Malware count blows past 1M mark

Nearly two-thirds of all the threats that Symantec has ever uncovered were found last year

Symantec's malware tally topped 1 million for the first time in the second half of 2007 as the number of new malicious code threats skyrocketed, the company said in its semiannual report on the state of security.

Of the 1.1 million code threats that Symantec has detected since it began writing signatures more than a quarter-century ago, 711,912 were discovered in 2007; 499,811 were picked up in the last six months of the year alone.

In other words, nearly two-thirds of all the threats that Symantec has ever uncovered were found last year.

Symantec credited the explosion in threats to a shift to specialization by malware makers and the existence of well-oiled -- and well-financed -- organizations that hire those programmers to write exploits and craft attacks.

"This [six-month] reporting period has seen the strongest evidence yet of this," said Ben Greenbaum, a senior research manager with Symantec's security response team. He ticked off a slew of traits now common in the malware industry, from the development of what he called "crime management kits" to proof that hackers work in a market-driven economy where threats are the coin of the realm.

"Some organizations only handle one part of the phishing process," Greenbaum said, giving an example of the specialization that's taken place. "For other parts, [those hackers] can outsource the work."

The specialization and organization, Symantec argued in its Internet Security Threat Report, mean that crimeware benefits from economies-of-scale, just like many other businesses.

"A group of specialized programmers can create a larger number of new threats than can a single malicious code author, bringing about economies of scale and therefore an increased return on investment," the report said. "Many of these threats can be used for financial gain [and] these proceeds can then be used to pay the programmers to continue creating new threats.

"The combination of these factors results in a high volume of new malicious code samples that threaten users online."

Greenbaum called 2007's tsunami of threats a "tipping point," and said that it is clear that security vendors -- and their users -- will soon need to switch to "whitelisting" legitimate code rather than "blacklisting" threats, as is now the practice.

A whitelist-based approach to security could take many forms, Greenbaum said. He declined to get specific about what Symantec's considering, saying only that the company is looking at some "interesting" ideas. But it would clearly have some pay-offs.

"It would reduce the size of the definition set," he said, "and make security software more efficient at catching malicious code."

By Symantec's estimate, 65% of the 54,000-plus unique applications deployed on Windows-based PCs in the last six months were malicious. "[Whitelisting] is a better approach," said Greenbaum, "considering the modern threat landscape."

Just last week, security experts predicted that the one-million mark would be reached by the end of 2008.

The Internet Security Threat Report Volume XIII can be downloaded from Symantec's site.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Gregg Keizer

Gregg Keizer

Show Comments


James Cook University - Master of Data Science Online Course

Learn more >




Back To Business Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill


I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?