Kaspersky Lab on business threats: 2015 saw the number of cryptolocker attacks double


Cyberattack tools used against businesses in 2015 were different to those used against consumers, according to Kaspersky Lab’s review of corporate threats in the last 12 months. They included greater exploitation of legitimate software programs and malware being signed with valid digital signatures to keep malicious files hidden for longer.

Kaspersky Lab 2015 Business Threats

Kaspersky Lab’s experts also observed a steady rise in the number of corporate users attacked by ransomware.

Kaspersky Lab’s experts found that in 2015 well over half (58%) of corporate PCs were hit with at least one attempted malware infection, up three percentage points on 2014.

One in three (29%) business computers were exposed at least once to an Internet-based attack; with the exploitation of standard office applications seen three times as often as in consumer attacks.

Geography of online attacks

Percentage of attacked corporate users in each country

Further, 41% of business computers faced local threats, such as from infected USB sticks or other compromised removable media.


The experts also noted a 7% increase in the share of exploits targeting the Android platform, confirming hackers’ growing interest in data stored on employees’ mobile devices.


These attacks were found to be carefully planned, with cyber-attackers taking time to investigate a target company’s contacts and suppliers and even the personal interests and browsing habits of individual employees.


This insight was then used to identify legitimate websites for compromise and malware distribution, with the attacks often repeated over time.

Kaspersky Lab 2015 Business Threats_2

Hunting down the money

In 2015, cyber-criminals and advanced persistent threats (APT) groups focused a great deal of attention on financial services organizations, such as banks, investment funds, and both stock and currency exchanges, including those handling cryptocurrencies.


These attacks included Carbanak, which penetrated the networks of banks, seeking out critical systems that would allow it to withdraw money. One successful attack alone would bring in as much as $2.5 – $10 million dollars.  The cyber-espionage group, Wild Neutron also spent much of 2015 hunting down investment companies as well as organizations working with the cryptocurrency Bitcoin and companies involved in mergers and acquisitions.



Kaspersky Lab’s experts observed a growing diversification in attack targets.

For example, in 2015, the Chinese APT, Winnti APT switched targets from companies involved in computer games to those in pharmaceuticals and telecommunications.

“The future cyber-landscape for business includes a new attack vector: infrastructure, because almost all of an organization’s valuable data is stored on servers in data centers. We also expect tougher safety standards from regulators, which could lead to more cybercriminals being arrested in 2016,” said Yury Namestnikov, Senior Security Researcher at Global Research and Analysis Team, Kaspersky Lab.

Stealing at point of sale

Point-Of-Sale terminals, used by retailers and other consumer-facing organizations were another target for attack in 2015, with Kaspersky Lab products blocking more than 11,500 attempts to hack into PoS devices.

The company knows of ten families of programs designed to steal data from PoS terminals, and seven of them appeared for the first time this year.

The rise and rise of ransomware

2015 also saw a doubling of the number of cryptolocker attacks, with Kaspersky Lab detecting cryptolockers on more than 50 thousand corporate machines.

This could reflect the fact that ransoms received from organizations can be far larger than those received from individuals.

There is also a greater likelihood of the ransom being paid. Many companies simply cannot function if the information on several critical computers or servers is encrypted and inaccessible.

“Organizations that have fallen victim to a cryptolocker can find themselves faced with a ransom demand to stop a DDoS-attack, decrypt files, or maintain the confidentiality of any stolen information. Because the evidence shows that cybercriminals don’t always honor the agreement once the ransom has been paid – as happened in the case of the DDoS-attacks on Proton-mail, many of those affected should call in law enforcement and computer security experts, ” Namestnikov added.

Kaspersky Lab recommends that companies take steps to reduce risk and to increase their knowledge of the latest threats.

The basic principles of security in corporate networks remain the same: train employees, establish robust  security processes and make full use of new technologies and techniques as each additional layer of protection reduces the risk of network penetration.

To eliminate the threat of ransomware infection, companies should use protection against exploits and ensure that their security solutions include behavioral detection methods, such as Kaspersky Lab’s System Watcher.

For further information:

  • Read how to reduce the risk of APT infection here
  • Find mitigation strategies here
  • Use Threat Intelligence services. For example, Kaspersky Lab provides Kaspersky Intelligence Service. Timely adjustment and verification of networks based on this data helps to protect you from attacks or to identify an attack in the early stages.

Read the full report on Securelist.com

Additional materials:

  • Watch a video on the work of GReAT team here
  • Explore the threat logbook with 40 APT campaigns researched by GReAT
  • Kaspersky Security Bulletin 2014 is available on com
  • Predictions for 2016 are here
  • Review of the year of 2015 is available here


Eli has 28 years of extensive IT sales expertise in Data, voice and network security and integrating them is his masterpiece. Photography and writing is his passion. Growing up as a kid, his father taught him to use the steel bodied Pentax and Hanimex 135mm film and single-direction flash, Polaroid cameras, and before going digital, he used mini DV tape with his Canon videocam. He now shoots with his Canon EOS 30D. Photography and blogging is a powerful mixture for him.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button