Malware

New ransomware variants, potentially unwanted apps disguised as software updates, and Java and Microsoft Office vulnerabilities pose new challenges.

Malware samples hit 340,165,702 in Q1 2016, significantly surpassing the malware-detection samples from the same period in 2015.

Trojans (26%), infectors (21%), worms (15%) and exploits (1.5%) all have near constant detection rates in January, February and March.

Adware and potentially unwanted applications (PUAs), combined, remained constant at about 34% for malware detection. Big threats come from potentially unwanted applications disguised as software updates, while adware samples now focus more on attacking network resources, such as Domain Name System settings, hijacking proxies and disabling the auto update feature on Web browsers.

Object linking and embedding (OLE) and rich text file (RTF) format related vulnerabilities contributed to 80% of malware detection, compared to 13.5% for Java vulnerabilities.

More than nine in 10 (92%) of the top exploits in Q1 2016 are attributed to Microsoft Office (76%) and Java (16%) vulnerabilities.

Nuclear (40%) and Angler (36%) were the dominant exploit kits in Q1 2016, followed by Rig (17%).

178 new malware families and 275 new variants affecting the Android platform were detected in Q1 2016. This translates into a 13% increase in the number of new malware families and a 30% increase in new variants compared to Q1 2015.

Android Adware samples showed a 42% increase in Q1 2016, compared with a 59% increase in Q1 2015.

In Q1 2016, four new ransomware variants were detected that target Android devices, including old and new families. Ten families of mobile banking Trojans also were detected, including new variants of existing families, compared to 21 in 2015.

More than 20,000 Android malware samples were detected on a daily basis, up 38 percent from Q1 2015.