{"id":3394,"date":"2014-12-08T18:45:07","date_gmt":"2014-12-08T18:45:07","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3394"},"modified":"2020-02-27T03:51:50","modified_gmt":"2020-02-26T16:51:50","slug":"2014-statistics-business-and-financial-cyberthreats","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/2014-statistics-business-and-financial-cyberthreats\/3394\/","title":{"rendered":"2014 statistics: business and financial cyberthreats"},"content":{"rendered":"<p>As this tumultuous year is wrapping up, <a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2014\/Kaspersky-Lab-counts-up-this-years-cyber-threats\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Lab lists the year\u2019s cyberthreats<\/a>. The numbers are appalling: 6.2 billon malicious attacks on computers and mobile devices were blocked by Kaspersky Lab antivirus products in 2014, which is 1 billion more than in 2013. This number is not surprising given the context and statistics from previous years. It doesn\u2019t spell out doom and gloom, but it does point to something interesting about awareness.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>The entire year was dominated by the \u201cultimate demise\u201d of Windows XP (which is actually <a href=\"https:\/\/business.kaspersky.com\/windows-xp-bad-things-live-on\/1914\" target=\"_blank\" rel=\"noopener nofollow\">pen-ultimate at best<\/a>), two <a href=\"https:\/\/business.kaspersky.com\/why-the-discovery-of-big-bugs-is-a-good-thing\/2695\" target=\"_blank\" rel=\"noopener nofollow\">major bugs<\/a> codenamed Heartbleed and Shellshock, and a recently revealed critical flaw in Internet Explorer <a href=\"https:\/\/business.kaspersky.com\/a-legacy-bug-in-a-legacy-code-todays-problem\/2863\" target=\"_blank\" rel=\"noopener nofollow\">that was apparently there since Windows 95<\/a>. The nearly two decades old bug received its own codename \u2013 WinShock. (If you haven\u2019t noticed by now, naming the bugs became a trend.) All of these bugs affected businesses in different ways. Heartbleed and Shellshock led to a widespread panic globally, prompting IT staffs around the world to apply a series of patches immediately.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>2014 statistics: business and financial #cyberthreats<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fu1Vq&amp;text=+2014+statistics%3A+business+and+financial+%23cyberthreats+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Also, this year was marked with loads of APT campaign disclosures, targeting all kinds of businesses, industries, and government organizations \u2013 <a href=\"https:\/\/business.kaspersky.com\/epic-turla-catching-the-reptiles-tail\/2350\" target=\"_blank\" rel=\"noopener nofollow\">Epic Turla<\/a>, <a href=\"https:\/\/business.kaspersky.com\/crouching-yeti-got-caught-anyway\/2309\" target=\"_blank\" rel=\"noopener nofollow\">Energetic Bear\/Crouching Yeti<\/a>, Sandworm\/<a href=\"https:\/\/business.kaspersky.com\/blackenergy-2-a-good-set-or-bad-deeds\/2842\" target=\"_blank\" rel=\"noopener nofollow\">BlackEnergy<\/a>, <a href=\"https:\/\/business.kaspersky.com\/the-dark-story-of-darkhotel\/2829\" target=\"_blank\" rel=\"noopener nofollow\">Darkhotel<\/a>, and Regin to name just a few. This kind of threat has gone \u201cindustrial\u201d, and there are many reasons to assume APT tactics will become commonplace among cybercriminals soon. Yet to be affected business IT staff should pay attention to this kind of threat, as it\u2019s likely they may encounter it in a matter of months.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/03\/06020305\/wide-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3396\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/03\/06020305\/wide-1.jpg\" alt=\"wide (1)\" width=\"1000\" height=\"669\"><\/a><\/p>\n<p>Let\u2019s look at other parts of the data:<\/p>\n<p>Attempts to steal money via online access to bank accounts were blocked on almost <strong>2,000,000 computers. <\/strong>Some attempts to access individuals\u2019 computers are really attempts targeting the user\u2019s company.<\/p>\n<ul>\n<li><strong>12,100 mobile banking Trojans<\/strong> were discovered this year. Nine times as many as in 2013. That\u2019s alarming. Not just because there are so many of them (actually, this number itself is quite small compared to other threats), but because of the growth rate. This rate shows that banking Trojans are a very lucrative \u2013 even if expensive \u2013 criminal tool. This is due to insufficient security on the victim\u2019s end \u2013 both corporate and individual end-users.<\/li>\n<li><strong>Zeus<\/strong> <strong>remains the most widespread banking Trojan<\/strong> with ChePro and Lohmys coming in second and third. Three quarters of the attacks targeting users\u2019 money were carried out using banking malware, although it\u2019s not the only threat of financial nature: Bitcoin wallets are also in the criminals\u2019 sights.<\/li>\n<li><strong>295,500 new mobile malicious programs, almost three times as many as in 2013<\/strong>. No surprises here either: Their numbers grew due to extremely high profit-to-effort rate for the criminals, who don\u2019t even need any real hacking skills. Sometimes they only need to buy a piece of malware and pay a spammer to distribute it. Eventually their \u201cinvestments\u201d <a href=\"https:\/\/business.kaspersky.com\/cybercrime-inc-how-profitable-is-the-business\/2930\" target=\"_blank\" rel=\"noopener nofollow\">return twenty-fold.<\/a><\/li>\n<li><strong>53% of attacks involved mobile Trojans targeting users\u2019 money<\/strong> (SMS-Trojans, banking Trojans).<\/li>\n<li><strong>19% of Android users (one in five) encountered a mobile threat<\/strong> at least once during the year.<\/li>\n<\/ul>\n<p>Yes, Android. 98% of mobile threats are targeting this OS. It\u2019s less than pleasant for the users, but it also holds the key to the malware authors\u2019 undoing. The latest versions of Android, 4.4 and 5.0, <a href=\"https:\/\/business.kaspersky.com\/security-features-in-android-5-0\/2908\" target=\"_blank\" rel=\"noopener nofollow\"> appear to be much more secure<\/a> than the older ones, so as soon as they take hold of the market, the number of security issues will most likely diminish.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Number of #cyberthreats grow, but it\u2019s #awareness that will help to beat them<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fu1Vq&amp;text=Number+of+%23cyberthreats+grow%2C+but+it%26%238217%3Bs+%23awareness+that+will+help+to+beat+them\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>All in all, the weakest point in security of both PCs and mobile devices remains the human factor. It can also be the strongest once we get into the habit of watching our backs.<\/p>\n<p>The full statistics on 2014 cyberthreats gathered by Kaspersky Lab\u2019s experts is available <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/68010\/kaspersky-security-bulletin-2014-overall-statistics-for-2014\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab has gathered stats on the cyberthreats in 2014. The figures are appalling, but they don&#8217;t spell out doom and gloom. It is all about awareness.<\/p>\n","protected":false},"author":209,"featured_media":15831,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[2247,2248,491],"class_list":{"0":"post-3394","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-2014-cyberthreats-statistics","10":"tag-cybersecurity-in-2014","11":"tag-cyberthreats"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/2014-statistics-business-and-financial-cyberthreats\/3394\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/2014-statistics-business-and-financial-cyberthreats\/3394\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/2014-statistics-business-and-financial-cyberthreats\/3394\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/2014-cyberthreats-statistics\/","name":"2014 cyberthreats statistics"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=3394"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3394\/revisions"}],"predecessor-version":[{"id":26592,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3394\/revisions\/26592"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15831"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=3394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=3394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=3394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}