
U.S. (31.7%) and Europe (28.5%).
Percentage of open Wi-Fi
networks
1)      Taipei: 43.6 percent
2)      Hong Kong: 42.9 percent
3)      Seoul: 40.4 percent
4)      Chicago: 39.0 percent
5)      London: 33.3 percent
6)      New York: 33.1 percent
7)      Berlin: 26.3 percent
8)      San Francisco: 24.9 percent
9)      Barcelona: 24.3 percent
STORIES
It’s called PUBLIC Wi-Fi
for a reason
7
IT’S CALLED PUBLIC WI-FI FOR A REASON
HTTP Browsing
Our experiment also shed light on the fact
that a significant portion of users browse
primarily on unsecured HTTP sites while
connected to open Wi-Fi networks. HTTP
traffic is not encrypted and therefore
unprotected, meaning that our team was
able to view browsing activity, including
domain name and page history, searches,
personal log information, videos, emails,
and comments. For example, it was possible
for the Avast researchers to see products
that a user browsed on eBay while not being
logged in to the site as well as articles that
people read on Wikipedia.
Nearly half of the web traffic in Asia takes
place on unprotected HTTP sites, compared
with one third of U.S. traffic and roughly
one quarter of European traffic. This is most
likely attributed to the fact that there are
more websites in Europe and the U.S. that
use the HTTPS protocol. In order to improve
protection, HTTPS browsing is strongly
recommended to users, as it is encrypted
and thus more secure.
Weak encryption
The majority of the Wi-Fi hotspots observed
in this experiment were protected, but Avast
found that often their encryption methods
were weak and could be easily hacked. Using
WEP encryption can be nearly as risky as
forgoing password protection altogether,
as users tend to feel safer entering their
personal information, but their data can still
be accessed. San Francisco and Berlin had
the lowest percentage of weakly encrypted
hotspots, while more than half of password-
protected hotspots in London and New York
and nearly 70 percent of Asian hotspots
were vulnerable to attack.
Percent of weakly encrypted
routers
1)      Seoul: 70.1 percent
2)      Taipei: 70.0 percent
3)      Hong Kong: 68.5 percent
4)      London: 54.5 percent
5)      New York: 54.4 percent
6)      Chicago: 45.9 percent
7)      Barcelona: 39.5 percent
8)      Berlin: 35.1 percent
9)      San Francisco: 30.1 percent
8
STORIES
Ransomware on steroids
During Q1, we saw both PC and mobile
ransomware evolve. Ransomware is a term
for applications that lock your device or files
and then demand a ransom payment for the
unlock key.
PC Ransomware
CryptoWall, which originally appeared in
November 2013, made its second comeback
in January as CryptoWall 3.0. CryptoWall
is typically distributed through drive-by
download attacks by exploiting outdated
vulnerabilities, via spam campaigns, or
through malware that has already been
installed on a compromised system. When
executed, the ransomware searches for files
with specific extensions, such as images,
documents, and source code-files that are
important to most users. The ransomware
encrypts the files with a strong cipher (RSA
2048) and demands a ransom payment from
the victim to decrypt the files. The ransom
is typically around five hundred U.S. dollars
and is paid in BitCoin to ensure anonymity.
Once the payment is made, instructions to
decrypt the files are sent to the victim.
The latest version of CrytpoWall differed
from the second version in that it switched
from using TOR to using I2P (Invisible
Internet Project) to communicate with the
command and control (C&C) server. This
switch was most likely caused by the fact
that TOR is now well known and can be
blocked by network admins, whereas I2P is
a lesser-known anonymization network. The
original version of CryptoWall did not feature
anonymization networks.
Additionally, a variant of ransomware called
TeslaCrypt targeted gamers of more than 20
different games, including World of Warcraft,
League of Legends and Call of Duty.
Mobile Ransomware
Simplocker is mobile ransomware that first
appeared in June 2014, infecting more than
20,000 unique users. Simplocker reappeared
in February 2015, emerging in a form
more sophisticated than its first. The new
variant of Simplocker uses asymmetrical
cryptography, making it impossible to
recover encrypted data without accessing
the C&C server.
9
Statistics
Threat levels by country
Detections
Exploits
Operating Systems
AVAST THREAT REPORT 2015
10
STATISTICS
Threat levels by country
The threat levels by country vary greatly
between PC and mobile. Romanians have
the greatest chance of encountering a PC
infection. However on the mobile side,
Chinese are the most targeted. We are not
very surprised to see that China is highly
targeted with mobile threats – according
to the official China Internet Network
Information Center, 83 percent (527 million)
of China’s Internet users access the Internet
via a mobile device.
PC
Hackers targeted Romania, Turkey and
Vietnam more than any other countries with
PC malware in Q1.
Romania was targeted the most, with a 54
percent chance of encountering an infection.
The threat levels for Avast’s biggest
markets were much lower than this, yet still
significant:
	 41 percent Russia
