Feeds

Yaha usurps Klez

Monthly malware chart

  • alert
  • submit to reddit

Protecting against web application threats using SSL

Yaha-E displaced Klez as the most common viral menace on the Internet over the last month, according to Messagelabs.

The managed services firm has blocked Yaha-E 367,158 times so far in July, relegating Klez-H (332,343 interceptions) to second place in its monthly viral charts. Sobig-E (blocked 188,235 times) and BugBear-B (108,206) and Sobig-A (63,076) make up the remaining stop five places in MessageLabs chart, released last night.

The company reports that one in 166 emails processed this month contained a virus, about average for this time of year.

None of the viruses that make up MessageLabs top ten chart are new. While fewer in number, backdoor-trojans are increasing appearing on MessageLabs' anti-malware radar screens.

"In recent months, an emerging trend has also been observed in the distribution of backdoor-trojans via email, typically sent as an attachment to spam emails in very large volumes. Typically these trojans are being altered and redeployed, almost on a daily basis so as to sneak past anti-virus software," MessageLabs reports.

For example, in July MessageLabs intercepted the following patterns of variants for the same trojan, in almost as many days: Downloader.DI!Eloan (1,083 interceptions), Downnloader.DI!WFd7f3 (589), Downloader.DI!Heloc (522) and Downloader.DI!WF97bc (110).

The company also operates an anti-spam service. In July, 79.7 million of the 156.6 million emails - just over 50 per cent - scanned by MessageLabs' Anti-Spam service turned out to be junk mail. ®

Top ten viruses blocked by MessageLabs in July

  1. Yaha-E
  2. Klez-H
  3. Sobig-E
  4. BugBear-B
  5. Sobig-A
  6. Yaha-K!e2a2
  7. Klez-A
  8. SirCam-A
  9. Yaha-P
  10. Ganda-A


Related Stories

Trojan turns victims into DDoS, spam zombies
Trojan serves porn off home PCs, not many dead
Virus writers boost output in 2003
VX writers release sequel to infamous Sobig worm
Unhappy new Yaha
Klez-H enjoying its final days on infamy?

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.