Express Computer
Home  »  News  »  Over 13,000 malware threats detected every hour in 2020: Report

Over 13,000 malware threats detected every hour in 2020: Report

0 95

With new techniques targeting a completely new setup of the global enterprise, 13,733 malware threats were detected every hour in 2020, with Trojan leading the year-on-year (YoY) and quarter-on-quarter (QoQ) charts followed by other malware, a report said on Wednesday.

According to a report by Seqrite, an enterprise security solutions brand by Quick Heal Technologies, out of the total 113 million malware detections in 2020, the first quarter clocked the highest at 36 million detections, with January witnessing maximum malware attacks.

“With the advent of Covid-19, threat actors have realised how they can capitalize on this new opportunity by banking on the new vulnerabilities that have popped up due to remote working or work from home (WFH),” Himanshu Dubey, Director, QuickHeal Security Labs, said in a statement.

“Attackers are going to innovate and roll out new ways to target businesses in 2021. It is, therefore, essential for them to invest in robust cybersecurity solutions that can prevent them from being prey to the evolving threat landscape,” Dubey added.

However, the same year also recorded a drop in the number of malware attacks by 35 million compared to 2019.

But evidently, this drop is mainly associated with threats such as Adware and potentially unwanted application (PUA) that are least detrimental in nature, the report said.

Simultaneously, dangerous threats like trojan, ransomware and infector have only escalated further, primarily because of the widely adopted work from home culture.

This transition has emerged as a fresh opportunity for threat actors to bank on, making businesses more vulnerable than ever before, the report said.

In January 2020, the researchers observed new versions of conventional ransomware attacks.

For instance, double extortion, where threat actors not only encrypted but also stole enterprise data in the process. If the victim denied paying a ransom, attackers had the power to disclose all the sensitive data to the public. Therefore, in either way, the target was forced to pay money to the attackers — hence the name double extortion.

2020 also saw many crypto-mining attacks, led by names like Kings Miner (attacks the under patched servers on the Internet), Blue Mockingbird (targets public-facing servers with high configurations) and Lemon Duck Miner (a monero crypto-mining malware that converts network resources of an organization into cryptocurrency mining slaves).

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image