Malware Trend Report, Q January February March

Size: px
Start display at page:

Download "Malware Trend Report, Q1 2015 January February March"

Transcription

1 Malware Trend Report, Q1 215 January February March April 215 Copyright RedSocks B.V All Rights Reserved.

2 This page is left blank on purpose. Page 1

3 Table of Contents 1. Introduction Summary Data Breaches and Security News Methodology Collecting Malware Processing Malware Detecting Malware Classifying Malware Trends Backdoors Exploits Rootkits Trojans Worms Bit Malware Others Geolocation Final Word...3 Appendix A: Detecting Malware...31 Appendix B: Classifying Malware...29 Appendix C: Fastest Growing C&C Hosting Countries...32 Page 2

4 Table of Figures Figure 1: Unique New Malicious Files Q Figure 2: Distribution New Malicious Files Q Figure 3: Storing New Malicious Files Q Figure 4: Detection by Anti-Virus Engines...11 Figure 5: Anti-Virus Detection Percentage Q Figure 6: Files Identified as Backdoor Q Figure 7: Distribution of Backdoors Q Figure 8: Distribution of Variations of Backdoor.Bot Q Figure 9: Files Identified as Exploits Q Figure 1: Distribution of Exploits Q Figure 11: Distribution of CVE C Q Figure 12: Files Identified as Rootkit Q Figure 13: Distribution of Rootkits Q Figure 14: Distribution of Variations of Rootkit.1562 Q Figure 15: Files Identified as Trojan Q Figure 16: Distribution of Trojans Q Figure 17: Distribution of Trojan Downloaders Q Figure 19: Upatre Trojan Download Family Q Figure 18: Distribution of Trojan Droppers Q Figure 2: Distribution of PWS Trojans Q Figure 21: Distribution of Spy Trojans Q Figure 22: Files Identified as Worm...23 Figure 23: Distribution of Worms Q Figure 24: Files Identified with 64-Bit Malware...24 Figure 25: Distribution of 64-Bit Malware Q Figure 26: 64-Bit Malware Families Q Figure 27: Files Identified as Other Malware...26 Figure 28: Distribution of Other Malware Q Figure 29: Sum of the Top 1 C&C Hosting Countries...28 Figure 3: Top 1 C&C Hosting Countries Q Page 3

5 1. Introduction This is the first quarterly trend report for 215 from the RedSocks Malware Research Lab. RedSocks is a 1 percent Dutch company specializing in malware detection. Our product, the RedSocks Malware Threat Defender, is a network appliance that analyses digital traffic flows in real-time, based on algorithms and lists of malicious indicators. This critical information is compiled by the RedSocks Malware Intelligence Team (RSMIT). The team consists of specialists whose job is to identify new threats and trends on the Internet and to translate them into state-of-the-art malware detection capabilities. With this report we hope to provide the reader with a deeper insight into the trends we see in the malware we process as we look at data collected during the first quarter of 215. At RedSocks we analyse large numbers of malicious files on a daily basis, therefore we can only cover a few topics briefly in this trend report. Protecting your data from Internet-based threats is not an easy task, and relying solely on protection from Anti-Virus companies - no matter how established their brand - is not enough. Comprehensive protection requires an entirely new approach. Page 4

6 2. Summary In the first quarter of 215, almost 2 million, new and unique malicious files were processed in the RedSocks Malware Labs. 7 Million in January, 6 million in February, and up to 7 million again in March. Compared with the last quarter of 214, that is a drop of 14 percent. This quarter the overall detection by Anti-Virus software was only percent, which is a drop of percent when compared to the fourth quarter of 214. The detection rate for January was percent. For February, it was percent and in March, the average detection was only percent. Please note that identification rates can change based on samples chosen, scanning engines used and time of scanning. During the first quarter the amount of unique files identified as backdoors was 125., which is a 63 percent decrease when compared to the amount of files found in the last quarter of 214. The Anti-Virus software detected 5,217 exploits and 7,619 rootkits in the first quarter of this year. The identified exploits dropped by 54 percent, and the rootkits dropped by 4 percent when compared to the amount of unique files from the last quarter of 214. Trojans were by far the most popular type of malware. In January, 1.6 million were identified, in February 1. million and in March, 1.5 million, which is a decrease of 39 percent when compared to the amount of trojan files found in the last quarter 214. In January, 74, worm files were identified. In February the number increased to 123,. In March, 11, worms were added to our databases. Compared with the 64. worms from Q4 214, that is a drop of 52 percent. Grouped together, all other malicious files - such as flooders, hacktools, spoofers, spyware, viruses, etc. - make up for 651,, 939, and 1.2 million of the total for January, February and March, respectively, which is a decrease of 48 percent when compared to the amount of files found in the fourth quarter of 214. Within the top 1 countries hosting C&C servers, there was little change. But the amount of new C&C servers increased by 148 percent when compared to the last quarter of 214. A total of 17,325 active C&C servers were found and added to our blacklist in the first quarter of this year (3,738 in January, 3,484 February, and 1,13 in March). In March we see C&C servers for the first time in 43 countries that did not have any in January or February. Jordan, with 73 C&C servers, is one of those countries. The Netherlands dropped to 8 th place in the first quarter. The amount of new C&C servers hosted in The Netherlands doubled in March, to 378. Page 5

7 2.1. Data Breaches and Security News On January 2nd, the hacker group Rex Mundi published thousands of personal data from Dutch and Belgians. Including passwords, bank data and medical records. The Rex Mundi group is known for hacking Domino's Pizza, Telecom Numericable and the Dutch employment agency Accord. The group extorted the hacked companies and published large amounts of data on Pastebin and Dpaste. (Source: in Dutch) According to Paul Moore, a UK-based IT security consultant, the Immobilise website was affected by what he initially believed to be a direct object reference vulnerability. The bug exposed names, addresses, phone numbers, addresses and details on registered items (serial numbers, IMEIs, unique marks, value), information that can be highly valuable for burglars and other malicious actors. (Source: On February 1th, Rijksoverheid.nl and many other government websites were targeted by a DDoS attack. The outage began on Tuesday, February 1th at 1: am and lasted into the evening. Telfort.nl and GeenStijl.nl were also offline. (Source: in Dutch) Colleagues at Kaspersky Labs published and excellent in-depth research about the Equation group. The Equation group uses multiple malware platforms, some of which surpass the wellknown Regin threat in complexity and sophistication. The Equation group is probably one of the most sophisticated cyber-attack groups in the world. (Source: Dubbed the "FREAK" vulnerability (CVE ) - also known as Factoring Attack on RSA- EXPORT Keys - enables hackers or intelligence agencies to force clients to use older, weaker encryption i.e. also known as the export-grade key or 512-bit RSA keys. FREAK vulnerability discovered in March by security researchers of French Institute for Research in Computer Science and Automation (Inria) and Microsoft, resides in OpenSSL versions 1.1k and earlier, and Apple's Secure Transport. (Source: Page 6

8 In the last week of March, a 13-year-old SSL/TLS Weakness Exposing Sensitive Data in Plain Text attack, dubbed "Bar-Mitzvah", can be carried out even without conducting man-in-themiddle attack (MITM) between the client and the server, as in the case of most of the previous SSL hacks. The attack leverages a 13-year-old weakness in the less secure Rivest Cipher 4 (RC4) encryption algorithm, which is the most commonly used stream cipher for protecting 3 percent of TLS traffic on the Internet today. (Source: Page 7

9 3. Methodology 3.1. Collecting Malware At the RedSocks Malware Research Labs, we track large numbers of malware from our globaldistributed honeypots, honey-clients, spam-nets and various botnet monitoring sensors. Due to the distribution of our honeypots we are able to automatically collect and process new malicious samples from across the globe. We also exchange large quantities of malicious files with the Anti-Virus industry. Unique New Malicious Files January February March October November December January February March Q1-214 Q4-214 Q Figure 1: Unique New Malicious Files Q1-215 In the first quarter of 215, we processed a total of 19,983,354 unique and new malicious samples. This is percent of the total from Q1-214 and percent compared with Q Page 8

