In a 10-month period, 265 security researchers around the world have identified in average 300 malware sites each day.
“End of March 2018, abuse.ch launched it’s
“The project is a huge success: with the help of the community,
The experts currently identify between 4,000 and 5,000 active malware distribution sites daily. The
In average, a malware distribution site remains active for more than a week (8 days, 10 hours, 24 minutes) that is considered a sufficient time to infect thousands of device every day
The analysis of the top malware hosting networks revealed that 2 out of three of the malware URL are hosted in the US or China.
One of the most disconcerting data emerged from the project is related to the takedown time of malware sites hosted in China, Chinese malware hosting networks are very slow in taking action against the abuses, they have an average abuse reaction time of more than a month.
A large number of malware distribution websites tracked by URLhaus are related to Emotet (aka
“The weight that Emotet has in the current threat landspace also becomes more clear when having a look at the identified malware families associated with the payloads URLhaus received from the tracked malware distribution sites.” continues the analysis published by Abuse.ch. “Across the 380,000 malware samples (payloads) that URLhaus has collected over the past 10 months, Emotet/Heodo is the top malware as the following chart documents.”
The experts pointed out that for the success of the
“There is still a long way to go with regards to
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.