Kido Tops Kaspersky’s March 2010 Virus List
As per the security company Kaspersky's latest virus list (March 2010), the most widespread malicious program, Net-Worm.Win32.Kido.ir stands at the number one position.
The worm propagates through local networks and detachable storage devices. It disables the Windows' system restore utility, and restricts access to security sites and enables other malware to infect the system.
Win32.Sality.aa, better known as Virus.Win32.Sality.aa, is at the second position in the list. Sality is a virus that can install spyware, adware and other malware threats and produces corrupt files in Windows Win directories. After infecting the system, 'Virus.Win32.Sality.aa' stimulates several malware infections and downloads corrupt executable and scr files, resulting in unpredictable system speed.
As per the report, Net-Worm.Win32.Kido.ih, yet another variation of the computer worm Kido, is the third most widespread computer virus for the month. It too circulates through local networks and removable storage devices. As soon as the worm becomes active, it copies itself to remote systems, making a temporary file with an arbitrary extension.
Net-Worm.Win32.Kido.iq and Win32.FlyStudio.cu, occupying the fourth and the fifth position respectively in the list, belong to the same category of worm creation tool. These tools can normally produce up to thousands of distinct, functioning worms, most of which are initially untraceable by the scanners.
The report stated that Trojan-Downloader.Win32.VB.eql is a virus and stands at the sixth position. It might lead to loss of data and system crash. At position seven is Trojan.Win32.AutoRun.abj, which also falls under the worm creation tool category.
Moving ahead, Virus.Win32.Virut.ce, Packed.Win32.Krap.I and Worm.Win32.AutoIt.tc stand at eighth, ninth and tenth positions respectively.
The report revealed that most of the malware all over the world evolves from the US, China and Russia. The biggest culprit China has been held responsible for 23% of all malware detected by Kaspersky.
Despite being constantly urged to update their antivirus software, Kaspersky disclosed that some users are still negligent in this regard.
On a concluding note, Kaspersky stated that the overall scenario remains almost the same: attacks on users are basically Web-borne and exploit vulnerabilities that often emerge in some of the most famous software products. Luckily, these vulnerabilities are quickly patched by the vendors, but even then, most of the users fail to timely download these patches, as per the news published by mybroadband.co.za on April 7, 2010.
» SPAMfighter News - 17-04-2010