Malware reports

The Virus Top Twenty – May 2003

Kaspersky Labs presents the Virus Top 20 for the month of May, 2003.

The percentage shown represents the percentage of registered incidences.

Position Virus Percentage by Occurrence

1

I-Worm.Sobig
21.87%

2
I-Worm.Lentin
15.95%

3
I-Worm.Klez
15.39%

4
I-Worm.Fizzer
0.67%

5
I-Worm.Roron
0.51%

6
Worm.Win32.Randon
0.38%

7
I-Worm.Ganda
0.28%

8
Macro.Word97.Thus
0.28%

9
<!–!–>Backdoor.Assasin
0.24%

10
I-Worm.Tanatos
0.21%

11
<!–!–>Backdoor.Optix
0.20%

12
Backdoor.IRC.Zcrew
0.19%

13
Win32.Parite
0.17%

14
Win32.FunLove
0.17%

15
<!–!–>Backdoor.IRC.Flood
0.16%

16
<!–!–>TrojanDropper.JS.Mimail
0.16%

17
<!–!–>VBS.Redlof
0.15%

18
<!–!–>Backdoor.IRC.mIRC-based
0.14%

19
<!–!–>Backdoor.SdBot.gen
0.12%

20
<!–!–>TrojanDownloader.Win32.Swizzor
0.12%

Other Malicious Programs*
42.66%

*not included in the Top 20

Malicious Program Types

The Virus Top Twenty – May 2003

Your email address will not be published.

 

Reports

Kimsuky’s GoldDragon cluster and its C2 operations

Kimsuky (also known as Thallium, Black Banshee and Velvet Chollima) is a prolific and active threat actor primarily targeting Korea-related entities. In early 2022, we observed this group was attacking the media and a think-tank in South Korea.

Andariel deploys DTrack and Maui ransomware

Earlier, the CISA published an alert related to a Stairwell report, “Maui Ransomware.” Our data should openly help solidify the attribution of the Maui ransomware incident to the Korean-speaking APT Andariel, also known as Silent Chollima and Stonefly.

Subscribe to our weekly e-mails

The hottest research right in your inbox