Knowledge Center - Monthly Statistics

Knowledge Center
Educational Whitepapers
Monthly Statistics
Kaspersky Videos
Threatpost Spotlight
March, 2011

Contrary to our expectations, the USA did not enter the Top 5 most popular sources of spam in March. The percentage of spam distributed from the territory of this country remained practically unchanged compared to February. However, it is interesting to note the increase in malicious attacks targeting the USA. This could signify that there is a concerted effort by cybercriminals to resurrect their botnets in the USA.

March, 2011

We make regular announcements about the detection of HTML pages that cybercriminals use as part of their scams or to spread malware. The malevolent people behind such pages are constantly coming up with new ways to hide their creations from antivirus programs.

February, 2011

Spam is both an international and regional business, which means any measures to tackle it have to go beyond those of individual states. In other words, law enforcement agencies from different countries have to cooperate with each other.

February, 2011

 

February saw considerable growth in the use of Cascading Style Sheets (CSS) that contain partial data for script downloaders, a new method for spreading malware that makes it much harder for many antivirus solutions to detect malicious scripts. This method is currently being used in the majority of drive-by download attacks and allows cybercriminals to download exploits to users’ machines without those exploits being detected.

January, 2011

For spammers, December and January was a time of gradual recovery from the anti-spam and anti-botnet campaigns which had such a significant impact on their capabilities. Unfortunately, they have been quite successful at restoring their botnets and if no new incidents affect the world of spam in the near future, the volume of unsolicited messages in mail traffic could reach summer 2010 levels by spring.

January, 2011

The majority of malware will attempt to conceal its presence on users’ computers and function without the users’ knowledge, especially the more sophisticated types. Cyber fraud, however, requires the participation of users. To prevent users falling victim to the various scams out there, it’s very important that they know about them.

October, 2010
Fake archiving programs are becoming increasingly common. They are detected by Kaspersky Lab products as Hoax.Win32.ArchSMS. Once this program launches, the user is asked to send one or more SMSs to a premium-rate number so they can access the contents of an archive. In most cases after a message is sent, the user receives instructions on how to use a torrent tracker and/or a link to it
September, 2010
In this security bulletin you will learn about spam trends and new distribution methods being employed by spammers. You'll also learn about the new techniques and tactics being employed to scam online users.
August, 2010
There was a significant increase in exploits of the CVE-2010-2568 vulnerability. Worm.Win32.Stuxnet, which notoriously surfaced in late July, targets this vulnerability, as does the Trojan-Dropper program which installs the latest variant of the Sality virus – Virus.Win32.Sality.ag.
August, 2010
In this security bulletin you will learn about spam trends and new distribution methods being employed by spammers. You'll also learn about the new techniques and tactics being employed to scam online users.
July, 2010
In this security bulletin you will learn about spam trends and new distribution methods being employed by spammers. You'll also learn about the new techniques and tactics being employed to scam online users.
July, 2010
The Top Twenty list this month shows malware, adware and potentially unwanted programs that were detected and neutralized by the on-access scanner when they were accessed for the first time.
June, 2010
At least 50,000 removable devices fell victim to infection by the two new variants of Trojan.Win32.Autorun that currently occupy eighteenth and twentieth place in our first Top 20.
June, 2010
In this security bulletin you will learn about spam trends and new distribution methods being employed by spammers. You'll also learn about the new techniques and tactics being employed to scam online users.
June, 2010
In this security bulletin you will learn about spam trends and new distribution methods being employed by spammers. You'll also learn about the new techniques and tactics being employed to scam online users.