Symantec Publishes Top Ten New Malware Families Detected in 2008
According to Global ISTR (Internet Security Threat Report) Edition XIV released by Symantec in April 2009, the security company spotted 10 new families of malicious codes during 2008, out of which 6 were Trojan viruses while the remaining 4 belonged to worm families.
Trojan Brisv holds the first place among the spotted families, and was spotted during July 2008. The malware searches for multimedia folders on the computer. Then, it infects and modifies the folders that prompt Windows Media Player to activate vicious URLs.
Second on the list is Tidserv, an unusual malicious Trojan containing the characteristics of a rootkit. Upon its execution, Tidserv creates backdoor for external attackers and also prevents computers from connecting to security software sites as it infects both individual and network PCs.
Third is Auraax, a fresh malicious code family that Symantec spotted during 2008. Auraax is a worm that downloads other malware.
Blusod, a Trojan that affects Windows computers is positioned fourth on the Symantec's list. This Trojan downloads additional malware from the Internet and installs them on the infected PC.
Additionally, Symantec's report also mentions Ircbrute, a virus that creates a backdoor and is placed on No.5 position in the security company's list. This malware moves from PC to PC through infected USB flash drives. Once it infects a PC, the virus exposes the system to a hacker trying to gain access to the computer for pushing out unsolicited e-mails i.e. Ircbrute helps in spamming.
Next, on the sixth position, is another backdoor Trojan that Symantec identified as Spakrab. This virus enables a hacker to gain remote access and transmits to his server e-mail addresses and system data.
Further, on No.7 and No.8 positions are Wowinzi and Mandaph viruses respectively. While Wowinzi helps an attacker to gain remote access as well as transmits e-mail addresses and system data, Mandaph downloads additional malware.
Moreover, on the ninth spot is Brojack Trojan that changes Internet configurations and eliminates browser plug-ins. Finally, occupying the tenth spot is Trojan Mebroot that allows backdoor access and overwrites the MBR (Master Boot Record).
Related article: Sentence for American Contractor for Sabotaging Government Navy Computers
» SPAMfighter News - 5/11/2009
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!