10 Distribution New Malicious Files Q /1/215 4/1/215 7/1/215 1/1/215 13/1/215 16/1/215 19/1/215 22/1/215 25/1/215 28/1/215 31/1/215 3/2/215 6/2/215 9/2/215 12/2/215 15/2/215 18/2/215 21/2/215 24/2/215 27/2/215 2/3/215 5/3/215 8/3/215 11/3/215 14/3/215 17/3/215 2/3/215 23/3/215 26/3/215 29/3/215 January February March Q1-215 Figure 2: Distribution New Malicious Files Q1-215 In figure 2, just over 47, new and unique malicious files were collected and processed on January 29 th. The second best day for collecting malware, with 395, samples, was on January 24 th Processing Malware Working with malware is what we love to do. More than 22, new malicious files arrive at our automated malware collecting machines every day. All samples were renamed according to their hash calculation. We then check to see if that particular piece of malware has already been processed. Page 9

11 Storing Only The New Malicious Files In GBs January February March October November December January February March Q1-214 Q4-214 Q Figure 3: Storing New Malicious Files Q1-215 Figure 3 shows the total amount of disk space needed to store all the new malicious files. For the first quarter of 215, 13 Terabyte was needed, which is a 12 percent increase compared with the last quarter of Detecting Malware At RedSocks Malware Labs we use an in-house classification system for grouping malware. We have classified over 3 types for which we have created detailed statistics. Once multiple antivirus scanners (in paranoid mode) have performed their on-demand scan, we know which malware was detected and, perhaps more importantly, which was not. While in the first quarter of 215 the total amount of new malicious files was slightly less than last quarter of 214 (1.77 percent), the average detection rates of the anti-virus engines dropped dramatically. Page 1

12 Detection by Anti-Virus Engines 1% 9% 8% 7% 6% 5% 4% 3% 2% 1% % January February March October November December January February March Q1-214 Q4-214 Q Figure 4: Detection by Anti-Virus Engines In the last quarter of 214, the average detection by anti-virus was 87 percent. For the first quarter of this year, the average detection was only 42 percent. Figure 5 shows the percentage detected per month in green. We are working closely with the anti-virus industry to find the cause of the low detection rates. 1% 9% 8% 7% 6% 5% 4% 3% 2% 1% % Anti-Virus Detection Percentages Q /1/215 4/1/215 7/1/215 1/1/215 13/1/215 16/1/215 19/1/215 22/1/215 25/1/215 28/1/215 31/1/215 3/2/215 6/2/215 9/2/215 12/2/215 15/2/215 18/2/215 21/2/215 24/2/215 27/2/215 2/3/215 5/3/215 8/3/215 11/3/215 14/3/215 17/3/215 2/3/215 23/3/215 26/3/215 29/3/215 January February March Q1-215 Figure 5: Anti-Virus Detection Percentage Q1-215 Page 11

13 3.4. Classifying Malware We categorise malware according to its primary feature. In the first quarter, malware was grouped as follows: Malware Categories Backdoors Exploits Rootkits Trojans Worms Others Backdoors ADODB (D)DoS Trojans -Worms Adware Bot-Trojans HTML Banking Trojans Generic Worms (D)DoS Tools Java Batch Trojans IM-Worms AV Tools JS FakeAV IRC-Worms Constructors Linux GameThief Trojans Net-Worms DOS based MSExcel Generic Trojans Net-Worms Encrypted Malware MSPPoint IRC Trojans P2P-Worms Flooders MSWord Java Trojan Packed Worms Fraud Tools OSX LNK Trojans Script Worms Generic Malware PDF Packed Trojans Hack Tools Script Password Stealing Tr. Macro based SWF Proxy Trojans Malware Heuristic Win32 Ransom Trojans Monitors Win64 Rogue Trojans Nukers Script Trojans SMS Trojans Spy Trojans Trojan Clickers Trojan Dialers Trojan Downloaders Trojan Droppers Trojan Flooders Trojan Mailfinder Trojan Notifiers Trojan RATs WinREG Trojans Porn-Dialers Porn-Downloaders Porn-Tools PSW-Tools PUPs RemoteAdmin Riskware Spammers Spoofers SpyTools Spyware Suspicious Viruses Table 1: Malware Categories Q4 The Others category consists of malicious samples that do not fit in any of the six main categories. See appendix B: Classifying Malware for the numbers by day, category and month. Page 12

14 4. Trends Discovering malware-propagation-trends starts with an analysis of the raw data behind the collection and processing of malware. From October to December, RedSocks Malware Research Labs identified the following trends by malware category Backdoors In the first quarter of 215, over 146. unique files were identified either as have been infected with a backdoor, or as having bot functions, in this first quarter of 215. Files Identified as Backdoor January February March October November December January February March Q1-214 Q4-214 Q Figure 6: Files Identified as Backdoor Q1-215 In figure 6, we see that the amount of new files identified as backdoor have been dropping since November 214. In March the amount of identified backdoors is going up from 26.5 to 56. new samples. Page 13

15 Distribution of Backdoors Q /1/215 4/1/215 7/1/215 1/1/215 13/1/215 16/1/215 19/1/215 22/1/215 25/1/215 28/1/215 31/1/215 3/2/215 6/2/215 9/2/215 12/2/215 15/2/215 18/2/215 21/2/215 24/2/215 27/2/215 2/3/215 5/3/215 8/3/215 11/3/215 14/3/215 17/3/215 2/3/215 23/3/215 26/3/215 29/3/215 January February March Q1-215 Figure 7: Distribution of Backdoors Q1-215 All the spikes in figure 7 on 3 January, 2 February and 2 and 3 March are caused largely by variation of the Backdoor.Bot With over 68, unique samples, it was by far the most seen backdoor. Distribution of Backdoor.Bot Q /1/215 4/1/215 7/1/215 1/1/215 13/1/215 16/1/215 19/1/215 22/1/215 25/1/215 28/1/215 31/1/215 3/2/215 6/2/215 9/2/215 12/2/215 15/2/215 18/2/215 21/2/215 24/2/215 27/2/215 2/3/215 5/3/215 8/3/215 11/3/215 14/3/215 17/3/215 2/3/215 23/3/215 26/3/215 29/3/215 Figure 8: Distribution of Variations of Backdoor.Bot Q1-215 Page 14

16 4.2. Exploits Exploits are used to attack computer systems, especially one that takes advantage of a particular vulnerability. The amount of new malicious files identified as exploit dropped dramatically in the first quarter of 215, when compared with the last quarter of 214. Files Identified as Exploit January February March October November December January February March Q1-214 Q4-214 Q Figure 9: Files Identified as Exploits Q1-215 In quarter four of 214, a total of 11,255 unique files were identified as exploit. In the first quarter of 215 only 7,594 files were identified as exploit Distribution of Exploits Q /1/215 4/1/215 7/1/215 1/1/215 13/1/215 16/1/215 19/1/215 22/1/215 25/1/215 28/1/215 31/1/215 3/2/215 6/2/215 9/2/215 12/2/215 15/2/215 18/2/215 21/2/215 24/2/215 27/2/215 2/3/215 5/3/215 8/3/215 11/3/215 14/3/215 17/3/215 2/3/215 23/3/215 26/3/215 29/3/215 January February March Q1-215 Figure 1: Distribution of Exploits Q1-215 In figure 1, we can see two spikes one on January 3 rd (1,549) and one on February 2 th (1,245). Both are caused by exploit CVE C. Page 15

