Skip to main content

Symnantec: Malware Tops 1 Million

Symnantec: Malware Tops 1 Million

In its bi-annual Internet Security Threat Report (PDF), antivirus vendor Symantec says that it had identified over 1.1 million malicious code threats by the end of the 2007—and that almost two thirds of them were created during 2007. Symantec attributes the rapid rise in the number of malware programs to attackers’ explosive introductions of new Trojan programs, which pretend to be something useful or interesting while secretively installing spyware, key loggers, or taking over a user’s computer.

Malware writers typically spin out hundreds of variants on their programs to evade antivirus packages, and often the initial Trojans are just “beachheads” designed to download additional malware once installed. Thus, malware writers only have to modify their initial attack vectors, and can recycle their real payloads across many different programs.

Symantec says the increase in new threats during 2007 also reflects a growing professionalism among malware developers, and the sophistication of organizations employing them. “It is vital that end users and enterprises maintain the most current antivirus definitions to protect against the high quantity of rapidly launched new malicious code threats,” Symantec wrote.

Needless to say, the vast majority of new threats target Microsoft Windows and widely distributed Windows applications. However, Symantec also noted an increase in attacks and exploitation of zero-day vulnerabilities in regionalized programs, particularly in the Chinese and Japanese markets. Where attackers still go after common applications like Internet Explorer and Microsoft Office, they’re also targeting applicaitons like ustSystem Ichitaro, Lhaz, GlobalLink, SSReader Ultra Star Reader, and Xunlei’s Web Thunder.

Symantec also found that the United States accounted for 31 percent of all malicious activity during the second half of 2007 (up a bit from 30 percent in the first half of the year) and the U.S. was the origin of 24 percent of online attacks during the second half of the year. The U.S. also had the most bot-infected computers (14 percent of the world’s total), and the U.S. remained the top country for hosting known “underground economy” servers, accounting for 22 percent of the world’s total. However, computers with IP addresses registered to Italy’s Telecom Italia accounted for six percent of all malicious activity in the world, Madrid ranked as the city with the most bot-infected computers per capita (accounting for 3 percent of the world’s total), and Peru had the highest proportion of malicious activity per broadband subscriber.

Editors' Recommendations

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
The best tablets in 2024: top 11 tablets you can buy now
Disney+ app on the iPad Air 5.

As much as we love having the best smartphones in our pockets, there are times when those small screens don't cut it and we just need a larger display. That's when you turn to a tablet, which is great for being productive on the go and can be a awesome way to unwind and relax too. While the tablet market really took off after the iPad, it has grown to be quite diverse with a huge variety of products — from great budget options to powerhouses for professionals.

We've tried out a lot of tablets here at Digital Trends, from the workhorses for pros to tablets that are made for kids and even seniors -- there's a tablet for every person and every budget. For most people, though, we think Apple's iPad Air is the best overall tablet — especially if you're already invested in the Apple ecosystem. But if you're not an Apple user, that's fine too; there are plenty of other great options that you'll find in this roundup.

Read more
How to delete a file from Google Drive on desktop and mobile
Google Drive in Chrome on a MacBook.

Google Drive is an excellent cloud storage solution that can be accessed from numerous devices. Whether you do most of your Google Drive uploading or downloading from a PC, Chromebook, or mobile device, there’s going to come a time when you’ll need to delete a file (or two). Fortunately, the deletion process couldn’t be more straightforward. We’ve also put together this helpful guide to show you how to trash your Drive content a couple of different ways.

Read more
Windows 11 might nag you about AI requirements soon
Copilot on a laptop on a desk.

After recent reports of new hardware requirements for the upcoming Windows 11 24H2 update, it is evident that Microsoft is gearing up to introduce a bunch of new AI features. A new report now suggests that the company is working on adding new code to the operating system to alert users if they fail to match the minimum requirements to run AI-based applications.

According to Albacore on X (formerly known as Twitter), systems that do not meet the requirements will display a warning message in the form of a watermark. After digging into the latest Windows 11 Insider Build 26200, he came across requirements coded in the operating system for an upcoming AI File Explorer feature. The minimum requirement includes an ARM64 processor, 16GB of memory, 225GB of total storage, and a Qualcomm Snapdragon X Elite NPU.

Read more