June 8, 2015 By Shane Schick 2 min read

The rise of smartphones, tablets and other mobile devices may make it seem like they’re the primary target for cybercriminals, but the recent “PandaLabs Report Q1 2015” from Panda Security shows that close to 40 percent of desktop PCs have some form of malware.

Tracking global infection rates for the first quarter of this year, the PandaLabs report showed considerably high instances of malware in many parts of Europe, though it was China that ranked No. 1 worldwide. Overall, the report showed that Trojans made up 76 percent of the malware, compared to a scant 1.7 percent of infections that could be attributed to viruses. In terms of overall volume, however, the research said 20 million new malware samples were introduced over the past three months.

Though the techniques by hackers obviously varied considerably, ITProPortal noted that ransomware attacks were a common theme in the first quarter, as the PandaLabs report documented specific instances targeting the oil and gas sector. Social media scams on popular sites like Facebook, meanwhile, were among the other tactics, and although the most notable stats concerned PCs, there was also mention of SMS malware on Android devices.

On the other hand, TechRadar pointed out that the report didn’t immediately correlate an organization coming into contact with malware with an actual infection. There was also data to suggest that rather than creating entirely new Trojans to steal data or do other kinds of damage, many cybercriminals were simply creating variations on malware that had already been used in other attacks.

The geographic variations in malware activity are also interesting, given some of the more recent governmental efforts to beef up data protection around the world. For example, the PandaLabs report showed the U.S. had a PC infection rate of 34.3 percent. Although this is a lot lower than China at 48 percent or even Turkey at 43 percent, it may explain why, as Infosecurity Magazine suggested, the Obama administration has been making cybersecurity an increasingly important part of its mandates.

As security firm Vigilant Software indicated in a blog post, the only thing organizations can do at this point is keep an eye out for the kind of malware detailed in the report and do their own self-evaluation of how at-risk they may be. Based on this data, there’s a slim chance companies have nothing to worry about.

More from

AI decision-making: Where do businesses draw the line?

4 min read - "A computer can never be held accountable, therefore a computer must never make a management decision."- IBM Training Manual, 1979Artificial intelligence (AI) adoption is on the rise. According to the IBM Global AI Adoption Index 2023, 42% of enterprises have actively deployed AI, and 40% are experimenting with the technology. Of those using or exploring AI, 59% have accelerated their investments and rollouts over the past two years. The result is an uptick in AI decision-making that leverages intelligent tools…

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today