17 Distribution of CVE C Q /1/215 4/1/215 7/1/215 11/1/215 17/1/215 23/1/215 26/1/215 28/1/215 3/1/215 7/2/215 1/2/215 15/2/215 18/2/215 2/2/215 22/2/215 24/2/215 27/2/215 1/3/215 1/3/215 12/3/215 16/3/215 19/3/215 25/3/215 31/3/215 Figure 11: Distribution of CVE C Q1-215 Like in the last quarter, variations of the Exploit CVE C are still very popular among cyber criminals. This exploit identifies malicious PDF files downloaded by the Blackhole exploitkit that takes advantage of a known vulnerability in Adobe Reader. To prevent successful exploitation, install the latest updates available for Adobe Reader and/or remove any old and unnecessary installations. In total 5,39 unique new malicious files were identified as Exploit CVE C. Page 16

18 4.3. Rootkits A rootkit is a type of software designed to hide the fact that an operating system has been compromised. This can be done in various ways, such as replacing vital executables or by introducing a new kernel module. Rootkits allow malware to hide in plain sight. Rootkits themselves are not harmful; they are simply used to hide malware, bots and worms. To install a rootkit, an attacker must first gain sufficient access to the target operating system. This can be accomplished by using an exploit, by obtaining valid account credentials or through social engineering. Because rootkits are activated before the operating system boots up, they are very difficult to detect and therefore provide a powerful way for attackers to access and use the targeted computer without the owner being aware of it. Due to the way rootkits are used and installed, they are notoriously difficult to remove. Rootkits nowadays are usually not used to gain elevated access, but instead are used to mask malware payloads more effectively. Files Identified as Rootkit Q January February March October November December January February March Q1-214 Q4-214 Q Figure 12: Files Identified as Rootkit Q1-215 The total amount of identified rootkits in the first quarter was 8,442, a 7 percent increase when compared with last quarter. Page 17

19 Distribution of Rootkits Q /1/215 4/1/215 7/1/215 1/1/215 13/1/215 16/1/215 19/1/215 22/1/215 25/1/215 28/1/215 31/1/215 3/2/215 6/2/215 9/2/215 12/2/215 15/2/215 18/2/215 21/2/215 24/2/215 27/2/215 2/3/215 5/3/215 8/3/215 11/3/215 14/3/215 17/3/215 2/3/215 23/3/215 26/3/215 29/3/215 January February March Q1-215 Figure 13: Distribution of Rootkits Q1-215 A closer look at the identified rootkit samples shows that most samples contained, by far, a variation or small modification of the Rootkit.1562 family. Distribution of Rootkit.1562 Q /1/215 5/1/215 8/1/215 12/1/215 15/1/215 18/1/215 21/1/215 24/1/215 29/1/215 1/2/215 5/2/215 8/2/215 11/2/215 15/2/215 18/2/215 21/2/215 24/2/215 28/2/215 3/3/215 6/3/215 9/3/215 12/3/215 15/3/215 18/3/215 21/3/215 24/3/215 27/3/215 3/3/215 Figure 14: Distribution of Variations of Rootkit.1562 Q1-215 Page 18

20 4.4. Trojans With more than 4 million new unique samples in the first quarter of 215, trojans are by far the biggest category of malware. On average 45, new files per day were identified as trojan. Files Indentified as Trojan January February March October November December January February March Q1-214 Q4-214 Q Figure 15: Files Identified as Trojan Q1-215 In figure 16 we see the distribution of all 26 types of trojans during the first quarter of Distribution of Trojans Q /1/215 4/1/215 7/1/215 1/1/215 13/1/215 16/1/215 19/1/215 22/1/215 25/1/215 28/1/215 31/1/215 3/2/215 6/2/215 9/2/215 12/2/215 15/2/215 18/2/215 21/2/215 24/2/215 27/2/215 2/3/215 5/3/215 8/3/215 11/3/215 14/3/215 17/3/215 2/3/215 23/3/215 26/3/215 29/3/215 January February March Q1-215 Figure 16: Distribution of Trojans Q1-215 We want to share four of many trojan subcategories with you. These are the Trojan Downloaders and Droppers, plus the PSW and the Spy Trojan. Page 19

21 On average 9,959 unique samples were identified as Trojan Downloader in Q Of the 299, samples that were classified as Trojan Downloader, a stunning 256, were identified as belonging to 1 major malware family called Upatre. Trojan Droppers Q /1/215 5/1/215 9/1/215 13/1/215 17/1/215 21/1/215 25/1/215 29/1/215 2/2/215 6/2/215 1/2/215 14/2/215 18/2/215 22/2/215 26/2/215 2/3/215 6/3/215 1/3/215 14/3/215 18/3/215 22/3/215 26/3/215 3/3/215 Figure 17: Distribution of Trojan Downloaders Q1-215 Next are the Trojan Droppers. In the first quarter of 215, a total of 22, samples were identified as Trojan Dropper. On February 19 th 3,517 unique files were classified as Trojan Dropper, of which 2,243 belong to the Trojan.Dropper.VFN malware family. Trojan Downloader Upatre Q1-215 Upatre.O Upatre.N Upatre.L Upatre.K Upatre.J Upatre.I Upatre.H Upatre.G Upatre.F Upatre.E Upatre.D Upatre.C Figure 18: Upatre Trojan Download Family Q1-215 Page 2

22 This trojan was only seen on February 19 th. Trojan Droppers Q /1/215 5/1/215 9/1/215 13/1/215 17/1/215 21/1/215 25/1/215 29/1/215 2/2/215 6/2/215 1/2/215 14/2/215 18/2/215 22/2/215 26/2/215 2/3/215 6/3/215 1/3/215 14/3/215 18/3/215 22/3/215 26/3/215 3/3/215 Figure 19: Distribution of Trojan Droppers Q1-215 Password stealing trojans were identified in 14, unique samples. With 5,18 samples the Onlinegames.KEGA malware family was the most common password stealing trojan in Q PWS Trojans Q /1/215 5/1/215 9/1/215 13/1/215 17/1/215 21/1/215 25/1/215 29/1/215 2/2/215 6/2/215 1/2/215 14/2/215 18/2/215 22/2/215 26/2/215 2/3/215 6/3/215 1/3/215 14/3/215 18/3/215 22/3/215 26/3/215 3/3/215 Figure 2: Distribution of PWS Trojans Q1-215 Page 21

23 Looking at the Spy Trojans 4,583 unique samples were identified in the first quarter of 215. The spike on January 3 th was caused by Trojan.Spy.ZBot.CB and minor variations of it. The ZBot.CB Spy trojan was, with 29, samples, the most common Spy Trojan Spy Trojans Q /1/215 5/1/215 9/1/215 13/1/215 17/1/215 21/1/215 25/1/215 29/1/215 2/2/215 6/2/215 1/2/215 14/2/215 18/2/215 22/2/215 26/2/215 2/3/215 6/3/215 1/3/215 14/3/215 18/3/215 22/3/215 26/3/215 3/3/215 Figure 21: Distribution of Spy Trojans Q1-215 Page 22

24 4.5. Worms In roughly 351, new files we identified worm traces and functionalities. A tremendous drop compared to the 1.8 million of last quarter 214. Files Identified as Worm January February March October November December January February March Q1-214 Q4-214 Q Figure 22: Files Identified as Worm In figure 23 we see a dramatic increase for three days, starting on February 19 th. A closer look at the data of those days reveals that variations of the Palevo.DZ worm were widely distributed. Distribution of Worms Q /1/215 4/1/215 7/1/215 1/1/215 13/1/215 16/1/215 19/1/215 22/1/215 25/1/215 28/1/215 31/1/215 3/2/215 6/2/215 9/2/215 12/2/215 15/2/215 18/2/215 21/2/215 24/2/215 27/2/215 2/3/215 5/3/215 8/3/215 11/3/215 14/3/215 17/3/215 2/3/215 23/3/215 26/3/215 29/3/215 January February March Q1-215 Figure 23: Distribution of Worms Q1-215 The top 3 most identified Worm families for Q1-215 are: Palevo.DZ (56,1), Picsys.C (17,) and Revois.gen!A (7,89). Page 23

