Trojan.AutorunInf.Gen - Top Malware for Three Consecutive Months
An anti-malware security solutions provider, BitDefender declared Top Five e-threats of April on May 3, 2010. April is the third consecutive month to see Trojan.AutorunInf.Gen as the top Internet threat. The Trojan represents 13.21% of the total global malware.
Notably, this Trojan is a generic malware group that assaults the Autorun utility in the Operating Systems of Microsoft Windows. By default, an Autorun.ini script exists in every detachable storage device. It directs the system as to which file needs to be run while the medium is plugged in. malware developers frequently fiddle with the file so that it launches various malicious applications.
As noted by BitDefender, the unparalleled hierarchy of Trojan.AutorunInf.Gen clearly indicates that computer users are still unaware of the damage that can be caused to them by the small gadgets if they are infected with this Trojan.
Then, second on BitDefender's April e-threat list is Win32.Worm.Downadup.Gen (Conficker or Kido). It is again noticed following the Trojan that ranked number one, with 5.77%.
Experts highlighted that Kido typically propagates across networks. If, unfortunately, it encounters a vulnerable computer, the worm blocks the automatic backup service. It then deletes the earlier restore points, cripples security services, prohibits access to security websites and opens up infected systems to accept additional programs created by the author of the malware. Then, the worm attempts to disseminate itself to various other machines that are present on the same network.
With 2.72% of the total infections, a newcomer 'Trojan.FakeAV.KUE' stands at the third spot. This Trojan recognizes a script that is known to be related to rogue anti-virus software. While visiting a hacked legitimate website or malicious sites, a user may face these scripts or associated rogue anti-virus programs.
At the fourth position is Win32.Sality.OG, with the 2.72% of the total infection amount in April. It is a tough job to detect and eradicate the Sality group which is protected by a polymorphic packer. Also, its rootkit component seeks to cripple various anti-virus applications that are installed on an infected machine.
Finally, at the fifth spot, stands the second new entrant Trojan.Keygen.AX (2.665%). This Trojan intercepts and stops threats associated with patches, cracks and keygens.. Creating patches and keys for different applications is commonplace over the Web, but it is risky and unlawful.
Related article: Trojans to Target VoIP in 2006
» SPAMfighter News - 14-05-2010