Informes sobre malware

Virus Top Twenty for December 2004

Position Change in position Name Percentage
1. New Email-Worm.Win32.Zafi.d 17.85
2. +2 I-Worm.Zafi.b 13.42
3. I-Worm.NetSky.q 10.85
4. +2 I-Worm.LovGate.w 9.77
5. I-Worm.NetSky.aa 9.50
6. – 4 I-Worm.Mydoom.ab 4.69
7. I-Worm.NetSky.b 4.46
8. + 6 I-Worm.Sober.i 4.19
9. I-Worm.Bagle.z 3.24
10. I-Worm.Mydoom.m 1.84
11. +1 I-Worm.NetSky.y 1.56
12. – 11 I-Worm.Bagle.at 1.29
13. + 4 I-Worm.NetSky.t 1.21
14. + 1 I-Worm.NetSky.d 1.14
15. + 1 I-Worm.Mydoom.l 1.07
16. New Trojan-Downloader.Win32.Agent.bg 0.96
17. New Trojan-Spy.HTML.Bankfraud.w 0.94
18. I-Worm.LovGate.ad 0.87
19. I-Worm.NetSky.r 0.68
20. I-Worm.Bagle.gen 0.57
Other malicious programs 9.90

2004 ended with the Hungarian Zafi twins pushing aside the big three, NetSky, Bagle and Mydoom, which had dominated the ratings all year. Zafi.d, first detected in October, leads the final ratings of the year: the worm gained ground steadily throughout November and shot to the fore by the end of December.

Zafi.b stayed right behind the newer variant. This earlier variant led the ratings in the summer, dropped back in the fall and regained lost ground in November and December to finish in second place.

November leaders Mydoom.ab and Bagle.at are dropping as rapidly as they appeared in the first place, with Bagle.at losing 10 places.

The Korean worm Lovgate.w is climbing steadily, reaching fourth place this month. A later variant, Lovgate.ad has stayed in the same position and it’s difficult to predict where it will go next year. Unlike other worms in the ratings, the Lovgate worms have not yet been mass-mailed using spammer technologies. Instead, they seem to be spreading in a classic manner, starting from a limited number of infected machines and gradually infecting new machines.
Sober.i re-appeared unexpectedly despite significant errors in the source code – we had predicted that it would disappear from the ratings, whereas the worm climbed in the top 10.

Most of the other email worms have changed position only slightly, if at all. Fortunately, we did not see any significant outbreaks caused by email worms this month. Instead, virus writers have focused on exploiting vulnerabilities in Internet Explorer and creating spyware and adware.

Trojan-Downloader.Win32.Agent.bq and Trojan-Spy.HTML.Bankfraud.w, two newcomers to the ratings, are both examples of this latter group.
Agent.bq was mass mailed several times using spammer technologies. This Trojan installs various AdWare programs and also collects data about the users Internet surfing habits.

Bankfraud.w is a classic phishing scam. The user receives a message purportedly from the Washington Mutual Internet Banking tech support service. The author uses social engineering techniques to encourage gullible users to go to the supposed Washington Mutual site and enter their personal information. Users who fall for this scam open their bank accounts to the criminals.

Summary:

New viruses: Zafi.d, Agent.bq, Bankfraud.w

Moved up: Zafi.b, Lovgate.w, Sober.i, Netsky.y, Netsky.t, Netsky.d, Mydoom.l

Moved down: Mydoom.ab, Bagle.at

No change: Netsky.q, Netsky.aa, Netsky.b, Bagle.z, Mydoom.m, LovGate.ad, Netsky.r, Bagle.gen

Virus Top Twenty for December 2004

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

 

Informes

MosaicRegressor: acechando en las sombras de UEFI

Encontramos una imagen de firmware de la UEFI infectada con un implante malicioso, es el objeto de esta investigación. Hasta donde sabemos, este es el segundo caso conocido en que se ha detectado un firmware malicioso de la UEFI usado por un actor de amenazas.

Dark Tequila Añejo

Dark Tequila es una compleja campaña maliciosa que tiene por objetivo a los usuarios ubicados en México, con el propósito principal de robar información financiera, así como credenciales de acceso a sitios populares que van desde versionado de código fuente a cuentas de almacenamiento de archivos en línea y de registro de dominios web.

De Shamoon a StoneDrill

A partir de noviembre de 2016, Kaspersky Lab observó una nueva ola de ataques de wipers dirigidos a múltiples objetivos en el Medio Oriente. El programa malicioso utilizado en los nuevos ataques era una variante del conocido Shamoon, un gusano que tenía como objetivo a Saudi Aramco y Rasgas en 2012.

Suscríbete a nuestros correos electrónicos semanales

Las investigaciones más recientes en tu bandeja de entrada