25 Bit Malware Malware designed to run on Windows 64-bit was identified in 7, new malicious samples in the first quarter - a massive decrease when compared with the 26, of the fourth quarter. Files Identified with 64-Bit Malware January February March October November December January February March Q1-214 Q4-214 Q Figure 24: Files Identified with 64-Bit Malware In January, 64-bit malware was only identified on the first day. In February 21, files were categorised as 64-bit malware. The amount of 64-bit malware doubled up in March to 47, Distribution of 64-Bit Malware Q /1/215 2/2/215 4/2/215 6/2/215 8/2/215 1/2/215 12/2/215 14/2/215 16/2/215 18/2/215 2/2/215 22/2/215 24/2/215 26/2/215 28/2/215 2/3/215 4/3/215 6/3/215 8/3/215 1/3/215 12/3/215 14/3/215 16/3/215 18/3/215 2/3/215 22/3/215 24/3/215 26/3/215 28/3/215 3/3/215 January February March Q1-215 Figure 25: Distribution of 64-Bit Malware Q1-215 Expiro designed to infect 32-bit and 64-bit files aims to maximise profit and infects executable files on local, removable and network drives. As for the payload, this malware installs extensions for the Google Chrome and Mozilla Firefox browsers. The malware also Page 24

26 steals stored certificates and passwords from Internet Explorer, Microsoft Outlook and from the FTP client FileZilla. Browser extensions are used to redirect the user to a malicious URL, as well as to hijack confidential information, such as account credentials or online banking information. The virus disables some services on the compromised computer, including Windows Defender and Windows Security Center. It can also terminate processes. 64-Bit Malware Families Q1-215 Winnti.A Expiro.Z Expiro.R Expiro.Gen Expiro.Gen Expiro.G 4 Expiro.A 9.86 Dridex.D Apolmy.B Abul.A Figure 26: 64-Bit Malware Families Q1-215 Page 25

27 4.7. Others After the backdoors, exploits, rootkits, trojans, worms, and the 64-bit malware, we are still left with 2.8 million identified malicious files. This is 34 percent of the total of this quarter. Files Identified as Other Malware January February March October November December January February March Q1-214 Q4-214 Q Figure 27: Files Identified as Other Malware In figure 28, a clear spike is visible on February 19 th. On this day 119,923 unique new files were identified as containing other malware Distribution of Other Malware Q /1/215 4/1/215 7/1/215 1/1/215 13/1/215 16/1/215 19/1/215 22/1/215 25/1/215 28/1/215 31/1/215 3/2/215 6/2/215 9/2/215 12/2/215 15/2/215 18/2/215 21/2/215 24/2/215 27/2/215 2/3/215 5/3/215 8/3/215 11/3/215 14/3/215 17/3/215 2/3/215 23/3/215 26/3/215 29/3/215 January February March Q1-215 Figure 28: Distribution of Other Malware Q1-215 Page 26

28 The following three malware families were responsible for the spike: Generic.Malware.SN!.28E731D (3,), Generic.Malware.SN!.B38C1DE (29,), and Win32.Elkern.B (22,). Page 27

29 5. Geolocation A total of 17,325 active C&C servers were found and added to our blacklist in the first quarter of this year (3,738 in January, 3,484 February, and 1,13 in March). Figure 29 represents only the top 1 hosting countries Sum of the Top 1 C&C Hosting Countries January February March October November December January February March Q1-214 Q4-214 Q Figure 29: Sum of the Top 1 C&C Hosting Countries In figure 3, we see a closer look at the top C&C-hosting countries in this first quarter of 215. Top 1 C&C Hosting Countries Q January February March Q1-215 China France Germany Korea Republic Of Netherlands Pakistan Russian Federation Sweden Turkey Ukraine United Kingdom United States Figure 3: Top 1 C&C Hosting Countries Q1-215 Page 28

30 In the first quarter the United States still led the pack, followed by the Russian Federation and China: Top 1 Countries Hosting C&C January February March United States 77 United States 77 United States 2137 Russian Federation 473 Russian Federation 56 China 1127 Germany 259 Germany 26 Russian Federation 77 United Kingdom 225 United Kingdom 216 Germany 555 Netherlands 191 Ukraine 21 United Kingdom 426 Ukraine 182 Netherlands 187 France 384 France 143 France 134 Netherlands 378 China 141 China 16 Ukraine 35 Pakistan 123 Korea Republic Of 96 Korea Republic Of 335 Korea Republic Of 96 Turkey 76 Sweden 287 Table 1: Top 1 Countries Hosting C&C Q1-215 The amount of C&C servers hosted in the United States increased by 32 percent in March compared with February. China could be found in 8 th place in January and February, and in March it shoots to 2 nd place, with an increase of 1,63 percent compared with February. The Netherlands, as a hosting country for C&C Servers, dropped from 5 th place in January t 6 th place in February and ending up 7 th in March. The amount of C&C servers hosted in The Netherlands grew by 22 percent in March compared with February. Not only did we see a global increase in C&C server in the March, we also added 43 new countries to our C&C blacklists. With 73 C&C servers, Jordan is the highest ranking of the newly added countries that did not have any active C&C servers in January or February. For a full list of hosting C&C countries, see appendix C. Page 29

31 6. Final Word In the first quarter of 215, with an average of 222, new files per day, the total number of unique new malicious files processed was 2 million, a decrease of 1.77 percent compared with the amount of new malicious files from the fourth quarter of 214. The overall detection by Anti-Virus software was dramatically low. Only 8 million malicious files or percent of the total, were identified by anti-virus engines. Category Total Q1-215 % of Total Identified +/- compared to Q4-214 Backdoors 146, % +.28 % Exploits 7,594.7 % +.1 % Rootkits 8, % +.7 % Trojans 4,6, % % 3 Worms 35, % % Others 2,764, % % 4 Table 2: Malware Categories Q1-215 vs. Q4-214 By grouping and classifying the identified malware, we detected a slight increase of popularity in 5 of the 6 main malware categories during the first quarter. These five categories were: backdoors, exploits, rootkits, trojans and others. The category worms decreased by 2.85 percent when compared with the quarter four 214. Largest Family Total Q1-215 Backdoor.Bot ,3 Exploit:W32/CVE C 5,39 Rootkit ,993 Gen:Variant.Sirefef ,856 Palevo.DZ 56,1 Within the top 1 countries hosting C&C servers, there was little change. But the amount of new C&C servers Win32.Expiro.Gen.3 1,117,874 has increased by 148 percent when compared with Table 3: Largest Malware Families Q1-215 the last quarter of 214. In January (3,738) and February (3,484) the amounts are comparable with Q In March there was a 268 percent increase in new C&C servers, bringing the total to 1,13. At the time of writing, we are still investigating what may be the cause of this global increase in C&C servers. The Netherlands dropped to the 8 th place in the first quarter. The amount of new C&C servers hosted in The Netherlands doubled in March to 378. For a complete list of C&C hosting countries, the amount of new C&C servers, and their percentages can be found in appendix C. Page 3

Malware Trend Report, Q2 2014 April May June

Malware Trend Report, Q2 2014 April May June Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...

More information

This page is left blank on purpose.

This page is left blank on purpose. This page is left blank on purpose. page 1 of 30 Table of Contents 1. Introduction... 5 2. Summary... 6 2.1. Collecting Malware... 7 2.2. Processing Malware... 7 2.3. Identifying Malware... 8 2.4. Detecting

More information

Malware Trend Report, Q4 2014 October November December

Malware Trend Report, Q4 2014 October November December Malware Trend Report, Q4 2014 October November December January 2015 Copyright RedSocks B.V. 2014-2015. All Rights Reserved. This page is left blank on purpose. Page 1 of 28 Table of Contents 1. Introduction...

