Defend what you create

Other Resources

Close

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to news

January virus activity review from Doctor Web

February 2, 2009

Doctor Web presents the virus activity review for January 2009. The first month of 2009 went rather smoothly except for the outbreak of Win32.HLLW.Shadow.based. It didn’t see mass mailings spreading malicious code in attachments or directing users to bogus web-sites. However, fraudulent SMS, fake anti-viruses, new Trojans turning user machines into botnet zombies as well as phishing attacks were registered every now and then.

Win32.HLLW.Shadow.based (Net-Worm.Win32.Kido, W32.Downadup, Worm:Win32/Conficker)

In January Doctor Web issued a warning about the outbreak of the Win32.HLLW.Shadow.based polymorphic worm. This malicious program showed once again that installation of critical updates for Windows and other software is a must for every user willing to maintain high security of the system. It is also recommended to disable the autorun for removable drives as it is exploited by Win32.HLLW.Shadow.based as well as by many other malicious programs. Strange as it seems but the epidemics may have a positive effect upon users learning to use stronger passwords for the Trojan attempts to crack an administrator password in order to spread over a local network.

Virus analysts of Doctor Web have been adding entries for new modifications of Win32.HLLW.Shadow.based into the virus database throughout the January. If you suspect that your system is infected with the polymorphic worm, install all critical updates for the version of Windows you use, disconnect the machine from the network and use Dr.Web CureIt! to scan your system. Computers running Dr.Web for Windows with its virus databases updated regularly are protected from attempts of Win32.HLLW.Shadow.based to get into the system.

E-cards

Even though the e-card disguise for malware has been well known for quite a while it remains as efficient as ever. In December 2008 and January 2009 numerous fake New Year and Christmas greeting notifications got in mailboxes of millions of users. As January drew to the end, web-sites supposedly providing Valentine greetings began to emerge. Trojan.Spambot is one of many malicious programs that get to user machines from such sites. Also known as Waledac the Trojan turns a compromised system into a zombie.

SMS-fraud

Criminals also attempted to get more money from accounts of subscribers of mobile operators. They used malware to encrypt data stored on a computer of a victim and demanded him to pay for their decryption. They could also demand money for removal of a malicious program installed as a browser plugin or lure a user into downloading and installing of a program on the phone that would start sending paid SMS. The malicious program is detected by Dr.Web as Java.SMSSend.19.

Fake anti-viruses

Fake anti-viruses also retained their popularity. Even if a program didn’t perform any malicious tasks in a compromised system it was still harmful as fraudsters received money for a useless piece of code. In January one of numerous web-sites offered online scanning of a system.

All machines that were checked for viruses by the “anti-virus” got infected. Moreover, when scanning was completed, a victim was offered to download another malicious program detected by Dr.Web as Trojan.Fakealert.3914.

Phishing

The number of phishing attacks was lower in January compared with previous months. Main targets of criminals in the last month were customers of amazon.ca and PayPal.

Malicious programs in e-mail traffic in January

 01.01.2009 00:00 - 01.02.2009 00:00 
1Win32.Virut14723 (18.70%)
2Win32.HLLM.MyDoom.based13479 (17.12%)
3Trojan.MulDrop.182806235 (7.92%)
4Trojan.MulDrop.134084594 (5.84%)
5Trojan.MulDrop.167274357 (5.53%)
6Win32.HLLM.Alaxala4022 (5.11%)
7Win32.Sector.122686 (3.41%)
8Win32.HLLM.Beagle2141 (2.72%)
9Win32.HLLM.Netsky.353281944 (2.47%)
10Win32.HLLM.Netsky1698 (2.16%)
11Trojan.Click.221091570 (1.99%)
12Win32.HLLM.Mailbot1498 (1.90%)
13Win32.HLLW.Shadow.31405 (1.78%)
14Win32.HLLM.Perf1353 (1.72%)
15Trojan.MulDrop.196481252 (1.59%)
16Win32.HLLM.MyDoom.331182 (1.50%)
17Win32.Virut.5968 (1.23%)
18Win32.IRC.Bot.based769 (0.98%)
19W97M.Thus687 (0.87%)
20BackDoor.Dosia.72619 (0.79%)

Scanned:321,156,519
Infected:78,718 (0.02%)

Malicious programs on user machines in January

 01.01.2009 00:00 - 01.02.2009 00:00 
1Win32.HLLW.Gavir.ini2451656 (19.14%)
2DDoS.Kardraw2058062 (16.06%)
3Win32.HLLM.Generic.440714503 (5.58%)
4VBS.Generic.548453207 (3.54%)
5Win32.Virut.5435746 (3.40%)
6Win32.Alman358676 (2.80%)
7Trojan.Recycle349560 (2.73%)
8Trojan.Starter.881303349 (2.37%)
9Win32.Sector.16210250 (1.64%)
10Win32.HLLW.Shadow.based209118 (1.63%)
11Win32.HLLM.Lovgate.2188398 (1.47%)
12Win32.HLLP.Neshta174684 (1.36%)
13Win32.HLLP.Jeefo.36352169943 (1.33%)
14Win32.HLLW.Autoruner.2536159100 (1.24%)
15VBS.PackFor138289 (1.08%)
16Win32.Sector.12128054 (1.00%)
17Win32.HLLW.Autoruner.5555127353 (0.99%)
18Win32.Sector.5123027 (0.96%)
19Trojan.DownLoader.42350119657 (0.93%)
20Win32.HLLM.Perf88711 (0.69%)

Scanned:70,489,000,159
Infected:12,811,152 (0.02%)

Tell us what you think

You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

The Russian developer of Dr.Web anti-viruses

Doctor Web has been developing anti-virus software since 1992

Dr.Web is trusted by users around the world in 200+ countries

The company has delivered an anti-virus as a service since 2007

24/7 tech support

© Doctor Web
2003 — 2019

Doctor Web is the Russian developer of Dr.Web anti-virus software. Dr.Web anti-virus software has been developed since 1992.

2-12А, 3rd street Yamskogo polya, Moscow, Russia, 125040