- Over six million new malware samples were created in Q2 2012
- Three out of every four malware infections are caused by Trojans
- New variant of the ‘Police Virus’ emerges
- The full report is available at https://press.pandasecurity.com/press-room/reports/
PandaLabs, Panda Security’s anti-malware laboratory, today published its Quarterly Report for Q2, analyzing the IT security events and incidents from April through June 2012. In the second quarter of 2012 alone, more than six million new malware samples were created, a similar figure to the first quarter.
South Korea Tops List of Infections per Country for First Time Ever
The average number of infected PCs across the globe stands at 31.63 percent, falling almost four percentage points compared to Q1, according to Panda Security’s Collective Intelligence data. South Korea led this ranking (57.30 percent of infected PCs) for the first time ever, up by almost three percentage points compared to Q1. China took the second spot (51.94 percent), followed by Taiwan and Bolivia. The list of least infected countries is dominated by European countries with nine out of the first ten places being occupied by them, the only exception being Uruguay. The top-ranked country is Switzerland (18.40 of infected PCs), followed by Sweden (19.07 percent), the only nations with fewer than 20 percent of computers infected. Norway, United Kingdom, Uruguay, Germany, Ireland, Finland, Hungary and Holland are the other eight countries with the least malware infections.
Luis Corrons, technical director of PandaLabs, states: “The list of least infected countries is dominated by some of the world’s most technologically advanced nations, with the sole exception of South Korea. Even though there may be other factors that influence these results, there seems to be a clear connection between technological development and malware infection rates.”
Countries with the most malware infections
Trojans continued to account for most of the new threats created this quarter (78.92 percent); worms took second place, comprising 10.78 percent of samples; followed by viruses at 7.44 percent. The last place was occupied by adware/spyware at 2.69 percent
Interestingly, viruses continued their decline, moving from second place in the 2011 Annual Report (14.24 percent) to third place (7.44 percent) this quarter. Worms maintained their second position, rising from 9.30 percent last quarter to almost 11 percent this quarter.
When it comes to the number of infections caused by each malware category, Trojans once again topped the ranking, accounting for more infections than in the first quarter (76.18 percent compared to 66.30 percent). Viruses came second (7.82 percent), followed by worms (6.69 percent). “It is interesting to note that worms have only caused six percent of infections despite accounting for almost 11 percent of all new malware”, says Corrons. “The figures corroborate what is well known: massive worm epidemics have become a thing of the past and have been replaced by an increasing avalanche of banking Trojans and specimens such as the Police Virus.”
The Quarter at a Glance
In the report, PandaLabs highlights several top security incidents that occurred during Q2: the proliferation and evolution of the so-called ‘Police Virus’ from scareware to ransomware, and Flame, a cyber-espionage virus that has become one of the highlights of the year.
The report also covers the latest cases of cyber-crime, such as a hacker attack on Wikipedia users, the exploitation of a major security hole in Iran’s banking system, and the new ways found by law enforcement agencies to fight data theft. Finally, it includes information about the latest attacks on mobile phones and social networking sites, the cyber-espionage operations between nations such as the United States and Yemen, or the traditional cyber-conflict between North and South Korea.
PandaLabs advises all users to keep their computers adequately protected with a solution like Panda Security’s free Panda Cloud Antivirus.
The quarterly report can be downloaded from: https://press.pandasecurity.com/press-room/reports/
Is there a any procedure of producing above statics that you can make public?
If you can not make public this kind of procedure, nobody can belive it,
It is unbeliable that Korea top ranked in Asia, because most of Korean does not know your Active Scan Service.
We use the Collective Intelligence included on our products. Every day, Collective Intelligence receives more than 3 billion data requests from users of Panda solutions and processes more than 150,000 new files to determine whether or not they are malware. Currently, around 73,000 new, unique strains of malware appear every day. Not only we use Activescan to produce the numbers but all the products.
Another thing we should point out is that even with our Collective Intelligence technology, we are not able (as no one is) to detect a 100% of the threats out there, so probably if we would have knowledge of every malware piece and could scan all the computers in the world, the percentage would be higher.
Is there any data about the amount of money these malware infections cost the public?
I have read that only about 5% of computer infections render a profit for the creators of Malware, but at the same time I never see the end number that the malware creators turn in profit ? Compared to the amount of money that the public spends on: virus/spyware software, infection removal and cleanup.
I would llke to see the numbers ( IF THEY EXIST ) for
End user cost for virus/spyware protection yearly cost –
End User cost for cleanup from actual damages for cleanup and repair:
End User cost in lost or stolen monies:
Public Corporations of Antivirus software Companies profit or Loss as a Collective Group:
Malware / Virus / Spyware code writers or groups making money Estimated Revenue:
This to me would show the true threat collective of active malware damages, ie risk to reward variables.
I am not trying to spindle a negative view I would like to know as a person that battles daily with the end results of malware.
Thanks in advance to any response,