Over the past week, several of our readers have shared with us that they saw unique malware samples in 2008.
| – In the first eight months of 2010 alone, PandaLabs, Panda Security’s research lab, received more viruses than in the previous 17 years combined.
– Trojans were the main source of malware infection in 2008.
– Malicious malware is one of the threats that have skyrocketed over the past year.
– Pandalabs Annual Report 08 can be downloaded here: http://pandasecurity.lin3sdev.com/enterprise/security-info/tools/reports.htm
In 2008, PandaLabs, Panda Security’s Trojan horse research laboratory, detected an average of 35,000 malicious products daily, including 22,000 new infections. By the end of Christmas, the number of malware detected by the owner of the Spanish home of security exceeded 15 million. This number was initially surpassed by more than $ 5 million. The malware explosion resulted in more malware detected by PandaLabs in the first eight months of 2008 than the company has collected in the past 17 years.
99% of these new threats will be automatic and detected by Panda using the latest intelligent Security technology that compares and detects malware in the cloud.
The number of new malware (67.7%) appears to be in the Trojan category, which means that it was previously designed to steal sensitive data types such as bank passwords, etc.
“Computer users often underestimate the threat posed by malware. For this reason, in many cases, they will not enforce security standards for their computers. The reality is that malware has grown exponentially in recent years, and this important false sense of security is helping cybercriminals infect more computers without being detected, ”says Luis Corrons, CTO, PandaLabs
Trojans were the most prevalent malware with 70.1% of detections, followed by adware with 19.9% and worms with 4.22%. Together, these three types of infection make up the majority ofdetected malware (94%). In terms of epidemics, which increased the most in 2008, PandaLabs’ annual report usually notes the emergence of unscrupulous antivirus programs. Anti-malware malware is a special type of adware that tricks workstation users into believing that they have recently been seriously infected by several dangerous programs, and therefore, malware provides a paid solution that should remove infections. These fake antivirus programs together cost about $ 70 and, according to PandaLabs, bring in $ 13.65 million a month to their developers.
Banking Trojans were unique during the 2009 threats. The main purpose of this type of Trojans is to steal information from the victim’s money account in order to manage their bank accounts. Typically, these Trojans run silently on your computer’s storage device and are only activated when the fraudster visits certain banking websites.
“Cybercriminals are relatively easyGet these malicious programs, as there is an alarming market for specialized Trojan extension kits to create any Trojan horse that is impossible. it’s remote. review and accept new instructions, ”explains Luis Corrons.
The maximum number of active banking Trojans clinically determined by PandaLabs belongs to the following families:
1) Brazilian banking Trojans (Banbra, Bancos): they are primarily designed to steal bookmarks from Brazilian and Portuguese banks, but the Bancos family also sometimes targets Spanish banks. They usually transmit information received by e-mail using the file transfer protocol.
2) Russian Banking Trojans 1.0 (Cimuz, Goldun …): This type of Trojan horse is becoming less and less common over time due to the real lack of new features that would make them easier to detect. Beginning with nevarteles, many variations are still in circulation.
3) Russian banking Trojans 2.0 (Sinowal, Torpig, Bankolimb): Russian banks Trojans 2.0 (Sinowal, Torpig, Bankolimb): Created to replace their predecessors, variants of this family will constantly change and be updated, regardless of whether the common one is difficult to detect. All of these types have a common function: the checklist of target banks and organizations is necessarily taken from a configuration file that is either attached to the Trojan horse or obtained from a server that can be configured by an attacker for the Trojan itself. there is no need to change direction to get a new target bank.
PandaLabs’ Annual Report ’08 also provides information on the current most serious spam situation, the most important vulnerabilities in 2008 and trends in malware threats in 2009
Einzigartige Malware Beispiele 2008
Unikalnye Obrazcy Vredonosnyh Programm 2008 G
Unikalne Probki Zlosliwego Oprogramowania 2008
Amostras Exclusivas De Malware 2008
Echantillons De Logiciels Malveillants Uniques 2008
Muestras Unicas De Malware 2008
고유한 맬웨어 샘플 2008
Unieke Malware Voorbeelden 2008
Campioni Di Malware Unici 2008
Unika Malware Prover 2008