{"id":32,"date":"2008-04-10T11:39:00","date_gmt":"2008-04-10T15:39:00","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/2008\/04\/10\/security-vendors-predict-malware-will-exceed-1-million-in-08\/"},"modified":"2022-12-30T11:57:23","modified_gmt":"2022-12-30T16:57:23","slug":"malware-to-exceed-1-million-in-08","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/malware-to-exceed-1-million-in-08\/","title":{"rendered":"Malware to exceed 1 Million in &#8217;08"},"content":{"rendered":"<p class=\"MsoNormal\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-101078\" title=\"Malware to exceed 1 Million in '08\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-5.jpg?resize=110%2C110&#038;ssl=1\" alt=\"Malware to exceed 1 Million in '08\" width=\"110\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-5.jpg?w=116&amp;ssl=1 116w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-5.jpg?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/>The <strong>total number of viruses will reach one million by year&#8217;s end<\/strong>, according to <strong><a href=\"https:\/\/web.archive.org\/web\/20240415214827\/https:\/\/www.sophos.com\/en-us\">Sophos<\/a><\/strong> chief technology officer Paul Ducklin in an article in <em><a href=\"https:\/\/web.archive.org\/web\/20080610175606\/http:\/\/www.pcworld.com:80\/article\/id,144181\/article.html?\" target=\"_blank\" rel=\"noopener noreferrer\">PC World<\/a>. <\/em>Most striking to me is that Ducklin claims 25 percent of unique <a title=\"Malware\" href=\"http:\/\/en.wikipedia.org\/wiki\/Malware\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">malware<\/a> have been created in the last six months of its 20-year history. That translates into 250,000 attack vectors in 6 months or nearly <strong>60 unique malware<\/strong> vectors (as defined by Sophos)<strong> an hour<\/strong>.<\/p>\n<p class=\"MsoNormal\"><a href=\"https:\/\/web.archive.org\/web\/20240415214827\/https:\/\/www.sophos.com\/en-us\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101081\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Sophos_Logo.gif?resize=100%2C41&#038;ssl=1\" alt=\"\" width=\"100\" height=\"41\" \/><\/a>Ducklin offers some hope, &#8220;<em>About 85 to 90 percent of malware families have a fix created for them almost immediately,<\/em>&#8221; which leaves over <strong>50 new attack vectors an hour<\/strong> that have to be identified, code written and updates distributed.<\/p>\n<p class=\"MsoNormal\">In the same <span style=\"font-style: italic;\">PC World<\/span> article <strong><a href=\"http:\/\/www.f-secure.com\/\">F-Secure<\/a><\/strong> Asia-Pacific vice president Jari Heinonen said it logs about 25,000 malware samples each day, the highest on record.<\/p>\n<p class=\"MsoNormal\">&#8220;<em>The total number of viruses and Trojans will pass the one million mark by the end of 2008 if this trend continues,<\/em>&#8221; Heinonen said.<\/p>\n<p class=\"MsoNormal\">Both Sopho&#8217;s\u00a0Ducklin\u00a0and\u00a0F-Secure&#8217;s Heinonen say that <strong>drive-by-downloads<\/strong> of malware, due to <strong>iframes vulnerabilities<\/strong> are growing. F-Secure&#8217;s Heinonen &#8220;<a title=\"Drive-by download\" href=\"http:\/\/en.wikipedia.org\/wiki\/Drive-by_download\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\"><em>Drive-by downloads<\/em><\/a><em> are the preferred way of spreading malware [because] they happen automatically by visiting a Website unless users have a fully patched operating system, browser, and plug-ins.<\/em>&#8220;<\/p>\n<p class=\"MsoNormal\"><a href=\"https:\/\/www.f-secure.com\/us-en\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101082\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/f-secure_logo.png?resize=99%2C101&#038;ssl=1\" alt=\"\" width=\"99\" height=\"101\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/f-secure_logo.png?resize=147%2C150&amp;ssl=1 147w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/f-secure_logo.png?w=636&amp;ssl=1 636w\" sizes=\"auto, (max-width: 99px) 100vw, 99px\" \/><\/a>Heinonen also predicts that malware will increasingly target the kernel sector through rootkits such as Mebroot, which attacks the bootstrap sector. A resurgent Mebroot was detected last month, some 15 years after the DOS-based malware was created.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"MsoNormal\"><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anti-virus vendor Sophos predicts the total number of Malware will reach one million by the end of 2008.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[2196,107,23,281],"class_list":["post-32","post","type-post","status-publish","format-standard","hentry","category-malware","tag-2196","tag-f-secure","tag-malware","tag-sophos"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":8,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/32\/revisions"}],"predecessor-version":[{"id":132596,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/32\/revisions\/132596"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=32"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=32"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}