Skip to main content

Monthly Malware Statistics: July 2009

August 3, 2009

This malware rating is compiled from data generated by the Kaspersky Security Network (KSN)

The first Top Twenty lists malicious programs, adware and potentially unwanted programs that were detected and neutralised when accessed for the first time, i.e. by using the on-access scanner. Using on-access statistics makes it possible to analyse the most recent, most dangerous and most widespread malicious programs that were blocked when launched on users' computers or when downloaded from the Internet.

PositionChange in positionNameNumber of infected computers
1   0Net-Worm.Win32.Kido.ih  51126  
2   0Virus.Win32.Sality.aa  24984  
3   1Trojan-Downloader.Win32.VB.eql  9472  
4   2Trojan.Win32.Autoit.ci  8250  
5   0Worm.Win32.AutoRun.dui  6514  
6   1Virus.Win32.Virut.ce  5667  
7   3Virus.Win32.Sality.z  5525  
8   1Net-Worm.Win32.Kido.jq  5496  
9   -1Worm.Win32.Mabezat.b  4675  
10   4Net-Worm.Win32.Kido.ix  4055  
11   -8Trojan-Dropper.Win32.Flystud.ko  3764  
12   5Packed.Win32.Klone.bj  3677  
13   -1Virus.Win32.Alman.b  3571  
14   1Worm.Win32.AutoIt.i  3524  
15   -2Packed.Win32.Black.a  3472  
16   -5Trojan-Downloader.JS.LuckySploit.q  3335  
17   1Email-Worm.Win32.Brontok.q  3007  
18   2not-a-virus:AdWare.Win32.Shopper.v  2841  
19   0Worm.Win32.AutoRun.rxx  2798  
20  NewIM-Worm.Win32.Sohanad.gen  2719  

There were no significant changes to the first Top Twenty in July: Kido and Sality remain the runaway leaders.

However, the overall number of computers infected by the most common malicious programs has fallen slightly. This may have something to do with users spending less time in front of their PCs in midsummer, resulting in fewer machines becoming infected with malware.

PositionChange in positionNameNumber of infected web pages
1   0Trojan-Downloader.JS.Gumblar.a  8538  
2   2Trojan-Clicker.HTML.IFrame.kr  7805  
3   2Trojan-Downloader.HTML.IFrame.sz  5213  
4   -1Trojan-Downloader.JS.LuckySploit.q  4719  
5   NewTrojan-Downloader.HTML.FraudLoad.a 4626  
6   0Trojan-Downloader.JS.Major.c  3778  
7   NewTrojan-GameThief.Win32.Magania.biht  2911  
8   NewTrojan-Downloader.JS.ShellCode.i  2652  
9   -1Trojan-Clicker.HTML.IFrame.mq  2576  
10   NewExploit.JS.DirektShow.o  2476  
11   -2Trojan.JS.Agent.aat  2402  
12   NewExploit.JS.DirektShow.j  2367  
13   NewExploit.HTML.CodeBaseExec  2266  
14   0Exploit.JS.Pdfka.gu  2194  
15   NewTrojan-Downloader.VBS.Psyme.ga  2007  
16   NewExploit.JS.DirektShow.a  1988  
17   -10Trojan-Downloader.Win32.Agent.cdam  1947  
18   -5Trojan-Downloader.JS.Agent.czm  1815  
19   -17Trojan-Downloader.JS.Iframe.ayt  1810  
20   NewTrojan-Downloader.JS.Iframe.bew  1766  

Things are a lot more interesting in the second Top Twenty, which presents data generated by the web antivirus component and reflects the online threat landscape. This ranking includes malicious programs detected on web pages and malware, which attempted to load from web pages. In other words, the second ranking answers two questions: “What malware most often infects web pages?” and “Which malicious programs are most often downloaded - with or without the user's knowledge - from malicious or infected pages?”

Looking at the rating, we can see three script exploits named DirektShow. We wrote about the Internet Explorer vulnerability this script exploits in early July (http://www.viruslist.com/en/weblog?weblogid=208187760). As Internet Explorer is the browser of choice for the majority of users, it's no surprise that this vulnerability was immediately heavily exploited by cybercriminals.

Recently there has been a tendency for cybercriminals to split malicious scripts into several parts – in the case of DirektShow, the main page with the exploit for the msvidctl vulnerability contains a link to another script that downloads shell code with its own malicious payload. Trojan-Downloader.JS.ShellCode.i, in eighth place in our rating, is the shell code most commonly used to exploit this vulnerability. This approach is straightforward and is particularly beneficial for the cybercriminal – the shell code script can be replaced at any time but the link to the main page remains the same. This set-up makes it more difficult to analyse and create detection for such malware, and where automated systems are used, it may be impossible.

In order to make spreading malware (specifically ransomware in the form of rogue antivirus applications) easier, the same web templates will be used over and over again. Trojan-Downloader.HTML.FraudLoad.a – a new entry in July – is an example of this approach; this detection actually detects one of the stock templates. Such malware is becoming increasingly popular in the world of cybercrime. As a result, a huge number of websites are appearing which claim that the user's computer is infected, and then download programs that are not only annoying, but also often pose a real threat. In twentieth place in July’s rating – Trojan-Downloader.JS.Iframe.bew – is one such script used to download malicious programs from such sites.

The second Top Twenty provides an overview of the current online threats as well as the underlying trends. Firstly, cybercriminals are focusing on finding new vulnerabilities in the most popular software with the aim of exploiting them to achieve their goal – infecting computers with one or, more often than not, several malicious programs. Secondly, cybercriminals attempt to hide their activity so that it either passes unnoticed, or seems to be resulting in minimal damage to the infected machine.

All this makes surfing the Internet without a fully-patched operating system or an up-to-date antivirus solution tantamount to swimming in shark-infested waters – and this applies to even the most experienced users.

Monthly Malware Statistics: July 2009

This malware rating is compiled from data generated by the Kaspersky Security Network (KSN)
Kaspersky logo

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection, specialized security products and services, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help over 200,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Related Articles Press Releases