Malware reports

Malware Miscellany, February 2008

  1. Greediest Trojan targeting banks: This month’s nominee is Trojan-Spy.Win32.Banker.cjj, which targets 44 banks simultaneously.
  2. Greediest Trojan targeting payment systems: Trojan-Spy.Win32.Banker.iei has its sights set on the users of 4 different payment systems.
  3. Greediest Trojan targeting payment cards: This month’s winner, Trojan-Spy.Win32.Banker.ibp is slightly unusual – it targets users of 5 systems at once, rather than the more usual 3 or 4.
  4. Stealthiest malicious program: Trojan-Dropper.Win32.Small.to wins this category in February, being packed with 10 different packers.
  5. Smallest malicious program: In spite of its minute 27 byte size, Trojan.BAT.KillWin.cs have a very nasty payload: as its name suggests, it ‘kills’ the Windows operating system.
  6. Largest malicious program: Once again, a member of the Haradong family wins this category: Trojan.Win32.Haradong.ct weighs in at a heft 226MB.
  7. Most malicious program: February’s winner is one of the modifications of Backdoor.Win32.Agobot.gen. This unpleasant program disables a wide range of security solutions and also deletes files and processes.
  8. Most common malicious program in mail traffic: Email-Worm.Win32.Netsky.q puts in yet another appearance, making up almost 36% of all infected mail traffic in February.
  9. Most common Trojan family: Trojan-PSW.Win32.Onlinegames took the prize this month, with 1092 modifications.
  10. Most common virus/ worm family: Email-Worm.Win32.Warezov pops up again in this category with a relatively modest 30 modifications in February.

Malware Miscellany, February 2008

Your email address will not be published. Required fields are marked *

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Reports

Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs

Kaspersky GReAT experts dive deep into the BlueNoroff APT’s GhostCall and GhostHire campaigns. Extensive research detailing multiple malware chains targeting macOS, including a stealer suite, fake Zoom and Microsoft Teams clients and ChatGPT-enhanced images.

Mem3nt0 mori – The Hacking Team is back!

Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.

Mysterious Elephant: a growing threat

Kaspersky GReAT experts describe the latest Mysterious Elephant APT activity. The threat actor exfiltrates data related to WhatsApp and employs tools such as BabShell and MemLoader HidenDesk.