Latest (all topics)
Top stories
Web site of the day
Gadget of the day
Video of the day
Innovations
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
Malware Writers Stick To Same Old Plot
 
Fraud, stealing information and developing botnets are still top of the agenda for malware writers according to the latest data from ESET’s ThreatSence.Net, which reports on the threats seen attacking user systems around the world.

In December, seven out of the top ten threats were Trojans specifically designed to gain unauthorised access to infected machines in pursuit of criminal activity, demonstrating their popularity with malware writers today.

Unlike viruses or worms, Trojans are not able to replicate and infect files on their own, but even so they are one of the most prolific and stealthy threats in the wild. This is because attackers have been able to develop increasingly sophisticated data stealing malware using Trojans that is difficult to detect using purely signature-based anti-virus systems.

“For instance, Swizzor is created using an autogeneration routine, which means that every time it is downloaded it is likely to be different,” explains Paul Brook, managing director of ESET UK. “Because of this, several thousand variants of this Trojan are created every day, so proactive detection is a must when it comes to protecting users against it.”

Win32/TrojanDownloader.Swizzor, which reached the number three spot in the top ten threats for December, was the most detected threat during the first six months of 2006, experiencing a decrease during July and following months. This Trojan can be covertly installed from certain Web sites or be delivered through spammed email. When the Trojan is executed, it installs several Spyware tracking programs.

Other Trojans in the top ten include Win32/TrojanClicker.Small.KJ, which tries to download and execute other executable files from the internet, allowing a remote attacker to get unauthorised access to infected systems; Win32/PSW.Lineage.DN, which is able to steal sensitive information from infected computers; and JS/TrojanDownloader.Agent.BI, which is frequently used to develop botnets among infected computers.

Top 10 Threats for December 2006:

1. Win32/TrojanClicker.Small.KJ – 2.79%
2. Win32/PSW.Lineage.DN – 2.37%
3. Win32/TrojanDownloader.Swizzor – 2.09%
4. Win32/Netsky.Q – 1.81%
5. Win32/TrojanDownloader.Zlob – 1.68%
6. Win32/PSW.Agent.NBJ – 1.68%
7. JS/TrojanDownloader.Agent.BI – 1.21%
8. Win32/Adware.Boran – 1.19%
9. Win32/Rbot – 0.99%
10. Win32/Brontok.A – 0.97%

[Best Security Software Pricing UK]
[Best Security Software Pricing US]




 
BIOS, Jan 04, 07 | Print | Send | Comments (0) | Posted In Security
Related Articles

People Cannot Be Patched
Steganos Security Suite 2007
Creating A Culture Of Security
Panda Software Internet Security 2007
Malware Shift Creates New Challenges
Porn Affects Your Pupils!
Nuwar.B Worm Drives Up Stock Market Prices
'Happy New Year' Worm Spreading Rapidly
Fraudsters Cook Up Keylogging Surprises
Norton 360 Beta For Vista Now Available

More...
   
     
© 2006 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Statistics By OneStat - Sponsored By Ipswitch