Malicious files: 20,000 more units per day in 2021

By Linea EDP editorial team 12/14/2021 The 5.7% increase in malicious files per day compared to 2020 reflects the increased number of devices used around the world

Over the past 12 months, Kaspersky's detection systems have averaged 380,000 new malicious files per day, which is 20,000 more than the previous year. Most threats (91%) were spread through WindowsPE files, a file format specific to Windows operating systems. However, in 2021, cybercriminals began to carry more and more threats associated with the Linux operating system. As a result, the number of Linux malware and unwanted software detected grew by 57%. More than half (54%) of the threats detected by Kaspersky systems in the Statistics of the Year report, which is part of the Kaspersky Security Bulletin (KSB), included unspecified Trojans. Although a decrease in the volume of different types of threats was observed in comparison to 2020, Trojan Droppers grew by 2.24% in 2021 compared to the previous year. These types of malware are particularly dangerous as they are programs designed to deliver other, more sophisticated malware to the victim's device. The number of worms also increased significantly (117.5%) and their share reached 9% of the total threats detected. These programs, after breaking into the system, can self-replicate and propagate themselves. Finally, viruses grew by 27%, making up 10% of the threats observed. As pointed out in an official note by Giampaolo Dedola, Senior Security Researcher at Kaspersky's GReAT: "During 2021 we identified 20,000 more malicious files per day than in the previous year. This is a rather predictable scenario, since following the adoption of remote work around the world, online activities have multiplied. In addition, the number of devices used has also increased globally, resulting in a widening of the attack surface exposed to threats. Therefore, it is extremely important for today's users to improve their digital literacy and keep their security solutions up-to-date ». To protect themselves from cyber threats, Kaspersky recommends home users: • Do not download and install applications from untrusted sources • Do not click on links from unknown sources or suspicious online advertisements • Create complex and unique passwords that contain a mix of letters lowercase and uppercase letters, numbers and punctuation and activate two-factor authentication • Always install updates. Some may correct critical security issues • Ignore the messages that ask you to disable office security systems or cybersecurity software • Use a security solution that is reliable and suitable for the type of system it is installed on and the devices in use, such as Kaspersky Internet Security or Kaspersky Security Cloud, capable of reporting dangerous sites and offering protection against malware. For the protection of companies, he also recommends: • Always keep the software up to date on all devices in use to prevent attackers from infiltrating the network by exploiting vulnerabilities • Establish a policy on the use of complex passwords to access company services. Use multi-factor authentication to access services remotely • Choose a reliable endpoint security solution, such as Kaspersky Endpoint Security for Business, featuring behavior-based detection and anomaly checking for effective protection against known and unknown threats • Use a set of specific products for endpoint protection and threat detection and response to promptly detect and intervene even in the event of new and evasive threats. Kaspersky Optimum Framework includes the essential set of endpoint protection enhanced with EDR and MDR.

ARTICLE FILE DAN COMMENT

Passwords must be replaced with the corresponding HASH function, which is known to be non-reversible. You must have a paper manual in which the password and the corresponding HASH function are written. in the various databases the password is replaced with the corresponding HASH function. First check that your PC is clean of malware because the password could be stolen even when the HASH function is generated. See technical notes on cryptography bases.