Trojans still reigning in malware top 10
Trojans dominate GFI Software's top 10 malware threats of February.
Trojan-based attacks continue to be the biggest malware treat, a report from GFI Software has shown.
Trojans account for six of the top 10 malware threats of February and the report also confirmed the supremacy of Trojan.Win32.Generic!BT as the number one bug, growing from last month to 22.97 per cent of total detections.
Once in a user's system, these Trojans, associated with fake security programs, perform a scan of the computer and produce false warnings so that victims who take the bait buy malicious security software.
"These types of attacks notoriously cause a great deal of stress for the victim in addition to simply infecting their computer," said Chris Boyd, senior threat researcher at GFI Labs.
GFI Labs also pointed to the growth of other forms of malware, which tend to be harder to detect. Among those are PDF exploits, which have shown a small increase since January.
"PDF exploits continue to be problematic, showing a small increase since January. February has also seen continued use of fake Java applet installs to infect PCs with malware," Boyd said.
"With new attacks popping up every day, users need to always stay cautious and research programs they plan to download when there is any doubt."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
He also pointed to infected videogame patches distributed on P2P networks and phishing attempts on popular retailer Play.com.
-
What does modern security success look like for financial services?Sponsored As financial institutions grapple with evolving cyber threats, intensifying regulations, and the limitations of ageing IT infrastructure, the need for a resilient and forward-thinking security strategy has never been greater
-
Yes, legal AI. But what can you actually do with it? Let’s take a look…Sponsored Legal AI is a knowledge multiplier that can accelerate research, sharpen insights, and organize information, provided legal teams have confidence in its transparent and auditable application
-
Hackers are stepping up ‘qishing’ attacks by hiding malicious QR codes in PDF email attachmentsNews Malicious QR codes hidden in email attachments may be missed by traditional email security scanners, with over 500,000 qishing attacks launched in the last three months.
-
Adobe Reader and Adobe Acrobat zero-day flaws to be fixed this weekNews Adobe Reader and Adobe Acrobat will be patched in the coming days.
-
Adobe overhauls digital signing system post-attackNews Software giant rushes to fix signing system following discovery of digitally signed malware.
-
Another Adobe zero day strikesNews Adobe Acrobat and Reader are affected by the critical vulnerability, as the software maker scrambles to issue a fix.
-
BlackBerry fixes critical Enterprise Server flawNews RIM issues patches and a workaround for a critical vulnerability in its BlackBerry Enterprise Server.
-
How to protect a group of office PCs from virusesTutorials Safeguarding multiple office computers from malware doesn't have to be difficult or expensive, as Simon Edwards shows in our step-by-step guide.
-
Top 10 malware list shows rise of fake anti-virusNews The top 10 malware threat list from Sunbelt Software has provided further proof of the rise of fake anti-virus software.
-
Adobe Reader and IE feel brunt of web-based malwareNews Symantec's latest annual report shows PDF-based attacks accounted for nearly half of all online attacks in 2009, with 240 million new threats identified in total.