
When new Adobe Flash Player vulnerabilities were discovered, developers of various exploit packs were quick to respond by adding new exploits to their products. In addition, cybercriminals used the information about unknown Flash Player vulnerabilities that became public as a result of the Hacking Team data breach. This can be explained by the fact that a large number of vulnerabilities were identified in the product throughout the year. In 2015, there were almost 2M attempts to steal money via online access to bank accounts #KLReport #banking TweetĮxploits for Adobe Flash Player were popular among malware writers in 2015. Exploiting Stagefright 2 pursued the same purpose, but this time using a specially crafted media file. Exploiting Stagefright vulnerabilities enabled an attacker to remotely execute arbitrary code on a device by sending a specially crafted MMS to the victim’s number. The detection of two families of critical vulnerabilities for Android was one of the more remarkable events of the year. Concealed exploit packs in Flash objects.
Used the Diffie-Hellman encryption protocol. In 2015, we saw the use of new techniques for masking exploits, shellcodes and payloads to make detecting infections and analyzing malicious code more difficult. Vulnerable applications used in cyberattacks Kaspersky Lab’s antivirus solutions detected a total of 4,000,000 unique malicious and potentially unwanted objects. 24% of web attacks neutralized by Kaspersky Lab products were carried out using malicious web resources located in the US. To carry out their attacks, cybercriminals used 6,563,145 unique hosts.
34.2% of user computers were subjected to at least one web attack over the year. Kaspersky Lab solutions repelled 798,113,087 attacks launched from online resources located all over the world. Kaspersky Lab’s web antivirus detected 121,262,075 unique malicious objects: scripts, exploits, executable files, etc. Ransomware programs were detected on 753,684 computers of unique users 179,209 computers were targeted by encryption ransomware. In 2015, there were 1,966,324 registered notifications about attempted malware infections that aimed to steal money via online access to bank accounts.
Evolution of cyber threats in the corporate sector.