	 37 percent Spain
	 34 percent Brazil and France
	 29 percent Germany
	 28 percent United States and United 	
	Kingdom
Figure 1 depicts the PC threat levels of
each country. The threat level indicates the
percentage of devices that have encountered
an infection in Q1.
PC Threat Levels by Country
FIGURE 1 - PC Threat Levels by Country
Romania
Vietnam
Turkey
Pakistan
China
Cambodia
Philippines
S. Korea
Ukraine
United Arab Emirates
Kazakhstan
Qatar
Serbia
Armenia
Thailand
0 - 25 %
25 - 30 %
30 - 40 %
40 - 45 %
45 - 100 %
0 19 38 57
11
THREAT LEVELS BY COUNTRY
Mobile
China, Romania, and Malaysia reported the
most encountered mobile infections. This is
likely due to the popularity of third-party app
stores in these countries, especially in China,
where the Google Play Store is blocked.
The threat levels for Avast’s biggest markets
were much lower:
	 21 percent Russia
	 16 percent Spain
	 12 percent United States
	 10 percent Brazil
	 8 percent France and United 		
	Kingdom
	 6 percent Germany
Figure 2 depicts the mobile threat levels of
each country. The threat level indicates the
percentage of devices that have encountered
an infection in Q1.
Mobile Threat Levels by Country
FIGURE 2 - Mobile Threat Levels by Country
0 23 46 69
0 - 10 %
10 - 20 %
20 - 30 %
30 - 40 %
40 - 100 %
China
Malaysia
Romania
India
Hong Kong
Iraq
Vietnam
Yemen
Iran
Mozambique
Ethiopia
Taiwan
Pakistan
Oman
Sri Lanka
12
STATISTICS
Detections
Nearly 230 million people worldwide use
Avast products, allowing us to stay ahead
of the curve, as users act as sensors that
automatically send malware and suspicious
file activity to our virus lab for detailed
analysis. As a result of our feedback loop,
the Avast Cloud engine is constantly updated
with the latest threats, providing users with
real-time protection. We call this global
sensor network our Community IQ.
Domains
Figure 3 shows the number of infected
subdomains belonging to top-level domain
names that were reported in Q1. Most
reports came from .com domains, which is
due to the number of infected subdomains.
One of the reasons why this number is
so large is that malware authors use a
technique called domain rotation to avoid
domain blacklisting. Domain rotation
regularly creates new domains and
subdomains and redirects malicious traffic
to them, exploiting the fact that it takes
time for antivirus software to find these
new domains, check them and release
new detections, if necessary. Avast uses
advanced algorithms to recognize domain
rotations and immediately blocks infected
subdomains before they can cause any
harm.
Top 15 Top TLD by number of reports
FIGURE 3 - Top 15 TLD by Number of Reports
1250
1000
750
500
250
0
.com .info .net .biz .org .in .ru .il .us .me .co .su .eu .country .cn
Numberofreports
inthousands
13
DETECTIONS
URL Detections
The Avast Web Shield protects Internet-
connected devices from malicious software
while browsing the web and downloading
files. While the user surfs online, Avast
detects and blocks known and potential
threats, such as hacked web pages and
pages containing malicious scripts.
Figure 4 shows the number of unique users
Avast protected from web-based malware in
Q1.
The Avast Virus Lab receives more than
300,000 samples of new potential viruses
every day. We verify these potential viruses
and when confirmed as malicious, we add
them to our virus database.
Due to the high number of samples we
receive, false positives can occasionally
occur. There is no way to avoid false
positives completely, but we do our best
to avoid them at all costs and to limit their
impact. The peak on January 25 that can be
seen in Figure 4 was caused when an e-shop
was wrongly detected as malicious. The
detection was disabled after a few hours.
Number of users per day who encountered malicious URLs (Web Shield)
FIGURE 4 - Number of users per day who encountered malicious URLs (Web Shield)
January February March
5 M
3 M
2 M
1 M
0
4 M
14
DETECTIONS
File Detections
The Avast File Shield checks all programs the
moment they are started and checks other
files as soon as they are opened, as well as
files downloaded using file sharing programs
and files received over chat and instant
messaging programs.
Figure 5 shows the number of unique users
we protected in Q1 using File Shield. Apart
from the seasonal and weekly fluctuations,
there is just one major peak in February that
was caused by a new version of a PUP.
Number of users per day who encountered malicious files (File Shield)
FIGURE 5 - Number of users per day who encountered malicious files (File Shield)
January February March
5 M
3 M
2 M
1 M
0
M4
15
DETECTIONS
Top PC detections
The top 10 Windows PC detections reported
were dominated by LNK detections. LNK files
are used to create shortcuts that typically
point to an executable file or script. The LNK
files appear on your computer desktop as an
icon, which is convenient for programs you
frequently use. However, malware authors
abuse LNK files to trick people into using
malicious shortcuts.
Top Mobile detections
Mobile malware continued to grow
dramatically, but Android is still fairly secure
due to Google Play app restrictions and
security.
The top 10 Android detections for Q1 consist
