The team found that 2012 was marked by the continuous growth of sophisticated attacks in fixed and mobile networks, and the majority of these attacks were carried by malicious bots that were previously unknown and had no antivirus software signatures available. Since most bots rely on the DNS to propagate and communicate with criminal networks, the DNS layer is an excellent way to identify threats and protect critical infrastructure.
Nominum analyzed DNS data produced from their work with over 140 of the world’s top service providers, which accounts for 30% of the world’s network traffic, or 1 trillion DNS queries per day.
Top 10 fixed network threats
This list shows the top ten malicious bots ranked by the degree of infection around the world. The top ten global bots are a mix of new modern bots and legacy bots:
There are a significant number of mobile malware infections in existence today that are capable of stealing mobile phone users' identity, and this number is growing exponentially. The research shows that Android remains the top target of malware writers.
For a more detailed look at this research and at the threats, read ”Top Cyber Threats for Fixed Broadband Networks” and “Top Mobile Malware Threats”.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.