Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

02:37 AM

Webroot Announces Most Common Threats

Webroot Software announces the most common forms of malicious security threats in the UK, at InfoSecurity Europe 2007

LONDON -- Webroot Software, Inc., a leading provider of security software for the consumer, enterprise and SME markets, today announces the most common forms of malicious security threats in the UK, at InfoSecurity Europe 2007, Grand Hall, Olympia, London.

During the month of March, Trojan Downloader Zlob was the most commonly found Trojan worldwide. Some variants of the Trojan are capable of providing a hacker with the ability to remotely control and use the infected computer for malicious purposes. The Trojan disguises itself as a harmless program and is generally distributed as an email attachment. It often silently downloads and installs bogus security programs such as SpywareQuake, SpyFalcon, SpyLocked and WinAntivirusPro, but may install other malware as well.

In Webroot's monthly analysis of the most common forms of malicious attack, conducted by the company's automated spyware research system Phileas, 180search Assistant/Zango is identified as being the most widespread adware. Following closely behind is Hotbar/Zango and Starware Toolbar, an extremely high-level threat, capable of tracking a users' internet surfing habits and delivering information to a third party.

Perfect Keylogger is the most regular System Monitor, a critical threat capable of tracking software used to monitor computer activity. System Monitors range in capabilities and may monitor key strokes; emails; chat room conversations; instant messaging; websites visited; running programs; usernames and passwords. This information is gathered via remote access and stored or sold to a third party for criminal or immoral use.

Webroot Software Inc.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.