mainly of PUPs, which include aggressive
in-app advertising. App developers monetize
their apps by displaying ads, but ad libraries
can be abused and some leak personal data
or bombard users with ads outside of the
app.
The top two Trojans in the top 10 detections
were capable of sending premium SMS,
which was mainly targeted at Western
European and Asian mobile users as carriers
in these areas allow premium-rate SMS
billing.
Top 10 PC detections
FIGURE 6 - Top 10 PC detections
Top 10 Android detections
FIGURE 7 - Top 10 Android detections
LNK:Starter - B [Trj]
LNK:Starter - C [Trj]
LNK:Jenxcus - L [Trj]
LNK:Jenxcus - D [Trj]
LNK:Cantix - A [Trj]
LNK:Starter - A [Trj]
Win32:Rambit - G
Win32:Sanity
Win32:Rambit - CC [Trj]
LNK:Jenxcus - C [Trj]
Number of reports
in millions
200150100500
Number of reports
in thousands
Android:NineApps - A [PUP]
Android:Cooee - M [PUP]
Android:SMSAgent - AHY [Trj]
Android:Cooee - S [PUP]
Android:SMSreg - BRA [PUP]
Android:KingRoot - J [PUP]
Android:SMSreg - BRN [PUP]
Android:KingRoot - G [PUP]
Android:SecApkPackager - B [PUP]
Android:Agent - GWT [Trj]
10007505002500 1250
16
STATISTICS
Exploits
Exploits are an ever-present problem in
computer security. Faults in application
design or code can be exploited and are
therefore security threats. Hackers target
vulnerabilities in frequently used software
and devices because it gives them a good
chance of infecting a large numbers of users
at once. Applications that hackers often
target are browsers, Java, Adobe’s Acrobat
Reader, and office suites such as Microsoft
office.
In January and February, we saw a large
amount of JavaScript exploits. Two of the
biggest security vulnerabilities that were
exploited in Q1 were CVE-2013-2551 and
CVE-2013-3882. CVE-2013-2551 targets
JavaScript and can lead to remote code
execution in Internet Explorer versions 6
to 10. CVE-2013-3882, on the other hand,
targets an HTML parser in Internet Explorer
10 and if successful, the attack can lead to
remote code execution. If the attack doesn’t
succeed, it can cause a denial of service.
The malware families from March in
the “Other” chart in Figure 8 are mainly
document macro exploits of vulnerability
CVE-2006-2492 that use a buffer overflow
attack and MIDI vulnerability CVE-2012-0003,
which allows remote code execution via a
crafted MIDI audio file.
Exploit types
FIGURE 8 - Exploit types
JS
January
February
March
30 %
20 %
10 %
0 %
HTML JAVAOTHER SWF XLS DOC PDF VBS
January
February
March
January
February
March
January
February
March
January
February
March
January
February
March
January
February
March
January
February
March
January
February
March
17
STATISTICS
Operating systems
Most used on PC
Within the Avast user base, we have seen
a decline in Windows XP and Windows 8.0
in favor of Windows 8.1. Although official
support of Windows XP ended almost a year
ago, Avast continues to support the more
than 10 percent of users using Windows
XP. Windows 7 continued to be the most
popular PC operating system, with 60
percent of Avast users using the OS.
Windows Adoption Rate
FIGURE 9 - Windows Adoption Rate
January
February
March
January
February
March
April
May
June
July
August
September
October
November
December
20152014
75 %
50 %
25 %
0 %
Win 8.1
Win 8
Win 7
Win Vista
Win XP
18
OPERATING SYSTEMS
Most used on Android
Our mobile users’ operating systems are much
more diverse than PC operating systems.
Many Android users do not use the latest
version of the operating system, which can
be attributed to one of two reasons. The first
reason is that some vendors stick to older
OS versions to ensure compatibility with
their specific system tweaks, like custom
user interfaces in Samsung’s TouchWiz
or system applications like calendars and
dialers. The second reason is that not all older
phones are capable of supporting newer
operating systems due to lack of memory or
computational power.
Within the Avast user base, six percent
of users still use Gingerbread (2.3), which
was followed by Ice Cream Sandwich (4.0)
in October 2011. We are happy to see that
versions older than KitKat (4.4) are slowly
but steadily decreasing in favor of KitKat (4.4)
and Lollipop (5.0). The more up-to-date the
operating system, the safer it is, as security
bugs are corrected with every version.
Android adoption Rate
FIGURE 10 - Android adoption Rate
January
February
March
January
February
March
April
May
June
July
August
September
October
November
December
20152014
75 %
50 %
25 %
0 %
Unknown
5.0
4.4
4.3
4.2
4.1
4.0
2.3
2.2
19
About Avast
AVAST THREAT REPORT 2015
20
ABOUT AVAST
Avast Software (www.avast.com), maker of the most trusted mobile and PC security in the
world, protects 230 million people, mobile devices, and computers with its security applications.
In business for over 25 years, Avast is one of the pioneers in the computer security business,
with a portfolio that includes free antivirus for PC, Mac, and Android, to premium suites and
services for both consumers and business.
In addition to being top-ranked by consumers on popular download portals worldwide, Avast
is certified by, among others, VB100, AV-Comparatives, AV-Test, OPSWAT, ICSA Labs, and West
Coast Labs.

