Kenya Cyber Security Report 2015

Kenya Cyber-Intelligence Statistics
Top Malicious Activity in Kenya
Malware attacks, Denial of Service (DOS) attacks and
Adware attacks took the lead during this year’s cyber

77%

security analysis in terms of volume.

Malware
Attacks
attacks

23%

Denial of Service,
Adware & Spyware
Attacks

41,377

Malware Categories
68% of the malware category was uniquely customized
for the African Region. The Virut malware is slowly
Customized
Malware

penetrating the Kenyan cyberspace. Once it has

68%

successfully penetrated the computer, this type of
malware is able to spread itself by copying to fixed,
removable and network drives.

Local Malware Variants

Gh0st RAT Trojan
Backdoor.Win32.PcClient
Is a backdoor Trojan family with
several components including a
key logger, backdoor
and a root kit.

MultiPlug.J Checkin

a Trojan horse for windows
platform that users of gh0st net use
to obtain unauthorized access to
remote computers thus
gaining real time access of
the systems.

Is an adware that exhibits
malicious traits such as root kit
capabilities.

Win32.Sality

Infects files on local,
removable and shared drives.
It propagates itself from one PC
to another. A bot creates a P2P
connection and receives URL’s of
additional files to download,
after download these files
are decrypted and
executed.

39

Select target paragraph3