Members
  • Total Members: 12809
  • Latest: Dorel
Stats
  • Total Posts: 28478
  • Total Topics: 8238
  • Online Today: 797
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)












Author Topic: "FraudLoad" fake antivirus accounted 58% malware activity in August (W32/Yakes)  (Read 1262 times)

0 Members and 1 Guest are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7206
  • KARMA: 291
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum


Zeus Botnet variant takes 2nd place in monthly malware activity due to its source code being cracked and leaked.


Fortinet - a leading network security provider and the worldwide leader of unified threat management (UTM) solutions - today released its latest Threat Landscape report: http://www.fortiguard.com/fortiguard_labs/report-2011-09-21.html , which reveals the fake antivirus loader W32/FraudLoad.OR accounted for 58 percent of the new malware activity tracked in August.

"Traditionally, FraudLoad installs fake antivirus utilities on an unsuspecting user's system, but in our labs, we find that it is all too common for botnet loaders like this to download additional malware such as spam bots," said Derek Manky, senior security strategist at Fortinet.

Right behind FraudLoad, a newly discovered Zeus botnet variant was the second most active malware this period.

"The surge in Zeus activity doesn't surprise us given the botnet's popularity and the fact that its source code was hacked and subsequently leaked to the public last May," Manky continued. "We believe it's highly likely that we will continue to see Zeus and SpyEye − another popular botnet whose source code was also recently cracked and leaked publicly − to spread in waves in the coming months."

In addition, this period the W32/Yakes botnet loader and four variants were observed spreading through spam emails using traditional major credit card manufacturer templates. The email that arrives at the victim's inbox typically carries the subject line "Credit card is blocked." The text within the email explains that the recipient's credit card was involved with illegal operations and has been disabled. The email then advises the recipient to open an attached file for details. When the user clicks on the attachment, the Yakes botnet is installed onto their computer.

(Nation)

Samker's Computer Forum - SCforum.info





 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising