Report: Average of 82,000 new malware threats per day in 2013

Targeted attacks and data breaches were the year's most popular methods according to a new report from Panda Security.

Malware has been around for more than 40 years,  but according to a report from Panda Security 20 percent of all of the malware that's ever existed was created in 2013. That's the equivalent of 30 million new malware threats in one year, or about 82,000 per day.

Given that context, you should probably consider yourself lucky your devices aren't constantly compromised. Even if you got infected by one malware attack per month, it would still mean you were spared from 99.9999 percent of all the possible new threats. Your antimalware must be doing something right.

PandaLabs found that more than seven in 10 of the new threats in 2013 were Trojans. Factoring that against the total volume of malware for the year, Panda discovered more than 21 million new Trojan variants last year. The rest of the malware threats were composed of worms (13.3 percent), viruses (8.49 percent), adware/spyware (6.93 percent), and a very miniscule number that fell into the "other" category.

Not surprisingly, the rates of actual malware compromise are similar. Trojans lead the way, accounting for nearly eight out of 10 infections in 2013. The most infected country was China with 54.03 percent of the total detected infections. It's probably not a coincidence that China also has the highest percentage of users running Windows XP.

The sheer volume of malware seems to be less of a direct concern, however, than targeted attacks and data breaches. Twitter was targeted in February 2013, followed by Facebook, Apple, and Microsoft. PandaLabs reports that all four of these major tech companies fell victim to a sophisticated attack that targeted users by exploiting an unpatched Java vulnerability.

PandaLabs singles out the breach at Adobe as one of the most heinous incidents of last year. Source code for some Adobe products was compromised, and the usernames and passwords of more than 38 million active users were exposed. Sadly, what we learned is that nearly two million accounts--about five percent of the total--used the ridiculously insecure password of "123456" despite many similar breaches in the past and the oft-repeated message from security experts to use more complex passwords. Another half million users relied on "123456789," and nearly 350,000 accounts simply used "password" as the password.

Social networks also came under fire in 2013. The Burger King Twitter account was hacked, and the attackers changed the images to McDonald's and claimed that the fast food chain had been acquired by its rival. The Twitter account of the Associated Press was also hacked, and attackers used it to send out fake news alerts claiming that bombs had been detonated at the White House and that President Obama had been injured.

PandaLabs also explored the world of mobile malware, and concluded--like every other security vendor out there--that Android is by far the primary target of mobile malware developers. Panda warns Android mobile users that they are in the crosshairs and to expect new waves of attacks and attempts to steal personal and financial data from Android devices in 2014.

For more details, check out the complete Panda Security Annual Report PandaLabs 2013 Summary.

Join the CSO newsletter!

Error: Please check your email address.

Tags securitypanda securitymobile securitymalware

More about Adobe SystemsAppleBurger KingFacebookMcDonald'sMicrosoftPandaPanda Security

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Tony Bradley

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts