Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Rogue Security Software Remains At High Levels

GFI Software : 07 February, 2011  (Technical Article)
ThreatNet Statistics report from GFI Software demonstrates continued risk from rogue security software as well as increasing attacks on Adobe reader files
GFI Software has revealed continuing high levels of rogue security products circulating during January, and a surge in malware that takes aim at vulnerabilities within Adobe Reader and the .pdf file format – two of the top 10 detections are aimed at exploiting holes within Adobe. The top 10 data is compiled from monthly scans performed by GFI's award-winning anti-malware solution, Vipre Antivirus, and its antispyware tool, CounterSpy®, as a service of GFI Labs.



As was the case in December 2010, seven of the top 10 malware detections were Trojans, with those seven accounting for almost 34% of all malware detections for the month. ThreatNet also revealed an increase in the FakeVimes rogues that were reported last month, when FraudTool.Win32.FakeVimes!delf (v) hit the number nine spot with .73 percent of all detections. This represents a VIPRE heuristics detection for malicious code associated with the FakeVimes family of rogue security products, illustrating the continued growth of fake and compromised security applications as a means to circulate and covertly install malware onto PCs.



In January, a detection of PersonalInternetSecurity2011.FakeVimes (.64 percent of detections) was at the number 12 spot and the top 50 also included Antivirus8.FakeXPA, FraudTool.Win32.FakeVimes!VB (v) and Win32.FakeVimes!delf (v). There are approximately 17 rogues that are considered members of the FakeVimes family. They first appeared in January of last year.



Twitter users fell victim to a fake antivirus software scam in January as a number of accounts began distributing links promoting rogue security software. The attack used Google's Web address shortening service to conceal the links' destination. Twitter worked to reset passwords, but there is no telling how many users were led to malicious sites due to this phishing attack. GFI Software provided detailed instructions of how to remove the Security Shield fake antivirus program in one of its support forums.



“Another indicator of increased rogue activity is the fact that we discovered, and blogged about, 22 new rogues on the GFI Rogue Blog in January (http://rogueantispyware.blogspot.com/). That’s a lot for one month, considering we’ve seen an average of between 13 and 14 new iterations per month for the last three years,” said Tom Kelchner, communications and research analyst for GFI Software.



ThreatNet is GFI Lab’s monitoring system that retrieves real-time data from VIPRE installations. Statistics come from tens of thousands of machines running Vipre.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo