Skip to main content

Monthly Malware Statistics: November 2009

December 4, 2009

Kaspersky Lab presents its monthly malware statistics for November

Malicious programs detected on users’ computers

The first Top Twenty lists malicious programs, adware and potentially unwanted programs that were detected and neutralized when accessed for the first time, i.e. by the on-access scanner.


PositionChange in positionNameNumber of infected computers
1   0Net-Worm.Win32.Kido.ir  330305  
2   NewNet-Worm.Win32.Kido.iq  174351  
3   -1Net-Worm.Win32.Kido.ih  145332  
4   0Virus.Win32.Sality.aa  128737  
5   0Worm.Win32.FlyStudio.cu  93848  
6   -3not-a-virus:AdWare.Win32.Boran.z  84825  
7   -1Trojan-Downloader.Win32.VB.eql  63287  
8   9Trojan-Downloader.WMA.GetCodec.s  48426  
9   1Virus.Win32.Virut.ce  47812  
10   -3Virus.Win32.Induc.a  46252  
11   -2Worm.Win32.AutoRun.awkp  36453  
12   -4Packed.Win32.Black.d  36422  
13   -2Packed.Win32.Black.a  35094  
14   -1Trojan-Dropper.Win32.Flystud.yo  34638  
15   -3Worm.Win32.AutoRun.dui  32493  
16   -1Packed.Win32.Klone.bj  31963  
17   1Worm.Win32.Mabezat.b  29804  
18   NewPacked.Win32.Krap.ag  26041  
19   NewTrojan-GameThief.Win32.Magania.ckqi  25529  
20   NewTrojan.Win32.Genome.bjgu  24730  

Overall, there was little change to the first rating, although there are a few points worth highlighting.

First of all, there is the new entry of Kido.iq that came straight in at 2nd place. This malicious program has very similar functionality to the leader, Kido.ir, which entered the ratings back in September.

Secondly, GetCodec.s rose 9 places overall, with the number of computers on which GetCodec was detected more than doubling in November. To recap, GetCodec.s spreads together with P2P-Worm.Win32.Nugg, just like GetCodec.r which we wrote about last December. It looks as though cybercriminals are making another attempt to spread P2P-Worm.Win32.Nugg via the Gnutella file sharing network Gnutella (and in this case, using the popular LimeWire application). This worm downloads other malicious programs, which act as an additional threat to users’ computers.

Another newcomer of note is Packed.Win32.Krap.ag. Just as other representatives of the Packed family do, Krap.ag detects a special packing program used to pack malicious programs. In this particular case, the malicious programs, which are concealed by a standard, but modified, packing program, are fake antivirus programs such as those we wrote about recently. In other words, 18th place in the rankings is effectively occupied by a rogue antivirus solution.

After returning to the ratings the Magania family of gaming Trojans has held on to 19th place, albeit with the new version Magania.ckqi replacing last month’s entry Magania.cbrt.

Malicious programs on the Internet

The second Top Twenty presents data generated by the web antivirus component, and reflects the online threat landscape. This ranking includes malicious programs detected on web pages and malware downloaded to victim machines from web pages.


PositionChange in positionNameNumber of attempted downloads
1   0Trojan-Downloader.JS.Gumblar.x  1714509  
2   1Trojan-Downloader.HTML.IFrame.sz  189881  
3   NewTrojan-Clicker.JS.Iframe.be  170319  
4   0not-a-virus:AdWare.Win32.Boran.z  136748  
5   0Trojan.JS.Redirector.l  130271  
6   NewTrojan.JS.Ramif.a  115163  
7   1Trojan.JS.Agent.aat  55291  
8   -2Trojan-Clicker.HTML.Agent.aq  47873  
9   NewTrojan.HTML.Fraud.r  47473  
10   -8Trojan-Downloader.JS.Gumblar.w  41977  
11   NewTrojan.JS.Iframe.dy  35152  
12   -5Trojan-Downloader.JS.Zapchast.m  31161  
13   NewTrojan-Downloader.JS.IstBar.cy  30806  
14   NewTrojan-Clicker.JS.Iframe.u  30553  
15   ReturnTrojan-Downloader.JS.Psyme.gh  30078  
16   NewTrojan-Downloader.HTML.FraudLoad.b  29466  
17   NewTrojan-Clicker.HTML.IFrame.ajn  29455  
18   NewTrojan.JS.PrygSkok.a  27804  
19   NewPacked.Win32.Krap.ag  26770  
20   -5Trojan-Downloader.JS.LuckySploit.q  26175  

Gumblar continues to dominate this rating with a huge gap separating it from the program in 2nd place. The number of unique attempts to download this malicious program increased nearly four times in November.

The latest Gumblar attack, which we described last month, continued unabated in November. Unlike the attack six months earlier this time all the components – the downloader, the exploits and the main executable file – were replaced or modified with alarming regularity.

Rogue antivirus programs also made it into the second rating. One method of spreading these programs is by downloading them to users’ machines from websites that are created using the same template and which are part of cybercriminal affiliate, or partner, programs. The web pages most commonly used to download fake antivirus solutions in November are detected by us as Trojan.HTML.Fraud.r and Trojan-Downloader.HTML.FraudLoad.b. Packed.Win32.Krap.ag, mentioned above, was also downloaded from these pages and this explains why it makes an appearance in the second Top 20 as well.

The other new entries (script downloaders which vary in sophistication and the degree of obfuscation used) follow recent trends.

November trends

The overall picture remained unchanged in November. At the moment, the most common strategy for spreading malware is to use a malicious script + exploit + executable file. More often than not, this is how malware designed to steal confidential data or extort money from users is spread. Such malware includes programs such as Trojan-PSW.Win32.Kates (the Gumblar attacks are primarily designed to download this malware); Trojan-Spy.Win32.Zbot, an extremely widespread Trojan that actively spreads using script downloaders and varied spam mass mailings; and numerous fake antivirus programs.

Another marked trend of recent months that continued in November was the use of websites created using standardized templates to spread rogue antivirus solutions.

Cybercriminals are also aggressively using packers (usually polymorphic) in the hope that this will help the packed malicious programs avoid detection, so they won't have to make significant modifications to the malicious programs themselves.

This month malware was also distributed via P2P networks using multimedia downloader programs, a method that the cybercriminals made use of last December.

Countries where most attempts to infect via the web originated.

 

Monthly Malware Statistics: November 2009

Kaspersky Lab presents its monthly malware statistics for November
Kaspersky logo

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection, specialized security products and services, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help over 200,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Related Articles Press Releases