More Related Content

What's hot

Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYODTrustwave
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for androidKazi Sarwar Hossain
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devicesijmnct
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESijmnct
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet businessAndrei Kolesnikov
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revistathe_ro0t
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence ReportSymantec
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureI.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureIndonesia Honeynet Chapter
 
Mobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtMobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtIGN MANTRA
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_reportIsnur Rochmad
 

What's hot (20)

Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYOD
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
 
Comodo 2017 report
Comodo 2017 reportComodo 2017 report
Comodo 2017 report
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet business
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence Report
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureI.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
 
Mobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtMobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirt
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
 

Similar to Avast Q1 Security Report 2015

A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PALO ALTO -NETWORKS  Application Usage & Threat Report 2014PALO ALTO -NETWORKS  Application Usage & Threat Report 2014
PALO ALTO -NETWORKS Application Usage & Threat Report 2014Marcello Marchesini
 
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...APNIC
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Waqas Amir
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxmahendrarm2112
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013- Mark - Fullbright
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014EMC
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRijtsrd
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareYoungjun Chang
 

Similar to Avast Q1 Security Report 2015 (20)

A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PALO ALTO -NETWORKS  Application Usage & Threat Report 2014PALO ALTO -NETWORKS  Application Usage & Threat Report 2014
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
 
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
 
Smartphone
SmartphoneSmartphone
Smartphone
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Threat report 2015_v1
Threat report 2015_v1Threat report 2015_v1
Threat report 2015_v1
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 

More from Avast

Home Security Map of the World
Home Security Map of the World Home Security Map of the World
Home Security Map of the World Avast
 
IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018 IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018 Avast
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine LearningAvast
 
Where There's Money, There's Crime: Web-based Threats
Where There's Money, There's Crime: Web-based ThreatsWhere There's Money, There's Crime: Web-based Threats
Where There's Money, There's Crime: Web-based ThreatsAvast
 
Korean Banks Under Pressure
Korean Banks Under PressureKorean Banks Under Pressure
Korean Banks Under PressureAvast
 
Every Click Counts (But All the Money Goes to Me)
Every Click Counts (But All the Money Goes to Me)Every Click Counts (But All the Money Goes to Me)
Every Click Counts (But All the Money Goes to Me)Avast
 
Google-image poisoning: How hackers use images to spread malware
Google-image poisoning: How hackers use images to spread malwareGoogle-image poisoning: How hackers use images to spread malware
Google-image poisoning: How hackers use images to spread malwareAvast
 

More from Avast (7)

Home Security Map of the World
Home Security Map of the World Home Security Map of the World
Home Security Map of the World
 
IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018 IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine Learning
 
Where There's Money, There's Crime: Web-based Threats
Where There's Money, There's Crime: Web-based ThreatsWhere There's Money, There's Crime: Web-based Threats
Where There's Money, There's Crime: Web-based Threats
 
Korean Banks Under Pressure
Korean Banks Under PressureKorean Banks Under Pressure
Korean Banks Under Pressure
 
Every Click Counts (But All the Money Goes to Me)
Every Click Counts (But All the Money Goes to Me)Every Click Counts (But All the Money Goes to Me)
Every Click Counts (But All the Money Goes to Me)
 
Google-image poisoning: How hackers use images to spread malware
Google-image poisoning: How hackers use images to spread malwareGoogle-image poisoning: How hackers use images to spread malware
Google-image poisoning: How hackers use images to spread malware
 

Recently uploaded

Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...nilamkumrai
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 

Recently uploaded (20)

Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 

Avast Q1 Security Report 2015

  • 2. 2 AVAST THREAT REPORT 2015 Contents Executive summary 3 Stories 5 It’s called PUBLIC Wi-Fi for a reason 6 Global Wi-Fi experiment 6 Open Wi-Fi 6 Percentage of open Wi-Fi networks 6 HTTP Browsing 7 Weak encryption 7 Percent of weakly encrypted routers 7 Ransomware on steroids 8 PC Ransomware 8 Mobile Ransomware 8 Statistics 9 Threat levels by country 10 PC 10 Mobile 11 Detections 12 Domains 12 URL Detections 13 File Detections 14 Top PC detections 15 Top Mobile detections 15 Exploits 16 Operating systems 17 Most used on PC 17 Most used on Android 18 About Avast 19
  • 4. 4 EXECUTIVE SUMMARY The Avast Virus Lab analyzes, researches, and provides real-time threat intelligence based on data received daily from nearly 230 million sensors worldwide. We stream more than 250 micro- updates to active devices every day to prevent attacks. By protecting more devices than any other security provider, we have the best insight into the threat landscape. This also means we not only keep up with the latest security threats, but stay ahead of them. This translates into better protection for our customers. In Q1 2015, Avast researchers ventured out of the office and traveled to nine cities on three continents to research the security of public Wi-Fi networks. The project’s results found that users around the world are prone to Wi-Fi attacks; in Asia even more than in Europe and the U.S. In terms of threats, Romania was the most targeted country, with a 54 percent chance of users encountering PC threats. Nearly one out of every three PC users in the United States and Great Britain were targeted with PC threats. Within the mobile sphere, China was targeted the most, which is most likely due to the fact that the Google Play Store is blocked in the region. Potentially unwanted programs (PUPs) including adware dominated the top 10 Android detections. Additionally in Q1, the steady evolution of ransomware targeting mobile devices and PCs has shown that this fairly simple way for malware authors to profit remains as an invaluable and feasible option.
  • 5. 5 Stories It’s called PUBLIC Wi-Fi for a reason Ransomware on steroids AVAST THREAT REPORT 2015
  • 6. 6 Global Wi-Fi experiment Avast mobile security experts traveled to nine cities in the United States (San Francisco, Chicago, New York), Europe (Barcelona, London, Berlin), and Asia (Seoul, Hong Kong, Taipei) to observe public Wi-Fi activity. Each expert was equipped with a laptop and a Wi-Fi adapter with the ability to monitor Wi-Fi traffic in the area. For this purpose, we developed a proprietary app, monitoring the wireless traffic at 2.4 GHz frequency. It’s important to mention that there are commercial Wi-Fi monitoring apps like this available in the market that are easy-to-use and free of charge. Our observations revealed major security flaws in Wi-Fi hotspots and showed how easy it is for hackers to see browsing activity, searches, passwords, videos, emails, and other personal information. While security issues were found in all cities, the experiment showed that users in Asia are more prone to attacks than users in Europe and the U.S. Users in Berlin and San Francisco were most likely to take steps to protect their browsing. Open Wi-Fi Asian cities proved to have the most open Wi-Fi networks with an average of 42.3% of Wi-Fi networks being public, followed by the U.S. (31.7%) and Europe (28.5%). Percentage of open Wi-Fi networks 1)      Taipei: 43.6 percent 2)      Hong Kong: 42.9 percent 3)      Seoul: 40.4 percent 4)      Chicago: 39.0 percent 5)      London: 33.3 percent 6)      New York: 33.1 percent 7)      Berlin: 26.3 percent 8)      San Francisco: 24.9 percent 9)      Barcelona: 24.3 percent STORIES It’s called PUBLIC Wi-Fi for a reason