More information

Appendix 1: Full Country Rankings

Appendix 1: Full Country Rankings Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable

More information

World Consumer Income and Expenditure Patterns

World Consumer Income and Expenditure Patterns World Consumer Income and Expenditure Patterns 2014 14th edi tion Euromonitor International Ltd. 60-61 Britton Street, EC1M 5UX TableTypeID: 30010; ITtableID: 22914 Income Algeria Income Algeria Income

More information

Consolidated International Banking Statistics in Japan

Consolidated International Banking Statistics in Japan Total (Transfer Consolidated cross-border claims in all currencies and local claims in non-local currencies Up to and including one year Maturities Over one year up to two years Over two years Public Sector

More information

Global Dialing Comment. Telephone Type. AT&T Direct Number. Access Type. Dial-In Number. Country. Albania Toll-Free 00-800-0010 888-426-6840

Global Dialing Comment. Telephone Type. AT&T Direct Number. Access Type. Dial-In Number. Country. Albania Toll-Free 00-800-0010 888-426-6840 Below is a list of Global Access Numbers, in order by country. If a Country has an AT&T Direct Number, the audio conference requires two-stage dialing. First, dial the AT&T Direct Number. Second, dial

More information

Cisco Global Cloud Index Supplement: Cloud Readiness Regional Details

Cisco Global Cloud Index Supplement: Cloud Readiness Regional Details White Paper Cisco Global Cloud Index Supplement: Cloud Readiness Regional Details What You Will Learn The Cisco Global Cloud Index is an ongoing effort to forecast the growth of global data center and

More information

FDI performance and potential rankings. Astrit Sulstarova Division on Investment and Enterprise UNCTAD

FDI performance and potential rankings. Astrit Sulstarova Division on Investment and Enterprise UNCTAD FDI performance and potential rankings Astrit Sulstarova Division on Investment and Enterprise UNCTAD FDI perfomance index The Inward FDI Performance Index ranks countries by the FDI they receive relative

More information

Region Country AT&T Direct Access Code(s) HelpLine Number. Telstra: 1 800 881 011 Optus: 1 800 551 155

Region Country AT&T Direct Access Code(s) HelpLine Number. Telstra: 1 800 881 011 Optus: 1 800 551 155 Mondelēz International HelpLine Numbers March 22, 2013 There are many ways to report a concern or suspected misconduct, including discussing it with your supervisor, your supervisor s supervisor, another

More information

41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50.

41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50. Overall Results Climate Change Performance Index 2012 Table 1 Rank Country Score** Partial Score Tendency Trend Level Policy 1* Rank Country Score** Partial Score Tendency Trend Level Policy 21 - Egypt***

More information

Senate Committee: Education and Employment. QUESTION ON NOTICE Budget Estimates 2015-2016

Senate Committee: Education and Employment. QUESTION ON NOTICE Budget Estimates 2015-2016 Senate Committee: Education and Employment QUESTION ON NOTICE Budget Estimates 2015-2016 Outcome: Higher Education Research and International Department of Education and Training Question No. SQ15-000549

More information

The World Market for Medical, Surgical, or Laboratory Sterilizers: A 2013 Global Trade Perspective

The World Market for Medical, Surgical, or Laboratory Sterilizers: A 2013 Global Trade Perspective Brochure More information from http://www.researchandmarkets.com/reports/2389480/ The World Market for Medical, Surgical, or Laboratory Sterilizers: A 2013 Global Trade Perspective Description: This report

More information

Enterprise Mobility Suite (EMS) Overview

Enterprise Mobility Suite (EMS) Overview Enterprise Mobility Suite (EMS) Overview Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report using 3+ devices for work Enable my employees

More information

Contact Centers Worldwide

Contact Centers Worldwide A Contact Centers Worldwide Country Tel.no. Supported lang. Contact Center Albania Algeria 852 665 00 +46 10 71 66160 Angola 89900 +34 91 339 2121 (Port) and Portuguese +34 913394044 +34 913394023 (Por)

More information

CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update

CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update CMMI for SCAMPI SM Class A 2011 End-Year Update Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 1 Outline Introduction Current Status Community Trends Organizational Trends

More information

Introducing Clinical Trials Insurance Services Ltd

Introducing Clinical Trials Insurance Services Ltd Introducing Clinical Trials Insurance Services Ltd Important Staff Richard Kelly Managing Director Richard joined CTIS in 2006 having previously managed the Pharmaceutical wholesale division at Heath Lambert

More information

Ninth United Nations Survey of Crime Trends and Operations of Criminal Justice Systems POLICE

Ninth United Nations Survey of Crime Trends and Operations of Criminal Justice Systems POLICE Indicators as defined by the (- ) POLICE 2. Crimes recorded in criminal (police) statistics, by type of crime including attempts to commit crimes 2.2 Total recorded intentional homicide, completed (c)

More information

Windows Malware Annual Report 2014 And prognosis 2015

Windows Malware Annual Report 2014 And prognosis 2015 Windows Malware Annual Report 2014 And prognosis 2015 February 2015 Copyright RedSocks B.V. 2014-2015. All Rights Reserved. This page is left blank on purpose. Page 1 Table of Contents 1. Introduction...

More information

Digital TV Research. http://www.marketresearch.com/digital-tv- Research-v3873/ Publisher Sample

Digital TV Research. http://www.marketresearch.com/digital-tv- Research-v3873/ Publisher Sample Digital TV Research http://www.marketresearch.com/digital-tv- Research-v3873/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am -

More information

SunGard Best Practice Guide

SunGard Best Practice Guide SunGard Best Practice Guide What Number Should I Use? www.intercalleurope.com Information Hotline 0871 7000 170 +44 (0)1452 546742 conferencing@intercalleurope.com Reservations 0870 043 4167 +44 (0)1452

More information

Fall 2015 International Student Enrollment

Fall 2015 International Student Enrollment Fall 2015 International Student Enrollment Prepared by The Office of International Affairs Nova Southeastern University Nova Southeastern University International Student Statistics Fall 2015 International

More information

Know the Facts. Aon Hewitt Country Profiles can help: Support a decision to establish or not establish operations in a specific country.

Know the Facts. Aon Hewitt Country Profiles can help: Support a decision to establish or not establish operations in a specific country. Aon Hewitt Country Profiles Your eguide to employment requirements and practices Profiles for nearly 90 countries worldwide Risk. Reinsurance. Human Resources. Know the Facts Whether you are a newcomer

More information

BT Premium Event Call and Web Rate Card

BT Premium Event Call and Web Rate Card BT Managed Event and BT Self-Managed Event (also referred to as Express, Plus and Premium) Conference Bridge and Call for Booked Audio Conferencing Services will comprise the following for each phone-conference:

More information

The big pay turnaround: Eurozone recovering, emerging markets falter in 2015

The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 Global salary rises up compared to last year But workers in key emerging markets will experience real wage cuts Increase in

More information

Triple-play subscriptions to rocket to 400 mil.

