April 15, 2016 By Larry Loeb 2 min read

Symantec’s new “2016 Internet Security Threat Report” summarized some troubling trends that affect the security of computer users on networks.

In the 80-page report, the firm discovered a total of more than 430 million unique pieces of malware in 2015, up 36 percent from 2014. A new zero-day vulnerability was discovered, on average, once each week in 2015. Symantec puts the cumulative number at 54, which is a 125 percent increase from the year before.

Zero-Day Vulnerabilities on the Rise

Attack groups exploit these zero-day vulnerabilities until they are publicly exposed, at which point they drop them in favor of other newly discovered vulnerabilities, according to Symantec. The report noted the hunt for zero-day exploits is being professionalized rather than executed by lone cybercriminals.

Symantec also found the most attractive target is widely used software such as Internet Explorer and Adobe Flash Player. In fact, the report said four of the five most exploited zero-day vulnerabilities in 2015 were in Flash.

Microsoft was also a popular target for malicious zero-day developers. The top 10 zero-day vulnerabilities found targeting MS software were distributed across Microsoft Windows (6), Internet Explorer (2) and Microsoft Office (2). Four other zero-day vulnerabilities focused on Android software.

Website Vulnerabilities

It’s not just zero-day attacks that cause problems. The threat report found that more than 75 percent of all legitimate websites have unpatched vulnerabilities that can be exploited.

More seriously, 15 percent of legitimate websites have critical vulnerabilities that allow cybercriminals to gain access to and manipulate these sites for their own purposes. Symantec attributed this to website administrators failing to secure their websites through the application of manufacturers’ patches.

Malware may also use site plugins as an infection vector. Windows obviously attracts many exploits because of its large user base, and the same applies to WordPress plugins. WordPress is estimated to power one-fourth of the world’s websites, and Symantec stated that “vulnerable plugins found on WordPress sites can and will be exploited.”

Nondisclosure by Victims

One trend causing worry among experts is companies choosing not to report the records they lost in a breach. This number rose by 85 percent, from 61 to 113.

“More and more companies aren’t actually revealing what was breached,” Kevin Haley, director of security response at Symantec, told CSO Online. “They will say attackers came and stole from us, but [are] not saying how many records were lost.”

Not all companies have to disclose all the details of every breach, he explained. The disclosure laws vary by location and industry.

Companies affected by a breach may worry that such acknowledgment will only inflame those whose records were breached, but disclosure is necessary to regain trust. There will never be effective security through obscurity. Only an open policy of dealing with all the effects of a breach can bring stability to a bad situation.

More from

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Quishing: A growing threat hiding in plain sight

4 min read - Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.However, legitimate organizations aren’t the only ones…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today