According to a report issued for the second quarter of 2015 by the Quick Heal, a significant increase in malware on the Windows platform has been noticed. Main reasons for this are mostly the unpatched OS and ineffective antivirus solution that are present on the personal computers of users all over the world.

Another thing that came out of this report is the fact that 64-bit machines have proportionally fewer malware detections than what the 32-bit machines have, so if you’re looking to buy a new machine, you should definitely consider going for the 64-bit option.

Let’s see some other key findings on the Quick Heal Threat Report for Q2 of 2015.
Around 65 million malware samples per month where detected by Quick Heal (on Windows platform).

  • 74% of the detected malware was on 32-bit machines (most malware were not supported on 64-bit platform).
  • In this quarter (second of 2015) most of the detected malware were in the Trojan category.
  • 26% of the total detected malware was LNK.Exploit.Gen
  • Malvertising and Adware remained the top attack vectors for malicious software.
  • New POS (Point of Sale) malware threats stealing credit card information from POS terminals were detected.
  • The banking sector is what has caught the attention of the threat authors and expected attack methods to be used are: Social engineering, phishing emails and remote access control for ATMs.

Which are the trends on windows malware, expected for the next months?

One (very profitable) business model used by attackers is the Ransomware. While new malware of this type are being developed, variants of old Ransomware should also be expected. Ransomware developers will target industry sectors like healthcare, banking and education.

This is expected to continue as an effective infection vector. Javascript files and other tricks are expected to be used by ransomware samples like Cryptowall and Crypvault with the purpose of evading detection from security software.

The malware developers are closely monitoring the Internet browsing habits of users with the intent to send them personalized ads that contain malware, enabling them to get access to personal data and other information.

The banking sector is considered to be a home for money, so this has led malware developers to move their attention to it. The machines are expected to be attacked by more sophisticated types of malware families using phishing emails and social engineering as carriers for the delivery of banking malware. Sensitive card data may be led to exposure by using remote control tools for ATMs.

Leave a comment

Your email address will not be published. Required fields are marked *