Triple-play subscriptions to rocket to 400 mil. Triple-play criptions to rocket to 400 mil. Global triple-play criptions will reach 400 million by 2017; up by nearly 300 million on the end-2011 total and up by 380 million on the 2007 total, according

More information

Global Effective Tax Rates

Global Effective Tax Rates www.pwc.com/us/nes Global s Global s April 14, 2011 This document has been prepared pursuant to an engagement between PwC and its Client. As to all other parties, it is for general information purposes

More information

EMEA BENEFITS BENCHMARKING OFFERING

EMEA BENEFITS BENCHMARKING OFFERING EMEA BENEFITS BENCHMARKING OFFERING COVERED COUNTRIES SWEDEN FINLAND NORWAY ESTONIA R U S S I A DENMARK LITHUANIA LATVIA IRELAND PORTUGAL U. K. NETHERLANDS POLAND BELARUS GERMANY BELGIUM CZECH REP. UKRAINE

More information

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000

More information

Raveh Ravid & Co. CPA. November 2015

Raveh Ravid & Co. CPA. November 2015 Raveh Ravid & Co. CPA November 2015 About Us Established in 1986 by Abir Raveh, CPA & Itzhak Ravid, CPA 6 Partners, 80 employees Located in Tel Aviv, Israel wide range of professional services highly experienced

More information

Business Phone. Product solutions. Key features

Business Phone. Product solutions. Key features Product solutions Enjoy free calls and significant savings on your business landline bills with from International. Set-up is simple and you don t need to change your existing telephone numbers, plus there

More information

GfK PURCHASING POWER INTERNATIONAL

GfK PURCHASING POWER INTERNATIONAL GfK PURCHASING POWER INTERNATIONAL 1 Agenda 1. Europe 3 2. Americas 45 3. Asia & Near East 54 4. Afrika 66 5. Australia 68 6. Overview of countries and available levels 70 2 2 EUROPE 4 GfK

More information

Mineral Industry Surveys

Mineral Industry Surveys 4 Mineral Industry Surveys For information contact: Robert L. Virta, Asbestos Commodity Specialist U.S. Geological Survey 989 National Center Reston, VA 20192 Telephone: 703-648-7726, Fax: (703) 648-7757

More information

Global AML Resource Map Over 2000 AML professionals

Global AML Resource Map Over 2000 AML professionals www.pwc.co.uk Global AML Resource Map Over 2000 AML professionals January 2016 Global AML Resources: Europe France Italy Jersey / Guernsey 8 Ireland 1 Portugal 7 Luxembourg 5 United Kingdom 1 50 11 Spain

More information

Introducing GlobalStar Travel Management

Introducing GlobalStar Travel Management Introducing GlobalStar Travel Management GlobalStar is a worldwide travel management company owned and managed by local entrepreneurs. In total over 80 market leading enterprises, representing over US$13

More information

Global Network Access International Access Rates

Global Network Access International Access Rates Global Network Access International Access Rates We know that you need to communicate with your partners, colleagues and customers around the world. We make every effort to understand the difficulties

More information

List of tables. I. World Trade Developments

List of tables. I. World Trade Developments List of tables I. World Trade Developments 1. Overview Table I.1 Growth in the volume of world merchandise exports and production, 2010-2014 39 Table I.2 Growth in the volume of world merchandise trade

More information

Composition of Premium in Life and Non-life Insurance Segments

Composition of Premium in Life and Non-life Insurance Segments 2012 2nd International Conference on Computer and Software Modeling (ICCSM 2012) IPCSIT vol. 54 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V54.16 Composition of Premium in Life and

More information

HP Technology Services HP NonStop Server Support

HP Technology Services HP NonStop Server Support Reference guide HP Technology Services HP NonStop Server Support HP Global NonStop Solution Center (GNSC) Table of contents Global NonStop Solution Center... 2 Product support for HP NonStop and Neoview

More information

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,

More information

COST Presentation. COST Office Brussels, 2013. ESF provides the COST Office through a European Commission contract

COST Presentation. COST Office Brussels, 2013. ESF provides the COST Office through a European Commission contract COST Presentation COST Office Brussels, 2013 COST is supported by the EU Framework Programme ESF provides the COST Office through a European Commission contract What is COST? COST is the oldest and widest

More information

Bangladesh Visa fees for foreign nationals

Bangladesh Visa fees for foreign nationals Bangladesh Visa fees for foreign nationals No. All fees in US $ 1. Afghanistan 5.00 5.00 10.00 2. Albania 2.00 2.00 3.00 3. Algeria 1.00 1.00 2.00 4. Angola 11.00 11.00 22.00 5. Argentina 21.00 21.00 42.00

More information

MAUVE GROUP GLOBAL EMPLOYMENT SOLUTIONS PORTFOLIO

MAUVE GROUP GLOBAL EMPLOYMENT SOLUTIONS PORTFOLIO MAUVE GROUP GLOBAL SOLUTIONS PORTFOLIO At Mauve Group, we offer a variety of complete employee management services such as Global Employment Solutions (GES), Professional Employment Outsourcing (PEO),

More information

Dial 00-800-0010, when prompted to enter calling number, enter 800-544-6666 American Samoa 1-800-544-6666 Number can be dialed directly Angola 0199

Dial 00-800-0010, when prompted to enter calling number, enter 800-544-6666 American Samoa 1-800-544-6666 Number can be dialed directly Angola 0199 National Financial Services International Calling Instructions Albania 00-800-0010 Dial 00-800-0010, when prompted to enter American Samoa 1-800-544-6666 Number can be dialed directly Angola 0199 Dial

More information

DSV Air & Sea, Inc. Aerospace Sector. DSV Air & Sea, Inc. Aerospace

DSV Air & Sea, Inc. Aerospace Sector. DSV Air & Sea, Inc. Aerospace DSV Air & Sea, Inc. Aerospace Sector DSV Air & Sea, Inc. Aerospace Introduction to DSV DSV is a global supplier of transport and logistics services. We have offices in more than 70 countries and an international

More information

Chapter 4A: World Opinion on Terrorism

Chapter 4A: World Opinion on Terrorism 1 Pew Global Attitudes Project, Spring 2007 Now I m going to read you a list of things that may be problems in our country. As I read each one, please tell me if you think it is a very big problem, a moderately

More information

I. World trade developments

I. World trade developments I. World trade developments The value of world merchandise exports increased by 20 per cent in 2011 while exports of commercial services grew by 11 per cent. Key developments in 2011: a snapshot Trade

More information

Reporting practices for domestic and total debt securities

Reporting practices for domestic and total debt securities Last updated: 4 September 2015 Reporting practices for domestic and total debt securities While the BIS debt securities statistics are in principle harmonised with the recommendations in the Handbook on

More information

ORBITAX ESSENTIAL INTERNATIONAL TAX SOLUTIONS

ORBITAX ESSENTIAL INTERNATIONAL TAX SOLUTIONS REUTERS/Jo Yong-Hak ORBITAX ESSENTIAL INTERNATIONAL TAX SOLUTIONS ALIGN AND STREAMLINE YOUR TAX PLANNING WORKFLOW FOR CROSS-BORDER TRANSACTIONS ACROSS MULTINATIONAL ENTITIES ALIGN YOUR GLOBAL TAX UNIVERSE

More information

Clinical Trials. Local Trial Requirements

Clinical Trials. Local Trial Requirements Clinical Trials Clinical trials insurance covers the legal liabilities of the insured in respect of clinical trials for bodily injury arising from the trial. The coverage provided by Newline is on the

More information

Editorial for Summer Edition

Editorial for Summer Edition Editorial for Summer Edition of the SOCIETAS ET IURISPRUDENTIA 2015 Dear readers and friends, let me introduce the second issue of the third volume of SOCIETAS ET IURISPRUDENTIA, an international scientific

More information

How To Get A New Phone System For Your Business

How To Get A New Phone System For Your Business Cisco Phone Systems Telemarketing Script Cold Call 1. Locate Contact: Name listed Owner General Manager / Office Manager Chief BDM (Business Decision Maker) Note: Avoid talking to IT since this is not

More information

January 2016 Cybersecurity Snapshot Global Results www.isaca.org/2016-cybersecurity-snapshot Number of respondents (n) = 2,920

January 2016 Cybersecurity Snapshot Global Results www.isaca.org/2016-cybersecurity-snapshot Number of respondents (n) = 2,920 January 2016 Cybersecurity Snapshot Global Results www.isaca.org/2016-cybersecurity-snapshot Number of respondents (n) = 2,920 Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org

More information

Supported Payment Methods

Supported Payment Methods Supported Payment Methods Global In the global payments market, credit cards are the most popular payment method. However, BlueSnap expands the payment selection by including not only the major credit

More information

Logix5000 Clock Update Tool V2.00.36. 12/13/2005 Copyright 2005 Rockwell Automation Inc., All Rights Reserved. 1

