SHARE
Facebook X Pinterest WhatsApp

Security Threat Trouble Spots That Emerged in Q1

Malware Security Threat Trouble Spots That Emerged in Q1 New ransomware variants, potentially unwanted apps disguised as software updates, and Java and Microsoft Office vulnerabilities pose new challenges. Windows Malware Stats Malware samples hit 340,165,702 in Q1 2016, significantly surpassing the malware-detection samples from the same period in 2015. Malware Trouble Spots Trojans (26%), infectors […]

Written By
thumbnail Gina Roos
Gina Roos
Jun 6, 2016
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Malware

1 - Security Threat Trouble Spots That Emerged in Q1Security Threat Trouble Spots That Emerged in Q1

New ransomware variants, potentially unwanted apps disguised as software updates, and Java and Microsoft Office vulnerabilities pose new challenges.

2 - Windows Malware StatsWindows Malware Stats

Malware samples hit 340,165,702 in Q1 2016, significantly surpassing the malware-detection samples from the same period in 2015.

3 - Malware Trouble SpotsMalware Trouble Spots

Trojans (26%), infectors (21%), worms (15%) and exploits (1.5%) all have near constant detection rates in January, February and March.

4 - Adware & PUA ThreatsAdware & PUA Threats

Adware and potentially unwanted applications (PUAs), combined, remained constant at about 34% for malware detection. Big threats come from potentially unwanted applications disguised as software updates, while adware samples now focus more on attacking network resources, such as Domain Name System settings, hijacking proxies and disabling the auto update feature on Web browsers.

5 - Top ExploitsTop Exploits

Object linking and embedding (OLE) and rich text file (RTF) format related vulnerabilities contributed to 80% of malware detection, compared to 13.5% for Java vulnerabilities.

6 - Application VulnerabilitiesApplication Vulnerabilities

More than nine in 10 (92%) of the top exploits in Q1 2016 are attributed to Microsoft Office (76%) and Java (16%) vulnerabilities.

7 - Distribution of Exploit KitsDistribution of Exploit Kits

Nuclear (40%) and Angler (36%) were the dominant exploit kits in Q1 2016, followed by Rig (17%).

8 - Growth in Android MalwareGrowth in Android Malware

178 new malware families and 275 new variants affecting the Android platform were detected in Q1 2016. This translates into a 13% increase in the number of new malware families and a 30% increase in new variants compared to Q1 2015.

9 - Drop in Android AdwareDrop in Android Adware

Android Adware samples showed a 42% increase in Q1 2016, compared with a 59% increase in Q1 2015.

10 - New Android ThreatsNew Android Threats

In Q1 2016, four new ransomware variants were detected that target Android devices, including old and new families. Ten families of mobile banking Trojans also were detected, including new variants of existing families, compared to 21 in 2015.

11 - Android Malware Samples AdvanceAndroid Malware Samples Advance

More than 20,000 Android malware samples were detected on a daily basis, up 38 percent from Q1 2015.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA
Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.