Defend what you create

Other Resources

Close

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to news

Viral threats in March 2010

April 1, 2010

March 2010 saw a smaller number of Windows blockers and banners in Internet browsers. Fake anti-viruses with constantly changing look and feel mainly targeted English-speaking users. Discovery of several new modifications of Trojan.Encoder became a significant event of the past month.

Windows blockers and banners in web browsers

If you look at the graph showing how browser blockers (Trojan.BrowseBan) and blockers of Windows (Trojan.Winlock) spread in March, you will see that they got to where they were in mid October and November 2009. However, the weekly graph shows the number of detections remaining around 10 000 on a daily bases which roughly amounts to 100 000 infected systems per week.

In March Doctor Web received over 100 unique screenshots of blockers via its user technical support system. Since cases when a user can take a screenshot in the infected systems are very rare, the total number of processed support requests related to the subject is much higher.

Blockers remain one of the most common issues in user support requests for several reasons. First of all, it is quite difficult to get rid of such species of malware since they hamper any user activity in the system and secondly these are malicious programs whose activities are meant to be noticed. While most malicious programs operate covertly, Doctor Web strongly recommends all users of Dr.Web products contact the technical support service immediately if they think that they have even an indirect evidence of an active infection in the system.

Botnet communicates over Microsoft Word

Trojan.Oficla is a malware underworld specimen that allows owners of botnets created by means of this program to hide in a system as a Microsoft Word process if the latter is installed on the computer.

Authors of Trojan.Oficla sell new modifications of the program to other criminals so that they create new botnets that operate all over the world.

As zombies in any other botnet, machines compromised by Trojan.Oficla are fully controlled by the botnet’s owner and can download other malicious programs from a server belonging to criminals, install and launch downloaded malware.

Doctor Web’s statistics server registered around 100 000 detections of this malicious program in one week of March 2010. Trojan.Oficla spreads with e-mail messages and exploits vulnerabilities of web browsers. It can also take advantage of other spreading channels. The choice here is determined by imagination of the botnet’s owner.

Invisible banker

Trojan.PWS.Ibank is another piece of malware that doesn’t attract users’ attention while at work. Its numerous modifications retrieve account details of customers of large banks in Russia. Trojans exploit vulnerabilities of banking software used by clients to carry out transactions over the Internet.

Retrieved account information is sent to criminals. Trojan.PWS.Ibank also operates as a key logger.

Trojan.PWS.Ibank spreads in surges. A rapid growth of the number of its detections that dropped again within 24 hours was registered several times in March.

Fake anti-viruse

By the end of March an inflow of support requests regarding fake Russian online anti-viruses has practically stopped. However, traditional representatives of this malware family (Trojan.Fakealert) infect user systems with the number of detections of such programs remaining steady 30 millions per month.

Methods used to spread fake anti-viruses have been honed through years and remain the same. Yet appearance of such malware does change. Fake anti-viruses tend to look more and more like popular IT security solutions spread using social engineering techniques.

Trojan.Fakealert screenshots

File encoder

The March was also marked by discovery of several new modifications of Trojan encoders that demanded over USD 50 from a user willing to get his data back.

Trojan.Encoder.67 encrypted all files except for files located in certain system directories that sometimes might render a system non-operational and even itself from actually displaying a ransom demand message.

Trojan.Encoder.68 compromised only files of certain types. It placed target files in password-protected ZIP archives. The password consisted of 47 symbols and was unique for each infected system. Doctor Web offered users free access to a web-form where they could generate passwords to extract their files.

Tools required to counter an.Encoder.68 programs can be found on the special web-page of Doctor Web’s site devoted to free anti-virus tools.

In March the share of malicious code in mail traffic increased by 22% compared with February while the share of malicious code among files scanned on users machines reduced by 24%. These fluctuations are insignificant since the overall share of malware from the total number of scanned objects remained the same as in February.

Malicious programs detected in mail traffic in March

 01.03.2010 00:00 - 01.04.2010 00:00 
1Trojan.DownLoad.4155115495381 (14.11%)
2Trojan.DownLoad.3723613614045 (12.39%)
3Trojan.DownLoad.4725610053104 (9.15%)
4Trojan.Botnetlog.zip7267927 (6.62%)
5Trojan.MulDrop.408967103001 (6.47%)
6Trojan.Fakealert.51157029855 (6.40%)
7Trojan.Packed.6835753224 (5.24%)
8Trojan.Fakealert.52385266296 (4.79%)
9Trojan.DownLoad.502464054874 (3.69%)
10Trojan.Fakealert.58253445424 (3.14%)
11Trojan.Fakealert.54372519370 (2.29%)
12Trojan.Fakealert.53562283687 (2.08%)
13Trojan.Fakealert.57841974861 (1.80%)
14Trojan.PWS.Panda.1221852731 (1.69%)
15Trojan.Fakealert.52291836702 (1.67%)
16Trojan.Fakealert.54571609146 (1.46%)
17Trojan.Siggen.182561527888 (1.39%)
18Trojan.Packed.196941517178 (1.38%)
19Trojan.MulDrop.462751463124 (1.33%)
20Trojan.Fakealert.119561369146 (1.25%)

Total scanned:30,331,944,880
Infected:109,851,515 (0.36%)

Malicious programs detected on user machines in March

 01.03.2010 00:00 - 01.04.2010 00:00 
1Win32.HLLW.Gavir.ini773623 (6.35%)
2BAT.Generic.184576696 (4.73%)
3Trojan.Fraudster.36501271 (4.12%)
4Trojan.WinSpy.641472955 (3.88%)
5Trojan.AntiAV.6428431 (3.52%)
6Trojan.WinSpy.616410484 (3.37%)
7Trojan.WinSpy.640409803 (3.36%)
8Win32.HLLW.Shadow.based406787 (3.34%)
9Trojan.DownLoad.32973371322 (3.05%)
10Win32.HLLM.Xgray.3361513 (2.97%)
11VBS.Sifil351449 (2.89%)
12BAT.310310476 (2.55%)
13IRC.Apulia.1215289792 (2.38%)
14Trojan.WinSpy.570266963 (2.19%)
15Trojan.AuxSpy.111249772 (2.05%)
16Win32.HLLP.Jeefo.36352198323 (1.63%)
17Trojan.PWS.Ibank.28191114 (1.57%)
18ACAD.Pasdoc184475 (1.51%)
19Trojan.PWS.Ibank.25174119 (1.43%)
20Win32.HLLW.Shadow148909 (1.22%)

Total scanned:88,035,683,471
Infected:12,181,429 (0.01%)

Tell us what you think

You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

The Russian developer of Dr.Web anti-viruses

Doctor Web has been developing anti-virus software since 1992

Dr.Web is trusted by users around the world in 200+ countries

The company has delivered an anti-virus as a service since 2007

24/7 tech support

© Doctor Web
2003 — 2019

Doctor Web is the Russian developer of Dr.Web anti-virus software. Dr.Web anti-virus software has been developed since 1992.

2-12А, 3rd street Yamskogo polya, Moscow, Russia, 125040