Cyber criminals attack users with 400,000 new malicious files daily over the past 10 months, which is 5% more than in 2021, a global cybersecurity and digital privacy company, Kaspersky report has noted.
By comparison, about 380,000 of these files were detected every day in 2021.
In total, Kaspersky’s systems detected approximately 122 million malicious files in 2022, 6 million more than last year.
“In 2022, Kaspersky’s detection systems discovered on average 400,000 malicious files distributed every day, indicating a 5% growth compared to 2021,” said the firm in the findings via Kaspersky Security Bulletin (KSB) – an annual series of predictions and analytical reports on key shifts within the cybersecurity world.
The report also indicated that there was a 181% increase in the proportion of ransomware detected daily.
“Ransomware encountered daily increased by 181% compared to 2021, reaching 9,500 encrypting files per day,” the report stated.
Also, among the threats was a 142% growth in the share of Downloaders, malicious programs that install new versions of malware, or unwanted applications on infected devices.
The report stated that Windows was targeted more in these attacks compared to other platforms with an average of nearly 320,000 malicious files attacking the devices.
” Out of all malicious files spread, 85% of them targeted Windows. However, Windows is not the only popular platform for attackers. This year, Kaspersky’s detection systems also discovered that the share of malicious files in Microsoft Office formats distributed daily doubled (236% of growth).”
Also, Kaspersky indicated a 10% increase in the share of malicious files targeting the Android platform every day.
Head of anti-malware research at Kaspersky, Vladimir Kuskov said next year is likely to have more attacks, considering how quickly the threat landscape is expanding its boundaries and the number of new devices appearing in users’ daily lives.
He added that it is even more dangerous that, with the development of Malware-as-a-Service, any novice fraudster can now attack devices without any technical knowledge of programming.
“Becoming a cybercriminal has never been so easy. It is essential not only for large organizations but also for every ordinary user to employ reliable security solutions, thus avoiding falling a victim to cybercriminals. Kaspersky experts, in turn, will do their best to protect against these threats and save users from losses so that their daily online experience is completely safe,” he said.
To stay protected, Kaspersky recommends users the following:
Do not download and install applications from untrusted sources.
Do not click on any links from unknown sources or suspicious online advertisements.
Create strong and unique passwords, including a mix of lower-case and upper-case letters, numbers, and punctuation, as well as activate two-factor authentication.
Always install updates. Some of them may contain critical security issue fixes.
Ignore messages asking to disable security systems for office or cybersecurity software.
Use a robust security solution appropriate to your system type and devices, such as Kaspersky Internet Security or Kaspersky Security Cloud. It will tell you which sites shouldn’t be open and protect you from malware.
To stay safe, Kaspersky recommends organizations:
Always keep software updated on all the devices you use to prevent attackers from infiltrating your network by exploiting vulnerabilities.
Establish the practice of using strong passwords to access corporate services. Use multi-factor authentication for access to remote services.
Choose a proven endpoint security solution such as Kaspersky Endpoint Security for Business that is equipped with behavior-based detection and anomaly control capabilities for effective protection against known and unknown threats.
Use a dedicated set for effective endpoint protection, threat detection and response products to timely detect and remediate even new and evasive threats. Kaspersky Optimum Security is the essential set of endpoint protection empowered with EDR and MDR.
Use the latest Threat Intelligence information to stay aware of actual TTPs used by threat actors.