Feeds

Hardy perennials dominate virus chart

Darling botnets of May

High performance access to file storage

May's virus charts were a throwback to the end of 2005, with old favourites such as Netsky, Bagle, and Sober once again dominating run-downs of the worst malware menaces.

Netsky-T and Netsky-Q, which occupy first and second places in Kaspersky's chart, have been among the leaders for some time. The Bagle-GT variant has been steadily growing over recent months but the re-entry of a variant of the Sober worm (Sober-AA) in the fourth berth of the chart came as a surprise to the Russian anti-virus specialists. The first samples of this worm were intercepted on 7 April 2007, long after the release of the last previous version, Sober-Z, in November 2005.

Sober-Z was one of the most widespread worms of its time and rumours suggested the German police were about to arrest a suspect for the botnet-friendly malware. Nothing of the kind happened and the world was allowed to forget Sober for over a year. It's unclear whether the new worm is the work of the original virus author - who's been lying low for a while - or someone else, who's obtained access to source code for the worm.

As fresh variants of dimly-remembered malware strains have begun to reassert their dominance, newer threats (such as the Warezov and Zhelatin worm families) have faded. Warezov-WS, which came second in the April Top 20, has fallen from the bottom of the table. However, a Trojan downloader which installs versions of Warezov has risen to eighth place in the charts, creating the potential for an upsurge in Warezov and related botnet activity over coming months.

Tricking users into visiting maliciously coded sites has replaced infectious email attachments as the preferred method to spread malware over recent months.

Last month, net security firm Sophos uncovered 9,500 new infected web pages daily, an increase of more than 1,000 every day compared to April. In total, Sophos identified 304,000 web pages hosting malicious content in May. ®

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.