  • 7. 7 IT’S CALLED PUBLIC WI-FI FOR A REASON HTTP Browsing Our experiment also shed light on the fact that a significant portion of users browse primarily on unsecured HTTP sites while connected to open Wi-Fi networks. HTTP traffic is not encrypted and therefore unprotected, meaning that our team was able to view browsing activity, including domain name and page history, searches, personal log information, videos, emails, and comments. For example, it was possible for the Avast researchers to see products that a user browsed on eBay while not being logged in to the site as well as articles that people read on Wikipedia. Nearly half of the web traffic in Asia takes place on unprotected HTTP sites, compared with one third of U.S. traffic and roughly one quarter of European traffic. This is most likely attributed to the fact that there are more websites in Europe and the U.S. that use the HTTPS protocol. In order to improve protection, HTTPS browsing is strongly recommended to users, as it is encrypted and thus more secure. Weak encryption The majority of the Wi-Fi hotspots observed in this experiment were protected, but Avast found that often their encryption methods were weak and could be easily hacked. Using WEP encryption can be nearly as risky as forgoing password protection altogether, as users tend to feel safer entering their personal information, but their data can still be accessed. San Francisco and Berlin had the lowest percentage of weakly encrypted hotspots, while more than half of password- protected hotspots in London and New York and nearly 70 percent of Asian hotspots were vulnerable to attack. Percent of weakly encrypted routers 1)      Seoul: 70.1 percent 2)      Taipei: 70.0 percent 3)      Hong Kong: 68.5 percent 4)      London: 54.5 percent 5)      New York: 54.4 percent 6)      Chicago: 45.9 percent 7)      Barcelona: 39.5 percent 8)      Berlin: 35.1 percent 9)      San Francisco: 30.1 percent
  • 8. 8 STORIES Ransomware on steroids During Q1, we saw both PC and mobile ransomware evolve. Ransomware is a term for applications that lock your device or files and then demand a ransom payment for the unlock key. PC Ransomware CryptoWall, which originally appeared in November 2013, made its second comeback in January as CryptoWall 3.0. CryptoWall is typically distributed through drive-by download attacks by exploiting outdated vulnerabilities, via spam campaigns, or through malware that has already been installed on a compromised system. When executed, the ransomware searches for files with specific extensions, such as images, documents, and source code-files that are important to most users. The ransomware encrypts the files with a strong cipher (RSA 2048) and demands a ransom payment from the victim to decrypt the files. The ransom is typically around five hundred U.S. dollars and is paid in BitCoin to ensure anonymity. Once the payment is made, instructions to decrypt the files are sent to the victim. The latest version of CrytpoWall differed from the second version in that it switched from using TOR to using I2P (Invisible Internet Project) to communicate with the command and control (C&C) server. This switch was most likely caused by the fact that TOR is now well known and can be blocked by network admins, whereas I2P is a lesser-known anonymization network. The original version of CryptoWall did not feature anonymization networks. Additionally, a variant of ransomware called TeslaCrypt targeted gamers of more than 20 different games, including World of Warcraft, League of Legends and Call of Duty. Mobile Ransomware Simplocker is mobile ransomware that first appeared in June 2014, infecting more than 20,000 unique users. Simplocker reappeared in February 2015, emerging in a form more sophisticated than its first. The new variant of Simplocker uses asymmetrical cryptography, making it impossible to recover encrypted data without accessing the C&C server.
  • 9. 9 Statistics Threat levels by country Detections Exploits Operating Systems AVAST THREAT REPORT 2015
  • 10. 10 STATISTICS Threat levels by country The threat levels by country vary greatly between PC and mobile. Romanians have the greatest chance of encountering a PC infection. However on the mobile side, Chinese are the most targeted. We are not very surprised to see that China is highly targeted with mobile threats – according to the official China Internet Network Information Center, 83 percent (527 million) of China’s Internet users access the Internet via a mobile device. PC Hackers targeted Romania, Turkey and Vietnam more than any other countries with PC malware in Q1. Romania was targeted the most, with a 54 percent chance of encountering an infection. The threat levels for Avast’s biggest markets were much lower than this, yet still significant: 41 percent Russia 37 percent Spain 34 percent Brazil and France 29 percent Germany 28 percent United States and United Kingdom Figure 1 depicts the PC threat levels of each country. The threat level indicates the percentage of devices that have encountered an infection in Q1. PC Threat Levels by Country FIGURE 1 - PC Threat Levels by Country Romania Vietnam Turkey Pakistan China Cambodia Philippines S. Korea Ukraine United Arab Emirates Kazakhstan Qatar Serbia Armenia Thailand 0 - 25 % 25 - 30 % 30 - 40 % 40 - 45 % 45 - 100 % 0 19 38 57
