Large Scale Computer Infections by ZeroAccess during Q2-2012, Reports Kindsight
Kindsight, the company which provides analytics solutions and network associated security, recently published its 'Q2-2012 Security Labs malware Report' that highlights certain ZeroAccess botnet, which contaminated PCs within 1 home out of every hundred that had over 1.2m PCs worldwide, with 10% inside USA, leading to malevolent bandwidth usage and click fraud.
Security Architect Kevin McNamee who's also Kindsight Security Labs' Director stated that during the past few months the ZeroAccess was observed as making its command-and-control (C&C) system up-to-date as well as extensive for connecting with more than 1m PCs worldwide to contaminate an increasing number of systems. Disturbingly, ZeroAccess was consuming people's bandwidth for harmful operations causing greater monetary costs and further as any PC was compromised, fresh attacks were launched or more malware disseminated through it, he added. Siliconrepublic.com published this on July 19, 2012.
In the meantime, between April and June 2012, security researchers at Kindsight ranked the most widespread malware infecting home networks as Hijacker.MyWebSearchToolbar (No.1), Spyware.SCN-ToolBar (No.2), Hijacker.StartPage.KS (No.3), Adware.GameVance (Mo.4) and Mac.Bot.Flashback.K/I (No.5).
Also according to the report, 10% PCs, which DNSChanger had infected, were still un-sanitized as of June 2012 end, resulting in July 9, 2012 as another 'Internet Doomsday.'
In addition, during the second quarter, about 14% of residential computer networks had been contaminated with malware when there was a 50% rise in the total high-level threats, including backdoors, Trojans and bots, the study paper outlines.
Further, Kindsight reports that during April-June 2012, Apple substantiated about its products no more being invulnerable to malware. Unlike ever before, among the malicious programs attacking the Macintosh environment, the malware occupying the first place on the list of residential network infections by Kindsight Security Labs was 'Flashback.' Also, malicious software named "Find and Call," targeting iPhone, transmitted the friends' e-mail ids of infected end-users onto one remote server followed with spamming text messages and e-mails to the former set of people. So whilst malware growth, according to the report, is worrisome, the various kinds of malicious programs behind this growth require monitoring at the time of entering into the third quarter (July-September 2012), the security company concludes.
Related article: Large organizations not necessarily safe from bots
» SPAMfighter News - 27-07-2012