Select Page

Tiger Woods videos are dangerous

SunbeltLabs, a U.S. research team at SunbeltLabs, also released its top list of the most infectious spyware and computer viruses in December 2010.

The list is compiled by Sunbelt experts based on automatic feedback from users who use VIPRE Antivirus + Antispysware and register on the Sunbelt ThreatNet ™ Malicious Network. Anyone who uses VIPRE antivirus or CounterSpy spyware remover, which can be used as a stand-alone layer of protection, can participate in the research.

Trojan rule

According to a report by SunbeltLabs, Trojans again caused the most infections in December: six out of 10 programs on the malware top list belonged to the Trojan family, and the number of infections they caused also increased. In the last month of 2009, Trojan.Win32.Generic! BT general detection is still to blame for most infections, and it has caused nearly three times more damage (19% of all infections can be attributed to its account) than Trojan-Spy.Win32 in second place. .Zbot (6,8%). The bronze medal was won in December by Trojan.ASF.Wimad (v), a group of infected Windows Media files (4,21%). In fourth place is Exploit.PDF-JS.Gen (v), which exploits the flaws in the JavaScript runtime of the PDF reader to download newer malware from remote sites, and the fifth is Trojans and worms belonging to the Trojan.Win32.AutoIt family. The sixth is the INF.Autorun family of malware that uses an automatic program executable file. The seventh position is occupied by a pseudo-antivirus, Trojan.Win32.FakeXPA, which does not remove pests, but downloads new viruses and Trojans. The Packed.Win32.Tdss (v) Trojan, which can also change the DNS settings of network routers, has been pushed back to eighth place. BehavesLike.Win32.Malware (v) behavior-based detection came in ninth, while Fast Browser Search came in tenth.

Search Engine Optimization Used by Trojan Developers Malware developers use everything to direct unsuspecting users to infected sites from which they can become enriched with additional malware. "Trojan writers also often use SEO techniques, i.e. search engine optimization, to deceive victims into infected websites that have Trojans lurking around the visitor." Says Michael St. Neitzel, vice president of research at Sunbelt Software. During the news in December, based on search terms, browsers had a good chance of reaching infected websites. The following terms proved to be the most dangerous:

  • "Brittany Murphy" (directed to websites selling fake antiviruses)
  • "Chromium OS download" (leads to Trojan-infected pages)
  • "New Year's Parades"
  • "Tiger Woods car crash" (directed to a page containing videos infected with a Trojan program)
  • "Tiger Woods Rumors"

Fraudulent antivirus developers make billions

Users can also be searched nicely with Trojans that harass false security alarms and encourage us to buy fake antivirus viruses. The FBI's Internet Abuse Detection Team estimates that criminal groups earned approximately $ 150 million (about $ 30 billion) in revenue by scaring shoppers paying for fake programs, and online teddy bears using fake antivirus to open bank passwords and credit cards through back gates. , access codes were obtained, not to mention the cost of eliminating infections and repairing them.

The most infectious pests during December 2009 are:

  1. Trojan.Win32.Generic! BT
  2. Trojan-Spy.Win32.Zbot
  3. Trojan.ASF.Wimad (v)
  4. Exploit.PDF-JS.Gen
  5. Trojan.Win32.AutoIt
  6. INF.Autorun (v)
  7. Trojan.Win32.FakeXPA (v)
  8. Packed.Win32.Tdss (v)
  9. BehavesLike.Win32.Malware (v)
  10. Fast Browser Search

    Related website: www.sunbelt.hu

About the Author