SHARE
Facebook X Pinterest WhatsApp

Malware Declines, but Ransomware Soars

Mar 30, 2017

Malware Declines, but Ransomware Soars

Malware Declines, but Ransomware SoarsMalware Declines, but Ransomware Soars

While security professionals succeeded in crippling malware last year, ransomware surged by a factor of 167, to reach a shocking 638 million attacks in 2016.

Point-of-Sale Malware Attacks DeclinePoint-of-Sale Malware Attacks Decline

POS malware attacks declined by 93% from 2014 to 2016. The number of new POS malware variants decreased by 88%, thanks to chip-based POS systems and the Payment Card Industry Data Security Standard.

SSL/TSL Encryption HelpedSSL/TSL Encryption Helped

Secure Sockets Layer/Transport Layer Security encrypted traffic grew 38%.
5.3 trillion web connections in 2015 grew to 7.3 trillion in 2016.
62% of web connections were SSL/TLS-encrypted.

Dominant Exploit Kits DisappearDominant Exploit Kits Disappear

In early 2016, the malware market was dominated by Angular, Nuclear and Neutrino, but they later disappeared. The remaining exploit kits fragmented into smaller versions to fill the void. By Q3 2016, there were three versions of Rig.

Exploit Kits Are Part of Ransomware DeliveryExploit Kits Are Part of Ransomware Delivery

Variants of Cerber, Locky, CrypMic, BandarChor and TeslaCrypt have become primary workloads.

There's a Huge Surge in RansomwareThere’s a Huge Surge in Ransomware

Ransomware grew by a factor of 167 since 2015, from 3.8 million to 638 million attacks. Locky was deployed in 90% of Nemucod attacks.

Ransomware Hit All IndustriesRansomware Hit All Industries

Ransomware spared no industries. Mechanical and industrial engineering received 15% of average ransomware hits, pharmaceuticals and financial services got 13%, and real estate got 12%.

IoT Compromised on Massive ScaleIoT Compromised on Massive Scale

Cyber-criminals launched the largest DDoS attacks in history using the Mirai botnet. Most of the attacks took place in the United States (70%), Brazil (14%) and India (10%).

Android Benefited Only TemporarilyAndroid Benefited Only Temporarily

Google patched vulnerabilities, but attackers used new techniques to beat them by coaxing Android users into providing permissions that allowed overlays to be used.

Cyber-Criminals Victimized App Store UsersCyber-Criminals Victimized App Store Users

Ransomware and self-installing apps plagued third-party app stores. 4,000 distinct apps with self-installing payloads appeared within two weeks.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.