Malware authors hungry for profit

Powered by SC Magazine
 

Hackers creating increasing numbers of trojans and bots for financial gain.

The vast majority of malware is created with criminal intent as black-hat hackers turn from technical one-upmanship to seeking real financial gain, according to a new report.

Some 88 percent of the new malware detected in the second quarter of 2006 was related to cyber-crime, reported PandaLabs in its latest global report. 

"The results show how malware creators are concentrating on profiting from their efforts, creating increasing numbers of trojans and bots," said Luis Corrons, director of PandaLabs.

"The greatest danger is that trojans are installed and operate silently without users noticing any of the typical symptoms of infection, and victims are unaware that their computers are being used to steal from them or even from third parties."

Over 54 percent of the new malware detected by PandaLabs comprised trojans, compared to 47 percent in the previous quarter.

Trojans are highly versatile and can be used for a variety of nefarious actions such as stealing bank details or downloading other malicious applications.

Bot-building trojans, used to assemble networks of zombie PCs from which criminal gangs can launch denial of service attacks or spread spam, represented 16 percent of the total, up from 12 percent the previous quarter.

New backdoor trojans accounted for 12 percent, while rogue diallers represented just 3.8 per cent of all malware. Adware and spyware accounted for 1.7 percent.

Copyright ©v3.co.uk


Malware authors hungry for profit
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 340

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote