Vulnerabilities / Threats
10/31/2007
04:23 AM
Connect Directly
RSS
E-Mail
50%
50%

BitDefender Reports Top 10 Malware

Peed Trojan, aka Storm worm, remains in the top spot

BUCHAREST, Romania -- BitDefender®, a global provider of award-winning antivirus software and data security solutions, announced today its Top 10 malware threats in October 2007. According to BitDefender Labs, this month's top ten threats make up 65.56 percent of all malware detected. The flatter malware curve seen in recent months continued in October, with the first three spots on the monthly top ten threats list occupied by generic signatures, detection rules which stand in for all the malware using a particular infection or obfuscation technique, and not a single piece of malware.

The first spot on October’s list continued to be occupied by trojan downloaders such as the Peed Trojan, aka the Storm worm. The old exploit Exploit.Win32.WMF-PFV takes the second spot on the list due to the fact that it found its way into the code of many different worms as another means of attempting infections.

Packer.Malware.NSAnti.J comes in third on the list. Packer.Malware.NSAnti.J are actually programs that had been packed/protected with a protection system called NSAnti, used by malware authors to bypass anti-virus protection and to hide malware contents. The packer itself is polymorphic and has the ability to detect if it's running in a virtualized environment and attempts to crash it upon detection. This makes automated detection of new versions more difficult.

The middle of October’s malware list is occupied by old and very old mass mailer viruses, proving once again that, with the wonders of backups and highly reliable computers, viruses never truly die.

BitDefender’s October 2007 Top 10 malware list includes:

  1. BehavesLike:Trojan.Downloader 20.36%

  2. Exploit.Win32.WMF-PFV 17.51%

  3. Packer.Malware.NSAnti.J 10.49%

  4. Win32.Netsky.P@mm 6.56%

  5. Win32.NetSky.D@mm 2.06%

  6. Win32.Netsky.AA@mm 2.00%

  7. Win32.Nyxem.E@mm 1.90%

  8. Trojan.VBS.Autorun.J 1.79%

  9. Win32.Sality.M 1.46%

  10. Trojan.Agent.AFIS 1.43%

"All in all, it's been a rather eventful month" declared Viorel Canja for BitDefender. "We're seeing lots and lots of new viruses and a general tendency towards ever-stealthier malware which gets updated at a fantastic clip. Once again, B-HAVE and other automated detection techniques have proved crucial in keeping our customers safe".

BitDefender

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.