Logix5000 Clock Update Tool V2.00.36. 12/13/2005 Copyright 2005 Rockwell Automation Inc., All Rights Reserved. 1 Logix5000 Clock Update Tool V2.00.36. 1 Overview Logix5000 Clock Update Tool 1. 1. What is is it? it? 2. 2. How will it it help me? 3. 3. How do do I I use it? it? 4. 4. When can I I get get it? it? 2

More information

Supported Payment Methods

Supported Payment Methods Sell Globally in a Snap Supported Payment Methods Global In the global payments market, credit cards are the most popular payment method. However, BlueSnap expands the payment selection by including not

More information

GLOBAL. 2014 Country Well-Being Rankings. D Social (% thriving) E Financial (% thriving) F Community (% thriving) G Physical (% thriving)

GLOBAL. 2014 Country Well-Being Rankings. D Social (% thriving) E Financial (% thriving) F Community (% thriving) G Physical (% thriving) 0 0 GLOBAL 0 Country Rankings 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 : >0.0% 0.% 0.0% 0.% 0.0% 0.% 0.0% 0.0% A Country s global rank B in three or more elements of well-being C (% thriving) D (% thriving) E

More information

Postal rates. As of January 2015

Postal rates. As of January 2015 Postal rates As of January 2015 Sending mail within the Netherlands or to another country? Whatever it is you wish to send, you can count on our services. This leaflet will provide you with the postal

More information

Global Education Office University of New Mexico MSC06 3850, Mesa Vista Hall, Rm. 2120 Tel. 505 277 4032, Fax 505 277 1867, geo@unm.

Global Education Office University of New Mexico MSC06 3850, Mesa Vista Hall, Rm. 2120 Tel. 505 277 4032, Fax 505 277 1867, geo@unm. Global Education Office University of New Mexico MSC06 3850, Mesa Vista Hall, Rm. 220 Tel. 505 277 4032, Fax 505 277 867, geo@unm.edu Report on International Students, Scholars and Study Abroad Programs

More information

Schedule of Accreditation issued by United Kingdom Accreditation Service 21-47 High Street, Feltham, Middlesex, TW13 4UN, UK

Schedule of Accreditation issued by United Kingdom Accreditation Service 21-47 High Street, Feltham, Middlesex, TW13 4UN, UK Schedule of United Kingdom Service 21-47 High Street, Feltham, Middlesex, TW13 4UN, UK ISO/IEC 17021:2011 to provide environmental management systems certification Kitemark Court Davy Avenue Knowlhill

More information

Carnegie Mellon University Office of International Education Admissions Statistics for Summer and Fall 2010

Carnegie Mellon University Office of International Education Admissions Statistics for Summer and Fall 2010 Carnegie Mellon University Admissions Statistics for and Fall 2010 New International Students and Fall 2010 Undergraduate 208 16.1% Master's 799 61.7% Doctorate 177 13.7% Exchange 80 6.2% 31 2.4% Total

More information

International Call Services

International Call Services International Call Services Affordable rates for business calls. Wherever you are in the world. We ve got plenty to say when it comes to staying in touch when you re overseas. We have agreements with 443

More information

ISO is the world s largest developer of voluntary international

ISO is the world s largest developer of voluntary international The ISO Survey 2005 ISO and The ISO Survey ISO is the world s largest developer of voluntary international standards for business, government and society. Its portfolio at the beginning of June 2006 comprised

More information

U.S. Trade Overview, 2013

U.S. Trade Overview, 2013 U.S. Trade Overview, 213 Stephanie Han & Natalie Soroka Trade and Economic Analysis Industry and Analysis Department of Commerce International Trade Administration October 214 Trade: A Vital Part of the

More information

Culture in the Cockpit Collision or Cooperation?

Culture in the Cockpit Collision or Cooperation? Culture in the Cockpit Collision or Cooperation? Dr. Nicklas Dahlstrom Human Factors Manager Understanding Safety - The Changing Nature of Safety 1 Lives lost per year How safe is flying? 100 000 10 000

More information

Brochure More information from http://www.researchandmarkets.com/reports/1339929/

Brochure More information from http://www.researchandmarkets.com/reports/1339929/ Brochure More information from http://www.researchandmarkets.com/reports/1339929/ The 2011 World Forecasts of Machine Tools That Remove Material by Laser or Light, Photon, Ultrasonic, Electro-Discharge,

More information

TRANSFERS FROM AN OVERSEAS PENSION SCHEME

TRANSFERS FROM AN OVERSEAS PENSION SCHEME PENSIONS PROFILE DECEMBER 2011 TRANSFERS FROM AN OVERSEAS PENSION SCHEME = Summary A simplified guide to the process: 1. Individual requests transfer from their overseas pension scheme to their UK registered

More information

THE ADVANTAGES OF A UK INTERNATIONAL HOLDING COMPANY

THE ADVANTAGES OF A UK INTERNATIONAL HOLDING COMPANY THE ADVANTAGES OF A UK INTERNATIONAL HOLDING COMPANY Ideal Characteristics for the Location of an International Holding Company Laurence Binge +44 (0)1372 471117 laurence.binge@woolford.co.uk www.woolford.co.uk

More information

INTERNATIONAL OVERVIEW John Wilkinson SVP Sales & Products

INTERNATIONAL OVERVIEW John Wilkinson SVP Sales & Products INTERNATIONAL OVERVIEW John Wilkinson SVP Sales & Products DE- C I X N G N L A U N C H E V E N T 2 Introduction XConnect provides secure, managed ENUM Registries and SIP based peering services to enable

More information

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS 8 10 March 2016 Farnborough, Hampshire Dedicated CYBER ZONE! HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS Key theme for 2016: Transformational Change POLICING & COUNTER TERRORISM CRITICAL NATIONAL

More information

Cisco Smart Care Service

Cisco Smart Care Service Q. What is Cisco Smart Care Service? A. Cisco Smart Care Service is a collaborative, comprehensive network wide service that enables your partner to deliver proactive network monitoring, health checkups,

More information

Data Modeling & Bureau Scoring Experian for CreditChex

Data Modeling & Bureau Scoring Experian for CreditChex Data Modeling & Bureau Scoring Experian for CreditChex Karachi Nov. 29 th 2007 Experian Decision Analytics Credit Services Help clients with data and services to make business critical decisions in credit

More information

International Student Population A Statistical Report by The International Office

International Student Population A Statistical Report by The International Office International Student Population A Statistical Report by The International Office CURRENT STUDENTS: 2,362 F-1 OPT & STEM OPT STUDENTS: 313 F-2/J-2 DEPENDENTS: 303 TOTAL: 2,978 Basic Information: There

More information

How To Calculate The Lorenz Curve

How To Calculate The Lorenz Curve FACT SHEET 1. Overview 1.1 Developed by an Italian statistician Corrado in the 1910s, is commonly used to indicate income inequality in a society. is a number which has a value between zero and one. As

More information

DuchenneConnect. www.duchenneconnect.org

DuchenneConnect. www.duchenneconnect.org DuchenneConnect www.duchenneconnect.org 1 What is DuchenneConnect? Web based patient self report registry to link the resources and needs of the Duchenne/Becker muscular dystrophy community, including:

More information

July 2015. Figure 1. 1 The index is set to 100 in 2000. House prices are deflated by country CPIs in most cases.