  • 11. 11 THREAT LEVELS BY COUNTRY Mobile China, Romania, and Malaysia reported the most encountered mobile infections. This is likely due to the popularity of third-party app stores in these countries, especially in China, where the Google Play Store is blocked. The threat levels for Avast’s biggest markets were much lower: 21 percent Russia 16 percent Spain 12 percent United States 10 percent Brazil 8 percent France and United Kingdom 6 percent Germany Figure 2 depicts the mobile threat levels of each country. The threat level indicates the percentage of devices that have encountered an infection in Q1. Mobile Threat Levels by Country FIGURE 2 - Mobile Threat Levels by Country 0 23 46 69 0 - 10 % 10 - 20 % 20 - 30 % 30 - 40 % 40 - 100 % China Malaysia Romania India Hong Kong Iraq Vietnam Yemen Iran Mozambique Ethiopia Taiwan Pakistan Oman Sri Lanka
  • 12. 12 STATISTICS Detections Nearly 230 million people worldwide use Avast products, allowing us to stay ahead of the curve, as users act as sensors that automatically send malware and suspicious file activity to our virus lab for detailed analysis. As a result of our feedback loop, the Avast Cloud engine is constantly updated with the latest threats, providing users with real-time protection. We call this global sensor network our Community IQ. Domains Figure 3 shows the number of infected subdomains belonging to top-level domain names that were reported in Q1. Most reports came from .com domains, which is due to the number of infected subdomains. One of the reasons why this number is so large is that malware authors use a technique called domain rotation to avoid domain blacklisting. Domain rotation regularly creates new domains and subdomains and redirects malicious traffic to them, exploiting the fact that it takes time for antivirus software to find these new domains, check them and release new detections, if necessary. Avast uses advanced algorithms to recognize domain rotations and immediately blocks infected subdomains before they can cause any harm. Top 15 Top TLD by number of reports FIGURE 3 - Top 15 TLD by Number of Reports 1250 1000 750 500 250 0 .com .info .net .biz .org .in .ru .il .us .me .co .su .eu .country .cn Numberofreports inthousands
  • 13. 13 DETECTIONS URL Detections The Avast Web Shield protects Internet- connected devices from malicious software while browsing the web and downloading files. While the user surfs online, Avast detects and blocks known and potential threats, such as hacked web pages and pages containing malicious scripts. Figure 4 shows the number of unique users Avast protected from web-based malware in Q1. The Avast Virus Lab receives more than 300,000 samples of new potential viruses every day. We verify these potential viruses and when confirmed as malicious, we add them to our virus database. Due to the high number of samples we receive, false positives can occasionally occur. There is no way to avoid false positives completely, but we do our best to avoid them at all costs and to limit their impact. The peak on January 25 that can be seen in Figure 4 was caused when an e-shop was wrongly detected as malicious. The detection was disabled after a few hours. Number of users per day who encountered malicious URLs (Web Shield) FIGURE 4 - Number of users per day who encountered malicious URLs (Web Shield) January February March 5 M 3 M 2 M 1 M 0 4 M
  • 14. 14 DETECTIONS File Detections The Avast File Shield checks all programs the moment they are started and checks other files as soon as they are opened, as well as files downloaded using file sharing programs and files received over chat and instant messaging programs. Figure 5 shows the number of unique users we protected in Q1 using File Shield. Apart from the seasonal and weekly fluctuations, there is just one major peak in February that was caused by a new version of a PUP. Number of users per day who encountered malicious files (File Shield) FIGURE 5 - Number of users per day who encountered malicious files (File Shield) January February March 5 M 3 M 2 M 1 M 0 M4
  • 15. 15 DETECTIONS Top PC detections The top 10 Windows PC detections reported were dominated by LNK detections. LNK files are used to create shortcuts that typically point to an executable file or script. The LNK files appear on your computer desktop as an icon, which is convenient for programs you frequently use. However, malware authors abuse LNK files to trick people into using malicious shortcuts. Top Mobile detections Mobile malware continued to grow dramatically, but Android is still fairly secure due to Google Play app restrictions and security. The top 10 Android detections for Q1 consist mainly of PUPs, which include aggressive in-app advertising. App developers monetize their apps by displaying ads, but ad libraries can be abused and some leak personal data or bombard users with ads outside of the