Feeds

US tops poll of spyware purveyors

Malware disties get Dirrty

High performance access to file storage

Spyware purveyors are expanding their distribution channels and adopting new tactics in a bid to cash-in by infesting more PCs with parasitic malware. The majority of spyware is coming from the US, with Poland coming in second and the Netherlands third, according to a study by anti-spyware software developer, Webroot Software.

Legislation against spyware is now pending in 19 states and four bills affecting spyware are pending at the federal level. Technology countermeasures are also becoming more common but Webroot's report argues that spyware developers are fighting back in a bid to preserve their business.

Webroot's State of Spyware report states that spyware is becoming more sophisticated (the use of packing and encryption techniques are becoming more common, for example) in a bid to elude detection and removal efforts. The number of websites distributing spyware has quadrupled since the beginning of 2005 to 300,000 unique URLs as spyware purveyors grow their distribution channels and enter new markets. Meanwhile the number of spyware traces in Webroot's spyware definition database has doubled to over 100,000 since the start of the year.

"Unlike virus writers who are motivated by personal pride or a desire for notoriety, spyware purveyors are motivated by profit – whether it’s a penny per pop-up or a keylogger that captures valuable account information," said C. David Moll, chief exec of Webroot Software. "Our research shows that like any business, spyware developers are committed to increasing their profit margins by expanding their distribution channels, utilising new products and entering new markets."

Four in five (80 per cent) of consumer and corporate PCs are infected with spyware, according to Webroot. Consumer PCs have an average of 25.4 instances of spyware per scan but since Webroot includes relatively benign cookies as well as Trojans in this same category these figures ought to be approached with some caution. The raw data behind the latest edition of Webroot's quarterly report comes largely from its consumer and corporate SpyAudit scanning tools and from online research culled by Phileas, Webroot’s automated spyware research system. This data allows Webroot to compile a list of the ten most significant spyware and adware threats. Once again the infamous CoolWebSearch malware tops this rogues gallery. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.