July 2015. Figure 1. 1 The index is set to 100 in 2000. House prices are deflated by country CPIs in most cases. July 2015 Globally, house prices continue a slow recovery. The Global House Price Index, an equally weighted average of real house prices in nearly 60 countries, inched up slowly during the past two years

More information

Security Business Review

Security Business Review Security Business Review Security Business Review Q4: 2014 2 By Bitdefender Labs Security Business Review Botnet Anonymization Raises New Security Concerns Executive Overview While botnets, which are large

More information

DIRECT MARKETING STRATEGY. Web & Software Development Services

DIRECT MARKETING STRATEGY. Web & Software Development Services DIRECT MARKETING STRATEGY Web & Software Development Services Document created by : Rakesh Negi Business Development & Market Research Consultant New Delhi, India Skype: rakesh_negi1 MSN: rakesh_negi1@hotmail.com

More information

DEVICEATLAS MOBILE WEB TRAFFIC REPORT

DEVICEATLAS MOBILE WEB TRAFFIC REPORT DEVICEATLAS MOBILE WEB TRAFFIC REPORT Q1 2015 PROVIDING DETAILED DATA ON THE LATEST TRENDS IN THE MOBILE MARKET INTRODUCTION With 81.5% market share, Android was the leading mobile OS in 2014 in terms

More information

INTERNATIONAL AIR SERVICES TRANSIT AGREEMENT SIGNED AT CHICAGO ON 7 DECEMBER 1944

INTERNATIONAL AIR SERVICES TRANSIT AGREEMENT SIGNED AT CHICAGO ON 7 DECEMBER 1944 State INTERNATIONAL AIR SERVICES TRANSIT AGREEMENT SIGNED AT CHICAGO ON 7 DECEMBER 1944 Entry into force: The Agreement entered into force on 30 January 1945. Status: 130 Parties. This list is based on

More information

IMD World Talent Report. By the IMD World Competitiveness Center

IMD World Talent Report. By the IMD World Competitiveness Center 2014 IMD World Talent Report By the IMD World Competitiveness Center November 2014 IMD World Talent Report 2014 Copyright 2014 by IMD: Institute for Management Development, Lausanne, Switzerland For further

More information

REUTERS/Jo Yong-Hak ESSENTIAL INTERNATIONAL TAX SOLUTIONS POWERED BY ORBITAX

REUTERS/Jo Yong-Hak ESSENTIAL INTERNATIONAL TAX SOLUTIONS POWERED BY ORBITAX REUTERS/Jo Yong-Hak ESSENTIAL INTERNATIONAL TAX SOLUTIONS POWERED BY ORBITAX A CENTRAL INTERNATIONAL TAX DASHBOARD FOR YOUR GLOBAL ENTERPRISE Now for the first time, you can access all the international

More information

Building on +60 GW of experience. Track record as of 31 December 2013

Building on +60 GW of experience. Track record as of 31 December 2013 Building on +60 GW of experience Track record as of 31 December 2013 Can data and analysis make a difference on turbine performance? Proven technology. For Vestas, it is more than a saying it is something

More information

ADVOC. the international network of independent law firms

ADVOC. the international network of independent law firms ADVOC the international network of independent law firms About ADVOC ADVOC is an international network of independent law firms, sharing international expertise in jurisdictions across the globe Our member

More information

Sulfuric Acid 2013 World Market Outlook and Forecast up to 2017

Sulfuric Acid 2013 World Market Outlook and Forecast up to 2017 Brochure More information from http://www.researchandmarkets.com/reports/2547547/ Sulfuric Acid 2013 World Market Outlook and Forecast up to 2017 Description: Sulfuric Acid 2013 World Market Outlook and

More information

Credit & Debit Card Payments. Factsheet

Credit & Debit Card Payments. Factsheet Credit & Debit Card Payments Factsheet Contents 1. Card Types... 2 2. Supported countries... 2 3. First Funding via Credit / Debit Card... 3 4. Transaction Currencies... 4 5. Currency Conversion... 4 6.

More information

Brandeis University. International Student & Scholar Statistics

Brandeis University. International Student & Scholar Statistics 1 Brandeis University International Student & Scholar Statistics 2014 2 TABLE OF CONTENTS OVERVIEW OF INTERNATIONAL STUDENT & SCHOLAR POPULATION 3 DETAILED INFORMATION ON INTERNATIONAL STUDENT POPULATION

More information

INTERNATIONAL TRADEMARK REGISTRATION UNDER THE MADRID PROTOCOL

INTERNATIONAL TRADEMARK REGISTRATION UNDER THE MADRID PROTOCOL INTERNATIONAL TRADEMARK REGISTRATION UNDER THE MADRID PROTOCOL Presented to The American Bar Association Spring Meeting Washington, D.C., April 24, 2013 Bruce Alexander McDonald BUCHANAN INGERSOLL & ROONEY

More information

CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK)

CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK) DATA SHEET CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK) Cisco Systems IP Phone Services bring the power of the World Wide Web to Cisco IP Phones. An integral part of a Cisco AVVID (Architecture

More information

Non-Resident Withholding Tax Rates for Treaty Countries 1

Non-Resident Withholding Tax Rates for Treaty Countries 1 Non-Resident Withholding Tax Rates for Treaty Countries 1 firms Non-Resident Withholding Tax Rates for Treaty Countries 1 Country 2 Interest 3 Dividends 4 Royalties 5 Annuities 6 Pensions/ Algeria 15%

More information

Proforma Cost for international UN Volunteers for UN Partner Agencies for 2016. International UN Volunteers (12 months)

Proforma Cost for international UN Volunteers for UN Partner Agencies for 2016. International UN Volunteers (12 months) Proforma Cost for international UN Volunteers for UN Partner Agencies for 2016 Country Of Assignment International UN Volunteers (12 months) International UN Youth Volunteers (12 months) University Volunteers

More information

Netherlands Country Profile

Netherlands Country Profile Netherlands Country Profile EU Tax Centre March 2012 Key factors for efficient cross-border tax planning involving Netherlands EU Member State Yes Double Tax Treaties With: Albania Czech Rep. Jordan Nigeria

More information

Overview menu: ArminLabs - DHL Medical Express Online-Pickup: Access to the Online System

Overview menu: ArminLabs - DHL Medical Express Online-Pickup: Access to the Online System Access to the Online System Overview menu: Create shipment: Preselected - Here you can order your shipment including the Pickup 0049 821 78093150 ArminLabs DHL Medical Express Online-Pickup-Manual DHL

More information

CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER

CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER PRODUCT BULLETIN NO. 2438 CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER NEW FEATURES New features of the Cisco Content Switching

More information

HEALTHIEST COUNTRIES 1 to 40

HEALTHIEST COUNTRIES 1 to 40 BLOOMBERG RANKINGS THE WORLD'S HEALTHIEST COUNTRIES HEALTHIEST COUNTRIES 1 to 40 1 Singapore 89.45% 92.52% 3.07% 2 Italy 89.07 94.61 5.54 3 Australia 88.33 93.19 4.86 4 Switzerland 88.29 93.47 5.17 5 Japan

More information

YTD 2015-27 CS AWARDS IN AMERICAS

YTD 2015-27 CS AWARDS IN AMERICAS YTD 2015-27 CS AWARDS IN AMERICAS Argentina Bolivia Brazil Frontline Customer Service Team of the Year, All Industries (Bronze) Customer Service Department of the Year, Airlines, Distribution & Transportation

More information

Audio Conferencing Service Comprehensive Telecommunications Services Group Number 77017 Award Number 20268 Contract Number PS63110

Audio Conferencing Service Comprehensive Telecommunications Services Group Number 77017 Award Number 20268 Contract Number PS63110 Audio Conferencing Comprehensive Telecommunications s Number PS63110 Audio Conferencing, Function or Device Reservationless Conferencing Solution Setup Meeting Center Multimedia Minute - Self-, Automated

More information

E-Seminar. Financial Management Internet Business Solution Seminar

E-Seminar. Financial Management Internet Business Solution Seminar E-Seminar Financial Management Internet Business Solution Seminar Financial Management Internet Business Solution Seminar 3 Welcome 4 Objectives 5 Financial Management 6 Financial Management Defined 7

More information

International Higher Education in Facts and Figures. Autumn 2013

International Higher Education in Facts and Figures. Autumn 2013 International Higher Education in Facts and Figures Autumn 2013 UK Higher Education International Unit International higher education in facts and figures covers the majority of the UK higher education

More information