Windows blockers countermeasures
While Windows blockers continued to terrorize users, Doctor Web did its best to help those whose systems were compromised by malicious programs of this type.
In January 2010, Doctor Web launched its Dr.Web Unlocker web site. The site includes web forms offering unblocking codes for certain phone numbers and text messages displayed by Trojans. Later an unlock code generator was also introduced. The site is updated on a regular basis to address the latest trends in the development of system blocking malware.
In addition, since June 23, 2010, Doctor Web has made its support service available free of charge to every user (regardless of the anti-virus involved) whose system has been blocked by a Windows blocker program and who can’t get help at the unlocker site. To further fight the outbreak, Doctor Web cooperates with law enforcement agencies and provides up-to-date information to the widest audience possible about the current status of the epidemic, including prevention and curing techniques.
During June, Doctor Web’s statistics server registered over 420,000 instances of detection of Windows blockers, down from the previous month’s figure of 940,000+. Most of these programs were detected by Dr.Web anti-viruses as Trojan.Winlock, Trojan.Adultban, and Trojan.Packed.20343.
By the end of June, Trojans demanding cell phone balance refills as ransom amounted to 30 percent of all blockers. Doctor Web's analysts studied numerous cases of systems being infected by such programs and concluded that, in most cases, users wouldn’t receive unlock codes even if they paid the ransom. Once again the facts confirm this rule: no matter how desperate you are, never give money to criminals!.
Below is a gallery of screenshots showing June’s most common Windows blockers.
Social networking web sites – an attraction for criminals
Many users contacting Doctor Web’s technical support service in June were unable to visit social networking and free e-mail service web sites. When trying to load web pages, users got messages informing them that their accounts had been suspended for spamming, and that to continue they would have to send paid text messages. Dr.Web software detected the malicious programs responsible for such messages as Trojan.Hosts.
Reports received at the end of June indicated new modifications to Trojan.Hosts’ demand to refill cell phone balances, demands similar to those made by Windows blockers.
Because Trojan.Hosts and Trojan.Winlock are parts of schemes with similar mechanisms for converting acquired funds into actual money, Doctor Web also helps those whose support requests concern such viruses.
Internet banking users in danger
European bank customers who make wide use of Internet banking, particularly those of Volksbank Austria and German Postbank, became the primary targets of malware in Europe. Banks use TAN codes to achieve better security for online transactions. Each transaction has its own unique TAN code which allows customers to carry out transactions without disclosing their individual PIN codes. But cyber criminals have found a loophole: Users whose computers were infected by malicious programs like Trojan.PWS.Banker or Trojan.PWS.Bancos are prompted to enter TAN codes whenever they try to use an Internet banking system. Codes submitted by users get into the hands of criminals.
The Trojans were able to detect a browser used to access an Internet-banking web site and sprang into action only if the browser was Internet Explorer, demonstrating once again that users of other browsers are better protected from threats lurking on the Internet.
ПGeneral trends of June include the still active Oficla botnet, with four modifications of Trojan.Oficla found among the top 20 malware threats most frequently detected in e-mail. Intruders also often resorted to malicious scripts detected by Dr.Web anti-viruses as JS.Redirector.based.3. Embedded in HTML documents attached to spam messages, they redirect users to web sites that spread malware or to advertisements that typically promote pharmaceutical products.
Malicious files detected in mail traffic in June
01.06.2010 00:00 - 01.07.2010 00:00 |
||
1 |
94881
(10.75%) |
|
2 |
90647
(10.27%) |
|
3 |
73241
(8.30%) |
|
4 |
53192
(6.03%) |
|
5 |
49394
(5.60%) |
|
6 |
36125
(4.09%) |
|
7 |
32974
(3.74%) |
|
8 |
31944
(3.62%) |
|
9 |
28964
(3.28%) |
|
10 |
22365
(2.53%) |
|
11 |
22311
(2.53%) |
|
12 |
22229
(2.52%) |
|
13 |
16839
(1.91%) |
|
14 |
12293
(1.39%) |
|
15 |
10000
(1.13%) |
|
16 |
9198
(1.04%) |
|
17 |
7436
(0.84%) |
|
18 |
6902
(0.78%) |
|
19 |
6765
(0.77%) |
|
20 |
5299
(0.60%) |
Total scanned: | 13,188,581,400 |
Infected: | 847,004 (0.0642%) |
Malicious files detected on user machines in June
01.06.2010 00:00 - 01.07.2010 00:00 |
||
1 |
1265565
(13.62%) |
|
2 |
678958
(7.31%) |
|
3 |
672529
(7.24%) |
|
4 |
301736
(3.25%) |
|
5 |
280021
(3.01%) |
|
6 |
279207
(3.01%) |
|
7 |
263432
(2.84%) |
|
8 |
263423
(2.84%) |
|
9 |
227444
(2.45%) |
|
10 |
217638
(2.34%) |
|
11 |
214459
(2.31%) |
|
12 |
214243
(2.31%) |
|
13 |
207502
(2.23%) |
|
14 |
205901
(2.22%) |
|
15 |
198304
(2.13%) |
|
16 |
125789
(1.35%) |
|
17 |
96510
(1.04%) |
|
18 |
84592
(0.91%) |
|
19 |
72811
(0.78%) |
|
20 |
63321
(0.68%) |
Total scanned: | 64,422,986,656 |
Infected: | 9,288,857 (0.0144%) |
Tell us what you think
To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.
Other comments