Dr.Web Revised Fake Virus-Makers Activity in April 2010
OREANDA-NEWS. May 12,
Fake torrent-trackers and file sharing sites
Doctor Web’s virus analysts uncovered an entire network of fake torrent-trackers and file sharing resources located in different parts of the globe and yet targeting Russian-speaking users. Criminals exploited wide popularity of such resources and carelessness of many people who search for necessary information using search engines and posted links to music, books, moves and other contents on such web-sites.
Fake torrent-trackers and file sharing resources appeared at the top of search results lists returned to users by search engines. Apparently criminals performed search engine optimization and perform other preliminary activities to improve efficiency of their schemes.
A user obtaining a download link on such a web-site downloaded a 16 megabyte executable file instead of a supposed archive with desired content. Dr.Web detects such files as Tool.SMSSend.2.
Launching the file brings up a window prompting the user to send several paid short messages that will allow him to gain access to a downloaded archive. In truth such malicious files do not contain any useful data. Similar schemes are known to target users from other countries where instead of an SMS would-be victims are offered to use their credit cards to pay for their downloads before they actually download anything.
Currently Doctor Web’s statistics server registers around 6 000 instances of detection of Tool.SMSSend.2 per 24 hours.
Copyright protection virus
Apart from techniques listed above criminals also attempted to intimidate torrent users.Trojan.Fakealert.14886 (as classified by Doctor Web) spread in quite large numbers over the Internet in April. In an infected system the Trojan displayed a message warning a victim that illegally obtained content protected by copyright was detected on the computer which would result in prosecution.
Trojan.Fakealert.14886 spreads as a software installer. If a user doesn’t remove the program using standard Windows tools for adding and removing software and simply reboots the system, the Trojan will block access to the system similarly to Trojan.Winlock malware. The highest number of detections of this program was registered in
A new modification of Trojan.Winlock that warned a user of his violation of copyright law also emerged in April. It offered users to send a paid SMS-message in order to continue downloading files via torrent through a backup communication channel.
Fake anti-viruses
Fake anti-viruses enhanced with new or updated look and feel continued there broad-scale offensive in English-speaking countries. Their spreading techniques didn’t change while the number of their detections registered by Doctor Web’s statistics server declined and reached 750 000 against an approximate
Windows blockers
The rate of spreading of Trojan.Winlock in
Dialler for smart phones
Virus analysts registered spreading of the WinCE.Dialer.1 malicious program, that targeted pocket PCs running Windows Mobile. Once installed, it started making calls at paid phone numbers registered in different countries.
The program springs into action in 48 hours following a successful infection of the system. WinCE.Dialer.1 spreads as a supposed game for pocket PCs.
The share of malicious programs in e-mail traffic scanned by Dr.Web software in April 2010 increased by 28 %. The share of malicious files among all files scanned on user machines increased by 2.12. The figures show that in April criminals mainly focused on spreading malware over infected web-sites, using PDF, Flash and browser exploits and other techniques rather than e-mail.
Malware detected in mail traffic in April
01.03.2010 00:00 - 01.04.2010 00:00 | ||||
1 |
11193316 (13.64%) | |||
2 |
9927963 (12.10%) | |||
3 |
7320678 (8.92%) | |||
4 |
5865274 (7.15%) | |||
5 |
5147022 (6.27%) | |||
6 |
5100040 (6.22%) | |||
7 |
4148051 (5.06%) | |||
8 |
3808296 (4.64%) | |||
9 |
2921645 (3.56%) | |||
10 |
2484216 (3.03%) | |||
11 |
1834890 (2.24%) | |||
12 |
1659867 (2.02%) | |||
13 |
1445121 (1.76%) | |||
14 |
1338146 (1.63%) | |||
15 |
1332036 (1.62%) | |||
16 |
1267041 (1.54%) | |||
17 |
1162458 (1.42%) | |||
18 |
1106066 (1.35%) | |||
19 |
1099122 (1.34%) | |||
20 |
1058813 (1.29%) | |||
|
Total scanned: |
17,689,058,602 | ||
|
Infected: |
82,042,532 (0.464%) | ||
Malicious files detected on user machines in April
01.04.2010 00:00 - 01.05.2010 00:00 | ||||
1 |
834227 (2.84%) | |||
2 |
829685 (2.82%) | |||
3 |
525939 (1.79%) | |||
4 |
438173 (1.49%) | |||
5 |
419684 (1.43%) | |||
6 |
364819 (1.24%) | |||
7 |
339566 (1.16%) | |||
8 |
330055 (1.12%) | |||
9 |
283554 (0.97%) | |||
10 |
231204 (0.79%) | |||
11 |
170593 (0.58%) | |||
12 |
162827 (0.55%) | |||
13 |
155887 (0.53%) | |||
14 |
153602 (0.52%) | |||
15 |
148201 (0.50%) | |||
16 |
143042 (0.49%) | |||
17 |
132141 (0.45%) | |||
18 |
119085 (0.41%) | |||
19 |
102652 (0.35%) | |||
20 |
85937 (0.29%) | |||
|
Total scanned: |
77,991,983,505 | ||
|
Infected: |
22,880,659 (0.0293%) |
Комментарии