Malware reports

Virus Top Twenty for December 2004

Position Change in position Name Percentage
1. New Email-Worm.Win32.Zafi.d 17.85
2. +2 I-Worm.Zafi.b 13.42
3. I-Worm.NetSky.q 10.85
4. +2 I-Worm.LovGate.w 9.77
5. I-Worm.NetSky.aa 9.50
6. – 4 I-Worm.Mydoom.ab 4.69
7. I-Worm.NetSky.b 4.46
8. + 6 I-Worm.Sober.i 4.19
9. I-Worm.Bagle.z 3.24
10. I-Worm.Mydoom.m 1.84
11. +1 I-Worm.NetSky.y 1.56
12. – 11 I-Worm.Bagle.at 1.29
13. + 4 I-Worm.NetSky.t 1.21
14. + 1 I-Worm.NetSky.d 1.14
15. + 1 I-Worm.Mydoom.l 1.07
16. New TrojanDownloader.Win32.Agent.bg 0.96
17. New Trojan-Spy.HTML.Bankfraud.w 0.94
18. I-Worm.LovGate.ad 0.87
19. I-Worm.NetSky.r 0.68
20. I-Worm.Bagle.gen 0.57
Other malicious programs 9.90

2004 ended with the Hungarian Zafi twins pushing aside the big three, NetSky, Bagle and Mydoom, which had dominated the ratings all year. Zafi.d, first detected in October, leads the final ratings of the year: the worm gained ground steadily throughout November and shot to the fore by the end of December.

Zafi.b stayed right behind the newer variant. This earlier variant led the ratings in the summer, dropped back in the fall and regained lost ground in November and December to finish in second place.

November leaders Mydoom.ab and Bagle.at are dropping as rapidly as they appeared in the first place, with Bagle.at losing 10 places.

The Korean worm Lovgate.w is climbing steadily, reaching fourth place this month. A later variant, Lovgate.ad has stayed in the same position and it’s difficult to predict where it will go next year. Unlike other worms in the ratings, the Lovgate worms have not yet been mass-mailed using spammer technologies. Instead, they seem to be spreading in a classic manner, starting from a limited number of infected machines and gradually infecting new machines.
Sober.i re-appeared unexpectedly despite significant errors in the source code – we had predicted that it would disappear from the ratings, whereas the worm climbed in the top 10.

Most of the other email worms have changed position only slightly, if at all. Fortunately, we did not see any significant outbreaks caused by email worms this month. Instead, virus writers have focused on exploiting vulnerabilities in Internet Explorer and creating spyware and adware.

Trojan-Downloader.Win32.Agent.bq and Trojan-Spy.HTML.Bankfraud.w, two newcomers to the ratings, are both examples of this latter group.
Agent.bq was mass mailed several times using spammer technologies. This Trojan installs various AdWare programs and also collects data about the users Internet surfing habits.

Bankfraud.w is a classic phishing scam. The user receives a message purportedly from the Washington Mutual Internet Banking tech support service. The author uses social engineering techniques to encourage gullible users to go to the supposed Washington Mutual site and enter their personal information. Users who fall for this scam open their bank accounts to the criminals.

Summary:

New viruses: Zafi.d, Agent.bq, Bankfraud.w

Moved up: Zafi.b, Lovgate.w, Sober.i, Netsky.y, Netsky.t, Netsky.d, Mydoom.l

Moved down: Mydoom.ab, Bagle.at

No change: Netsky.q, Netsky.aa, Netsky.b, Bagle.z, Mydoom.m, LovGate.ad, Netsky.r, Bagle.gen

Virus Top Twenty for December 2004

Your email address will not be published. Required fields are marked *

 

Reports

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

What did DeathStalker hide between two ferns?

While tracking DeathStalker’s Powersing-based activities in May 2020, we detected a previously unknown implant that leveraged DNS over HTTPS as a C2 channel, as well as parts of its delivery chain. We named this new malware “PowerPepper”.

Subscribe to our weekly e-mails

The hottest research right in your inbox