Feeds

Netsky tops virus charts by a country mile

Bagle, pah!

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

The Netsky worm beat off a strong challenge from various Bagle virus variants to top the malware charts last month.

Message filtering firm MessageLabs blocked more than four million Netsky-infected emails in March. Netsky-C (2 million plus interceptions over the last four weeks) and Netsky-B (1.2 million). The other entrants in MessageLabs' Top 10 were insignificant by comparison. Bagle-J was the worst of the numerous Bagle variants released by VXers this month in a tit-for-tat conflict with the unknown authors of Netsky.

Records of support calls logged by antivirus firm Sophos tell a similar picture. Almost three in five support calls logged by Sophos in March involved the Netsky worm. Netsky-D, alone, accounted for more than 30 per cent of support calls to Sophos.

"The authors of the Netsky and Bagle worms have been battling for virus writing supremacy in March, with both releasing new variants in a tit-for-tat game of one-upmanship," said Carole Theriault, a security consultant at Sophos. "The Netsky author wins the dubious accolade of the month's biggest virus, accounting for almost 60 per cent of all reports to Sophos, but the biggest losers are the innocent computer users who have been caught in the crossfire of the Netsky/Bagle spat."

Sophos added protection against 824 new viruses in March, bringing the total number of viruses it protects against to 89,112. ®

March 2004 Virus Chart, by Sophos

  1. Netsky-D
  2. Netsky-B
  3. Netsky-C
  4. Bagle-C
  5. Netsky-J
  6. Bagle-E
  7. Netsky-P
  8. Bagle-H
  9. Bagle-J
  10. MyDoom-A


Related stories

War of the worms turns into war of words
Netsky-D makes your PC go beep, beep, beep
MyDoom and Netsky cause chaos
Netsky author signs off
Latest Bagle worms spread on auto-pilot

Beginner's guide to SSL certificates

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.