Vulnerabilities / Threats
10/31/2007
04:23 AM
50%
50%

BitDefender Reports Top 10 Malware

Peed Trojan, aka Storm worm, remains in the top spot

BUCHAREST, Romania -- BitDefender®, a global provider of award-winning antivirus software and data security solutions, announced today its Top 10 malware threats in October 2007. According to BitDefender Labs, this month's top ten threats make up 65.56 percent of all malware detected. The flatter malware curve seen in recent months continued in October, with the first three spots on the monthly top ten threats list occupied by generic signatures, detection rules which stand in for all the malware using a particular infection or obfuscation technique, and not a single piece of malware.

The first spot on October’s list continued to be occupied by trojan downloaders such as the Peed Trojan, aka the Storm worm. The old exploit Exploit.Win32.WMF-PFV takes the second spot on the list due to the fact that it found its way into the code of many different worms as another means of attempting infections.

Packer.Malware.NSAnti.J comes in third on the list. Packer.Malware.NSAnti.J are actually programs that had been packed/protected with a protection system called NSAnti, used by malware authors to bypass anti-virus protection and to hide malware contents. The packer itself is polymorphic and has the ability to detect if it's running in a virtualized environment and attempts to crash it upon detection. This makes automated detection of new versions more difficult.

The middle of October’s malware list is occupied by old and very old mass mailer viruses, proving once again that, with the wonders of backups and highly reliable computers, viruses never truly die.

BitDefender’s October 2007 Top 10 malware list includes:

  1. BehavesLike:Trojan.Downloader 20.36%

  2. Exploit.Win32.WMF-PFV 17.51%

  3. Packer.Malware.NSAnti.J 10.49%

  4. [email protected] 6.56%

  5. [email protected] 2.06%

  6. [email protected] 2.00%

  7. [email protected] 1.90%

  8. Trojan.VBS.Autorun.J 1.79%

  9. Win32.Sality.M 1.46%

  10. Trojan.Agent.AFIS 1.43%

"All in all, it's been a rather eventful month" declared Viorel Canja for BitDefender. "We're seeing lots and lots of new viruses and a general tendency towards ever-stealthier malware which gets updated at a fantastic clip. Once again, B-HAVE and other automated detection techniques have proved crucial in keeping our customers safe".

BitDefender

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.