Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

January Sees Rise Of Multifunctional Worm

Kaspersky Lab UK : 11 February, 2011  (Technical Article)
Kaspersky Lab reports on january emergence of worm which uses e-mail to spread malicious links adding the users computer to botnets
The emergence of Email-Worm.Win32.Hlux dominated the malware landscape in January according to Kaspersky Lab, who has just announced the publication of its latest Monthly Malware Statistics.



This new worm spreads via emails containing malicious links that prompt users to install a fake Flash Player, purportedly to view an e-card. The link leads to a dialogue window that asks if the user agrees to download a file. Regardless of the response, the worm attempts to penetrate the system. In addition to propagating via email, Hlux has bot functionality and adds infected computers to a botnet before connecting to its command centre and executing its commands, which are primarily directed at sending pharmaceutical spam.



Another worrying trend in January was the growth in popularity of exploiting an online service or product. In January, a web page was detected that offered users the chance to install an updated version of Microsoft Internet Explorer and to activate it by sending an SMS to a premium-rate number.



The report also highlights how Kaspersky Lab detected a Trojan dropper masquerading as a key generator for the company’s products. This program typically works by launching two malicious programs. One of them steals program registration data and passwords for online games. The second is backdoor software that also has keylogger functionality.



In January, Kaspersky Lab experts witnessed the mass distribution of malicious short links on Twitter. After a number of redirects, the attention-grabbing links led users to a page promoting a rogue AV program.



“The majority of malware will attempt to conceal its presence on users’ computers and function without the users’ knowledge, especially the more sophisticated types. Cyber fraud, however, requires the participation of users. To prevent users falling victim to the various scams out there, it’s very important that they know about them,” warns Vyacheslav Zakorzhevsky, the author of the report.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo