New threats top April malware charts

Powered by SC Magazine
 

ESET, a security firm based in Bratislava, warned today that April showed "renewed vigour" in terms of malware threats.

The top five new threats represented nearly 14 per cent of all threat activity for the month, according to the company.

In first place was the much publicised Ani.Gen Trojan, which exploits the way in which Windows handles animated cursor (.ani) files.

Close to five per cent of all detections in April were Ani.Gen, as malware writers made the most of this latest vulnerability in Microsoft's operating system.

"This type of attack exposes even fairly sophisticated users to drive by attacks that can compromise their computers," said ESET director of education, Randy Abrams.

"The use of virtualisation technologies such as SandboxIE for web browsing can afford some protection, but email still remains a potential attack vector.

"Although forcing Outlook to render email in plain text is a mitigating tactic, Outlook Express will remain vulnerable even when configured to render email in plain text."

The PSW.Agent.NCC Trojan dropped from first place last month to second this month, accounting for 2.85 per cent of all detections during April.

This Trojan is part of a family used for stealing passwords through key-logging techniques. In third place was Win32/Pacex.Gen, a remarkably fast spreading mass-mailing worm discovered in March.

Botnet downloader Agent.AWF was fourth in April, with around 1.8 per cent of detections. This threat is used for downloading other malware from sites to create botnets for propagating spam and delivering distributed denial-of-service attacks.

Fifth place in April was Win32/Perlovga, a Trojan that has increased its presence during the current year.

Moving up from seventh place last month, Perlovga can be received by email, FTP or P2P applications. It is used to collect sensitive information from infected computers.

Copyright ©v3.co.uk


New threats top April malware charts
 
 
 
Top Stories
Westpac committed to core banking plan
[Blog post] Now with leadership.
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1163

Vote