Feeds

VXers creating 150 zombie programs a week

Dawn of the Dead

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Malicious programs capable of turning home PCs into zombies controlled by hackers are growing at between 150 to 200 per week. McAfee's Anti-virus and Vulnerability Emergency Response Team (AVERT) reports that bots (now numbering over 7,000) and mass mailing viruses are the greatest threat to enterprises. Meanwhile exploits and adware account for over 60 per cent of the malicious threats impacting consumers.

Already Windows PCs submitted to online scanning by McAfee contained an average of 13 adware components. It warns that spam encoded to take advantage of the latest exploits to install spyware will ramp up consumer security risks even higher.

The number of computer viruses rated medium risk or higher by McAfee increased from 20 in 2003 to 46 in 2004, an increase of 130 per cent. By the end of 2004, McAfee's AVERT Labs had detected 17,000 new malware threats. Vulnerabilities discovered in 2004 totalled more than 2,800, down 25 per cent from 2003, however McAfee reckons that malicious hackers are becoming quicker at producing exploits.

"In 2004, the rise in viruses, worms, phishing, adware and vulnerability exploitation has surpassed what was noted in 2003," said Vincent Gullotto, vice president of McAfee AVERT. "Although we saw a steady five per cent (year over year) decrease in the rate of virus production from 2000 to 2003, we have seen an increase in 2004 which can be partly attributed to Bagle and NetSky authors feuding, as well as a general lack of awareness in regards to adware and other such programs." ®

Related stories

The strange death of the mass mailing virus
Who would you like to attack today?
'White collar' virus writers make cash from chaos
Zombie PCs spew out 80% of spam
Phatbot arrest throws open trade in zombie PCs

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.