Feeds

Sober storms November virus chart

FBI investigation ruse dupes thousands

The Power of One eBook: Top reasons to choose HP BladeSystem

A new variant of the prolific Sober worm has come from nowhere to dominate November malware charts. Despite being detected very late in the month, the Sober-Z worm has stormed to the top of the latest monthly chart compiled by anti-virus firm Sophos.

At its peak, Sober-Z accounted for one in every 13 emails sent and 42.9 per cent of all viruses reported to Sophos. The prolific spread of Sober-Z worm pushed NetSky-P, the worm written by convicted German teenage virus writer Sven Jaschan, into second place in Sophos's November malware chart. NetSky-P held the top birth in Sophos's chart from July until October prior to being ousted this month.

Sober-Z worm appears as an email attachment in messages purporting to come from police agencies (such as the FBI and the UK's NHTCU) containing bogus warnings that recipients are under investigation for visiting illegal web sites. These messages are designed to dupe recipients into opening infectious attachments. Sober worms are configured to feature in an attached payload to infectious email messages featuring either English and German subject lines and body text.

Once the attached file is run, the worm scans the user's hard drive for email addresses, in its search for fresh targets for infestation. It also attempts to disable security software on infected Windows PCs, leaving users more exposed to further hack attacks. The first variants of the worm were seen more than two years ago but Sober-Z is the most virulent strain to date.

"Since we saw the first Sober worm back in October 2003, its author has tried to improve upon tried-and-tested tricks to dupe computer users into launching infected attachments," said Carole Theriault, senior security consultant at Sophos. "This latest worm purports to be a warning from CIA and FBI agents, accusing recipients of visiting illegal websites. Mocking the feds is a sure-fire way of goading the authorities, and you can't help but wonder whether the author is desperate to be caught."

Aside from Sober-Z, November's chart is dominated by the Mytob, NetSky and Zafi virus families - showing that cyber criminals are increasingly bringing out new variants of established threats in order to maximise their impact.

Sophos's research shows that 2.7 per cent, or one in 38 emails, is viral. Sophos now identifies and protects against a total of 114,082 viruses, an increase of 1,940 on last month. ®

November top ten virus chart, as compiled by Sophos:

  1. Sober-Z
  2. NetSky-P
  3. Mytob-GH
  4. Mytob-EX
  5. Zafi-D
  6. Mytob-BE
  7. Zafi-B
  8. Mytob-AS
  9. NetSky-D
  10. Mytob-C

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.