Vulnerabilities / Threats
04:23 AM

BitDefender Reports Top 10 Malware

Peed Trojan, aka Storm worm, remains in the top spot

BUCHAREST, Romania -- BitDefender®, a global provider of award-winning antivirus software and data security solutions, announced today its Top 10 malware threats in October 2007. According to BitDefender Labs, this month's top ten threats make up 65.56 percent of all malware detected. The flatter malware curve seen in recent months continued in October, with the first three spots on the monthly top ten threats list occupied by generic signatures, detection rules which stand in for all the malware using a particular infection or obfuscation technique, and not a single piece of malware.

The first spot on October’s list continued to be occupied by trojan downloaders such as the Peed Trojan, aka the Storm worm. The old exploit Exploit.Win32.WMF-PFV takes the second spot on the list due to the fact that it found its way into the code of many different worms as another means of attempting infections.

Packer.Malware.NSAnti.J comes in third on the list. Packer.Malware.NSAnti.J are actually programs that had been packed/protected with a protection system called NSAnti, used by malware authors to bypass anti-virus protection and to hide malware contents. The packer itself is polymorphic and has the ability to detect if it's running in a virtualized environment and attempts to crash it upon detection. This makes automated detection of new versions more difficult.

The middle of October’s malware list is occupied by old and very old mass mailer viruses, proving once again that, with the wonders of backups and highly reliable computers, viruses never truly die.

BitDefender’s October 2007 Top 10 malware list includes:

  1. BehavesLike:Trojan.Downloader 20.36%

  2. Exploit.Win32.WMF-PFV 17.51%

  3. Packer.Malware.NSAnti.J 10.49%

  4. [email protected] 6.56%

  5. [email protected] 2.06%

  6. [email protected] 2.00%

  7. [email protected] 1.90%

  8. Trojan.VBS.Autorun.J 1.79%

  9. Win32.Sality.M 1.46%

  10. Trojan.Agent.AFIS 1.43%

"All in all, it's been a rather eventful month" declared Viorel Canja for BitDefender. "We're seeing lots and lots of new viruses and a general tendency towards ever-stealthier malware which gets updated at a fantastic clip. Once again, B-HAVE and other automated detection techniques have proved crucial in keeping our customers safe".


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.