Top 10 most dangerous malicious codes in April

Sophos has announced the list of the most dangerous and distributed malicious code in April. Last month saw a number of new names appear and dominate the rankings.

Statistics from Sophos' global surveillance network show that criminals are increasingly fond of using malicious code via web routes rather than email paths.

April Sophos discovered a total of 245,790 malicious code sites. So on average, one day, the company detected 8,193 malicious websites.

Top 10 most dangerous malicious codes in April Picture 1 The most obvious manifestation of the change in attackers' trend is the emergence of 10 new names on the ranking of the most dangerous malicious codes in April. Veteran names are regularly distributed via email. like Netsky or Mytob were absent from the ranking this month.

The number one spot in the April rankings is Mal / Iframe. This malicious code accounts for nearly half of the threats that appear on the Internet in the past month.

The Iframe operation method is similar but the current web attacks. Its goal is to find security vulnerabilities that exist on web pages and insert malicious code into it. If users access these sites, their PC will also be infected with malicious code.

" Iframe attacks are a clear proof of the dangers on the web today. Their goals are the vulnerabilities on websites. They don't need to be concerned that the website has pornographic content or a matching website. France , "said tech consultant Carole Theriault of Sophos.

" 70% of web threats are discovered by Sophos to exist on legitimate websites but there are fatal flaws and have been exploited. Ordinary users also don't know when they access captured websites. That's why their PCs are often infected with malicious code . "

Top 10 most dangerous malicious codes in April

No. Ratio Name1Mal / Iframe44.7%2JS / EncIFra19.7%3Troj / Fujif10.0%4Troj / Psyme8.7%5Troj / Decdec5.3%6Troj / Ifradv4, 0%7Mal / Packer1.0%8Mal / FunDF0.7%9Mal / ObfJS0.5%10Mal / Behav0.4%

Hoang Dung

4 ★ | 1 Vote

May be interested

  • Why antivirus technology inefficiency?Photo of Why antivirus technology inefficiency?
    anti-virus technology is currently ineffective, because they can only prevent known viruses but cannot resist intruders who have not been named. future anti-virus technology is hoping to get that capability.
  • Learn about hidden threats: Rootkit and BotnetPhoto of Learn about hidden threats: Rootkit and Botnet
    attackers are always looking for the latest ways to access our computer system. the use of a hidden method such as rootkits and botnets is on the rise and you are more likely to become a victim
  • Trojans steal YM accounts to scam in VietnamPhoto of Trojans steal YM accounts to scam in Vietnam
    with stolen yahoo messenger accounts, crooks chat with victims' friends, exploit information and buy a phone recharge card. at the same time, they spread the website link containing malicious code to continue the crime.
  • Six Rootkit detectors protect your systemPhoto of Six Rootkit detectors protect your system
    the concept of rootkits is not something new. it returned with the days of unix. intruders can use a popular unix toolkit, recompile, allowing them to administer, owning root access without leaving a trace
  • Malware reconciliation design (part 1)Photo of Malware reconciliation design (part 1)
    for many people today, reverse engineering is a rather strange mechanism. they don't even know what it is and how to use it. why can reverse use of architecture of an executable? the skills needed to perform
  • In January 2007, 314 new viruses appeared in Vietnam.Photo of In January 2007, 314 new viruses appeared in Vietnam.
    according to hanoi university of technology's security center (bkav), in january 2007, 314 new viruses appeared in vietnam. 195,000 computers infected with catchym internal virus; 376,000 computers infected with spyware, adware and over 20 websites were attacked.