Vulnerabilities / Threats
10/31/2007
04:23 AM
50%
50%

BitDefender Reports Top 10 Malware

Peed Trojan, aka Storm worm, remains in the top spot

BUCHAREST, Romania -- BitDefender®, a global provider of award-winning antivirus software and data security solutions, announced today its Top 10 malware threats in October 2007. According to BitDefender Labs, this month's top ten threats make up 65.56 percent of all malware detected. The flatter malware curve seen in recent months continued in October, with the first three spots on the monthly top ten threats list occupied by generic signatures, detection rules which stand in for all the malware using a particular infection or obfuscation technique, and not a single piece of malware.

The first spot on October’s list continued to be occupied by trojan downloaders such as the Peed Trojan, aka the Storm worm. The old exploit Exploit.Win32.WMF-PFV takes the second spot on the list due to the fact that it found its way into the code of many different worms as another means of attempting infections.

Packer.Malware.NSAnti.J comes in third on the list. Packer.Malware.NSAnti.J are actually programs that had been packed/protected with a protection system called NSAnti, used by malware authors to bypass anti-virus protection and to hide malware contents. The packer itself is polymorphic and has the ability to detect if it's running in a virtualized environment and attempts to crash it upon detection. This makes automated detection of new versions more difficult.

The middle of October’s malware list is occupied by old and very old mass mailer viruses, proving once again that, with the wonders of backups and highly reliable computers, viruses never truly die.

BitDefender’s October 2007 Top 10 malware list includes:

  1. BehavesLike:Trojan.Downloader 20.36%

  2. Exploit.Win32.WMF-PFV 17.51%

  3. Packer.Malware.NSAnti.J 10.49%

  4. Win32.Netsky.P@mm 6.56%

  5. Win32.NetSky.D@mm 2.06%

  6. Win32.Netsky.AA@mm 2.00%

  7. Win32.Nyxem.E@mm 1.90%

  8. Trojan.VBS.Autorun.J 1.79%

  9. Win32.Sality.M 1.46%

  10. Trojan.Agent.AFIS 1.43%

"All in all, it's been a rather eventful month" declared Viorel Canja for BitDefender. "We're seeing lots and lots of new viruses and a general tendency towards ever-stealthier malware which gets updated at a fantastic clip. Once again, B-HAVE and other automated detection techniques have proved crucial in keeping our customers safe".

BitDefender

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.