app. The top two Trojans in the top 10 detections were capable of sending premium SMS, which was mainly targeted at Western European and Asian mobile users as carriers in these areas allow premium-rate SMS billing. Top 10 PC detections FIGURE 6 - Top 10 PC detections Top 10 Android detections FIGURE 7 - Top 10 Android detections LNK:Starter - B [Trj] LNK:Starter - C [Trj] LNK:Jenxcus - L [Trj] LNK:Jenxcus - D [Trj] LNK:Cantix - A [Trj] LNK:Starter - A [Trj] Win32:Rambit - G Win32:Sanity Win32:Rambit - CC [Trj] LNK:Jenxcus - C [Trj] Number of reports in millions 200150100500 Number of reports in thousands Android:NineApps - A [PUP] Android:Cooee - M [PUP] Android:SMSAgent - AHY [Trj] Android:Cooee - S [PUP] Android:SMSreg - BRA [PUP] Android:KingRoot - J [PUP] Android:SMSreg - BRN [PUP] Android:KingRoot - G [PUP] Android:SecApkPackager - B [PUP] Android:Agent - GWT [Trj] 10007505002500 1250
  • 16. 16 STATISTICS Exploits Exploits are an ever-present problem in computer security. Faults in application design or code can be exploited and are therefore security threats. Hackers target vulnerabilities in frequently used software and devices because it gives them a good chance of infecting a large numbers of users at once. Applications that hackers often target are browsers, Java, Adobe’s Acrobat Reader, and office suites such as Microsoft office. In January and February, we saw a large amount of JavaScript exploits. Two of the biggest security vulnerabilities that were exploited in Q1 were CVE-2013-2551 and CVE-2013-3882. CVE-2013-2551 targets JavaScript and can lead to remote code execution in Internet Explorer versions 6 to 10. CVE-2013-3882, on the other hand, targets an HTML parser in Internet Explorer 10 and if successful, the attack can lead to remote code execution. If the attack doesn’t succeed, it can cause a denial of service. The malware families from March in the “Other” chart in Figure 8 are mainly document macro exploits of vulnerability CVE-2006-2492 that use a buffer overflow attack and MIDI vulnerability CVE-2012-0003, which allows remote code execution via a crafted MIDI audio file. Exploit types FIGURE 8 - Exploit types JS January February March 30 % 20 % 10 % 0 % HTML JAVAOTHER SWF XLS DOC PDF VBS January February March January February March January February March January February March January February March January February March January February March January February March
  • 17. 17 STATISTICS Operating systems Most used on PC Within the Avast user base, we have seen a decline in Windows XP and Windows 8.0 in favor of Windows 8.1. Although official support of Windows XP ended almost a year ago, Avast continues to support the more than 10 percent of users using Windows XP. Windows 7 continued to be the most popular PC operating system, with 60 percent of Avast users using the OS. Windows Adoption Rate FIGURE 9 - Windows Adoption Rate January February March January February March April May June July August September October November December 20152014 75 % 50 % 25 % 0 % Win 8.1 Win 8 Win 7 Win Vista Win XP
  • 18. 18 OPERATING SYSTEMS Most used on Android Our mobile users’ operating systems are much more diverse than PC operating systems. Many Android users do not use the latest version of the operating system, which can be attributed to one of two reasons. The first reason is that some vendors stick to older OS versions to ensure compatibility with their specific system tweaks, like custom user interfaces in Samsung’s TouchWiz or system applications like calendars and dialers. The second reason is that not all older phones are capable of supporting newer operating systems due to lack of memory or computational power. Within the Avast user base, six percent of users still use Gingerbread (2.3), which was followed by Ice Cream Sandwich (4.0) in October 2011. We are happy to see that versions older than KitKat (4.4) are slowly but steadily decreasing in favor of KitKat (4.4) and Lollipop (5.0). The more up-to-date the operating system, the safer it is, as security bugs are corrected with every version. Android adoption Rate FIGURE 10 - Android adoption Rate January February March January February March April May June July August September October November December 20152014 75 % 50 % 25 % 0 % Unknown 5.0 4.4 4.3 4.2 4.1 4.0 2.3 2.2
  • 20. 20 ABOUT AVAST Avast Software (www.avast.com), maker of the most trusted mobile and PC security in the world, protects 230 million people, mobile devices, and computers with its security applications. In business for over 25 years, Avast is one of the pioneers in the computer security business, with a portfolio that includes free antivirus for PC, Mac, and Android, to premium suites and services for both consumers and business. In addition to being top-ranked by consumers on popular download portals worldwide, Avast is certified by, among others, VB100, AV-Comparatives, AV-Test, OPSWAT, ICSA Labs, and West Coast Labs.