Kenya Cyber Security Report 2015
Kenya Cyber-Intelligence Statistics
Top Malicious Activity in Kenya
Malware attacks, Denial of Service (DOS) attacks and
Adware attacks took the lead during this year’s cyber
77%
security analysis in terms of volume.
Malware
Attacks
attacks
23%
Denial of Service,
Adware & Spyware
Attacks
41,377
Malware Categories
68% of the malware category was uniquely customized
for the African Region. The Virut malware is slowly
Customized
Malware
penetrating the Kenyan cyberspace. Once it has
68%
successfully penetrated the computer, this type of
malware is able to spread itself by copying to fixed,
removable and network drives.
Local Malware Variants
Gh0st RAT Trojan
Backdoor.Win32.PcClient
Is a backdoor Trojan family with
several components including a
key logger, backdoor
and a root kit.
MultiPlug.J Checkin
a Trojan horse for windows
platform that users of gh0st net use
to obtain unauthorized access to
remote computers thus
gaining real time access of
the systems.
Is an adware that exhibits
malicious traits such as root kit
capabilities.
Win32.Sality
Infects files on local,
removable and shared drives.
It propagates itself from one PC
to another. A bot creates a P2P
connection and receives URL’s of
additional files to download,
after download these files
are decrypted and
executed.
39