Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Kaspersky Lab Q1 threat report reveals 96,086 malware incidents in Malaysia

AvantiKumar | May 18, 2016
Only the threats detected on KSN participants' computers were counted in the Malaysia edition of the global IT Threat Evolution study, said Kaspersky Lab's Jimmy Low.

Jimmy Low - Kaspersky Lab SEA - DONE 

Photo - Jimmy Low, Pre-Sales Group Manager, SEA, Kaspersky Lab.


According to Russian cybersecurity solutions company Kaspersky Lab's IT Threat Evolution Lab for Q1 2016, 96,086 Internet-borne malware incidents were detected on the computers of KSN participants in Malaysia.

Kaspersky Lab's Southeast Asia pre-sales group manager Jimmy Low said that this places Malaysia in the 47th place worldwide when it comes to the dangers associated with surfing the web.

Low said the Malaysia report, which supplements the global Kaspersky Lab's IT Threat Evolution Report for Q1 2016, is based on data obtained and processed using the Kaspersky Security Network (KSN). KSN integrates cloud-based technologies into personal and corporate products and is one of Kaspersky Lab's most important technologies.

"The statistics in this report (except for spam) are based on completely anonymous data obtained from Kaspersky Lab products installed on users' computers in Malaysia and was acquired with the full consent of the users involved," he added.

"In the period January-March 2016, Kaspersky Lab products detected 40,557 local malware incidents on the computers of KSN participants in Malaysia. Overall, 8.6 percent of users in this country were attacked by local threats during this period. This puts Malaysia in 74th place worldwide," Low said.

"When a Kaspersky Lab customer is attacked by an online threat, we record the source of this threat - the location of the malicious objects that tried to infect the system. Based on that data, the share of malicious incidents caused by malware hosted in Malaysia is 97,947 incidents in the period January-March 2016. This puts Malaysia in 12th place worldwide," he said.

Low said the report showed that attacks via browsers were the primary method for spreading malicious programs. The following methods were used most often by cybercriminals to penetrate systems: 

Exploiting vulnerabilities in browsers and their plugins (drive-by download).
Infection in this type of attack takes place when visiting an infected website, without any intervention from user and without their knowledge. And this is the number one method utilised by cybercriminals, the one used in the majority of attacks. Protection against such attacks requires an Internet Security class solution capable of detecting threats as they are being downloaded from the Internet and the timely installation of all the latest updates for the browser and its plugins. Another key technology, developed by Kaspersky Lab, is Automatic Exploit Prevention, designed specifically to fight complex web threats, exploiting newly discovered vulnerabilities in software.
Social engineering.
These attacks require user participation, with user having to download the malicious file to their computer. This happens when the cybercriminal tricks the victim into believing they are downloading a legitimate program. Protection against such attacks requires a web antivirus solution capable of detecting threats as they are being downloaded from the Internet.

The Global IT Threat Evolution Report for Q1 2016 is published at


Sign up for CIO Asia eNewsletters.