Your one-stop web resource providing safety and security information to manufacturers

After analyzing the malware and online threats last year, SonicWALL security researchers found Tuesday is the most threat-heavy day of the week.

Monday was a close second. The theory is Tuesday is a big malware day because of Microsoft’s Patch Tuesday.

SonicWALL researchers noticed this pattern for China, India, Mexico, South Africa, Taiwan, Turkey, the United States, and several European countries, according to the company’s end-of-year cyber-security summary based on analysis of data collected by the SonicWALL Global Response Intelligent Defense Network during 2010.

The data, collected by “millions” of SonicWALL anti-spam and email security sensors, is broken out geographically and includes information of more than 30 countries, the company said.

Cyber Security

Among the findings:

• The most active time for threat-related traffic in the United States is between the hours of 10 a.m. and 11 a.m., Pacific Time.
• China and Taiwan top the list as the most heavily hit countries for worldwide threat-related traffic. Taiwan, New Zealand and South Africa are the countries most heavily hit with malware. The Netherlands, China and Taiwan lead the list for the most heavily hit countries with intrusion-related threats and multimedia threats.
• Viruses continue to infect computers and networks worldwide. Top malware threats prevalent during 2010 were Conficker worm, Bredolab Trojans, Zeus Bots, SpyEye Bots, FakeAV Trojans, Oficla Trojans, as well as malwares and Web exploit kits such as Gumblar and Phoenix.
• Trojans peak in September and December, corresponding with the proliferation of back-to-school offers and holiday greeting cards
• Worms spike in December, correlating with the winter holidays
• Malware activity in 2010 increased with the onset of the holiday season. In 2010, the amount of malware has tripled compared to 2009. Overall, it should become twice the levels seen for the same period over the previous two years.

“These findings give IT administrators insight how to best prepare their networks for the upcoming year,” said Boris Yanovsky, vice-president of software engineering at SonicWALL. “With increasing proliferation of web security threats, signatures can’t keep up – heuristics, algorithms and behavioral analysis are needed to supplement signatures with proactive analysis. In addition to new social media threats, malware threats and the proliferation of fake AV software telling people that their computers are infected, IT also needs to think through security strategies for attacks focused on the Mac computer and mobile devices in 2011.”

Pin It on Pinterest

Share This