- Kuwait Times Extra
DUBAI: Kaspersky Lab, a developer of secure content management solution announced yesterday at Gitex Technology Week, being held in Dubai World Trade Center from the 14th until today, that the UAE tops the number of malicious programs and Egypt bears malware infections detected on hard drives and removable media in the Middle East. We counted the average number of malicious programs that have been detected and blocked per each user of Kaspersky Security Network in these countries for the third quarter of 2012. It turned out that we have blocked or removed about 17 malware per each active KSNuser. This is two times more than average for North America.
In UAE and Oman we found 22 and 18 malware per each KSN user accordingly. The lowest value in the region is in Kuwait, where we blocked 11 malicious objects per user. These very important factor is how malicious or unwanted programs infiltrate on computers in GCC countries. To do this, we analyzed how often our products detected or blocked a malicious program on users’ machines, while user was surfing the internet or was inserting removable media or just scanning his or her hard drive. So we have two main attack vectors: From web & mail and from local networks plus file/ removable drives infectors.
These statistics are based on the detection verdicts of the web antivirus module, and were provided by users of Kaspersky Lab products who gave their consent to transfer their statistical data. When calculating, we excluded those countries in which the number of Kaspersky Lab product users is relatively small (less than 10,000). The average share of internet users attacked in GCC during third quarter of 2012 was 24.4%. This means that each fourth user in GCC faced malware while surfing the internet! The over average value have Oman, Qatar and United Arab Emirates. For Saudi Arabia it is in the middle with 24.4% and it corresponds to the 81 position in the global ranking of countries on this indicator and 4th for the GCC countries. These statistics are based on the detection verdicts of the antivirus module, and were provided by users of Kaspersky Lab products who gave their consent to transfer their statistical data. When calculating, we excluded those countries in which the number of Kaspersky Lab product users is relatively small (less than 10,000).
In the case of infections, detected on hard drives of computers and removable media (flash-drives), in GCC this figure is much higher, than for Internet – 37.5%.The greatest value have Egypt 46% and Oman-43.5%, which means we found something malicious particularly on each second hard drive or removable device like usb-flashdrive in these countries. When it comes to self-propagating malware with no user interaction main factor is number of well protected computers in the country. There still a lot of computers with outdated software in the GCC region and computers with no antivirus installed and this is just perfect environment for self-propagating malware, which is really widespread here.
Top 20 malicious threats detected on the Internet in GCC region
Now let’s take a look on the malware spreading in GCC countries and Egypt. While surfing the internet most users faced malware when searching some kind of pirated content – cyber criminals use these resources to spread malware or while visiting hacked websites. In both cases cyber criminals use some kind of automatic redirection to exploits pack. Exploit packs are very commonly used in today’s drive-by attacks. An exploit pack is a set of programs that exploit vulnerabilities in legitimate software programs running on the victim machine. In other words, the exploits open a sort of back door via which malicious programs can infect the computer. Since attacks on the web take place through the browser, cybercriminals need to exploit vulnerabilities in the browser, in browser add-ons (Flash Player), or in third-party software (Java, Acrobat Reader) which is used by the browser to process content.
The main purpose of exploit packs is to download and launch executable malicious files without the user noticing. On users computers in these countries we have detected a lot of self-replicating threats like Net-worm. Win32.Kido, Virus.Win32.Sality, Worm.Win32.Mabezat and several Trojandown loaders. All such threats form a huge botnets that a used for “delivering” different kind of malware on users’ computers. Most likely it would be a Trojan-Banker programs that are designed to steal user account data relating to online banking systems, e-payment systems and plastic card systems.
The data is then transmitted to the malicious user controlling the Trojan. Also such botnets deliver spam, ddos and proxy-bots that are used by cybercriminals to send spam, organize ddosattacks and hide their activity. As we can see most attacks nowadays are launched using exploits that take advantage of software errors. Which apps are most susceptible to exploits in GCC countries and Egypt? Users’ should install updates for these programs – or even better yet, allow automatic updates for these programs. More effective way to defend against exploits is to use modern internet security solution which has automatic exploit protection system.
By Islam Al-Sharaa
Read by 962