Samker's Computer Forum - SCforum.info

World TOP Headlines: => Latest Security News & Alerts => Topic started by: Samker on 27. September 2011., 15:57:34

Title: "FraudLoad" fake antivirus accounted 58% malware activity in August (W32/Yakes)
Post by: Samker on 27. September 2011., 15:57:34
(http://2.bp.blogspot.com/_UnGEzgAXTls/SwgOm290kOI/AAAAAAAAAIM/5vZjMrhh2TM/s1600/lens2362820_1231132956computer_virus_250x251.jpg)

Zeus Botnet variant takes 2nd place in monthly malware activity due to its source code being cracked and leaked.


Fortinet - a leading network security provider and the worldwide leader of unified threat management (UTM) solutions - today released its latest Threat Landscape report: http://www.fortiguard.com/fortiguard_labs/report-2011-09-21.html (http://www.fortiguard.com/fortiguard_labs/report-2011-09-21.html) , which reveals the fake antivirus loader W32/FraudLoad.OR accounted for 58 percent of the new malware activity tracked in August.

"Traditionally, FraudLoad installs fake antivirus utilities on an unsuspecting user's system, but in our labs, we find that it is all too common for botnet loaders like this to download additional malware such as spam bots," said Derek Manky, senior security strategist at Fortinet.

Right behind FraudLoad, a newly discovered Zeus botnet variant was the second most active malware this period.

"The surge in Zeus activity doesn't surprise us given the botnet's popularity and the fact that its source code was hacked and subsequently leaked to the public last May," Manky continued. "We believe it's highly likely that we will continue to see Zeus and SpyEye − another popular botnet whose source code was also recently cracked and leaked publicly − to spread in waves in the coming months."

In addition, this period the W32/Yakes botnet loader and four variants were observed spreading through spam emails using traditional major credit card manufacturer templates. The email that arrives at the victim's inbox typically carries the subject line "Credit card is blocked." The text within the email explains that the recipient's credit card was involved with illegal operations and has been disabled. The email then advises the recipient to open an attached file for details. When the user clicks on the attachment, the Yakes botnet is installed onto their computer.

(Nation)