Businesses in the UK experienced attacks from 1,200 different malware last month alone, according to the latest research.

UK businesses experienced more cyber attacks than the US and Ireland during November 2015, counting more than 1,200 different types of malware according to cyber security provider Check Point.

The Kelihos Trojan was the most frequently used attacker in the UK, according to the firm, followed by the Necurs malware family, which was the third most frequent attack globally.

Necurs reportedly grew 30 times compared to its use in October and is often used in conjuction with Bedep, another Trojan that grew 250 times in the same month.

The firm links the rise of both to the rise of high-profile malvertising campaigns using the Angler exploit kit.

The Conficker worm was the third most popular attacker in November in the UK, and globally accounted for 40 per cent of all attacks along with Necurs and Cutwail.

Analysts at Check Point said this implies cyber criminals are still focusing on remotely accessing and controlling machines to turn them in to spambots and conduct distributed denial of service attacks.

Overall, the UK was the 116th most attacked country and was attacked more frequently than the US, which placed 117th and Ireland, which placed 124th.

However, it was less regularly attacked than Canada, which placed 11th, Germany, which placed 99th, and France, which placed 52nd.

Analysts were concerned, however, by the overall rise of mobile malware, which rose by 17 per cent in November alone.

However, the report adds that the global rise is driven by China and emphasises that users choosing to stick to the legitimate Google Play Store will mostly be safe from similar threats.

“Organisations face a daily battle to ensure that their networks are not compromised by cyber criminals and it is vital that they know what they are up against,” said head of threat prevention Nathan Shuchami. “The data for November highlights the fact the attackers are focusing their efforts on malware that can disable security services and infect machines stealthily, so they can be more easily exploited.”

You may also like...

Keep Up To Date - Subscribe To Our Email Newsletter Today

Get the latest industry news direct to your inbox on all your devices.

We may use your information to send you details about goods and services which we feel may be of interest to you. We will process your data in accordance with our Privacy Policy as displayed on our parent website