Kaspersky Lab

 
Language selectionNederlandsFrançais

Analyse

30.05.2011

Monthly Malware Statistics, February 2011

February in figures

The following statistics were compiled in February using data from computers running Kaspersky Lab products:

  • 228,649,852 network attacks blocked;
  • 70,465,949 attempted web-borne infections prevented;
  • 252,187,961 malicious programs detected and neutralized on users’ computers;
  • 75,748,743 heuristic verdicts registered.

Cybercriminals perfecting drive-by attacks

February saw considerable growth in the use of Cascading Style Sheets (CSS) that contain partial data for script downloaders, a new method for spreading malware that makes it much harder for many antivirus solutions to detect malicious scripts. This method is currently being used in the majority of drive-by download attacks and allows cybercriminals to download exploits to users’ machines without those exploits being detected.

Drive-by attacks using this method involve redirecting users from an infected site to a page containing CSS data and a malicious script downloader, usually with the help of iFrame. Three infected pages of this type were among the Top 20 most malicious programs detected on the Internet in February: Trojan-Downloader.HTML.Agent.sl took 1st place, while Exploit.JS.StyleSheeter.b came in at 13th place and Trojan.JS.Agent.bte at 19th place.

The script downloaders on these malicious web pages download two types of exploits. One of them, which targets the CVE-2010-1885 vulnerability and that we detect as Exploit.HTML.CVE-2010-1885.ad, took 4th place in the ranking. On average, this exploit was recorded on the computers of 10 thousand unique users every day.

The other type of exploit uses vulnerability CVE-2010-0840 and three such examples made the Top 20. They are detected by us as Trojan-Downloader.Java.OpenConnection.dd in 3rd place, Trojan.Java.Agent.ak in 7th place, and finally, Trojan-Downloader.Java.OpenConnection.dc in 9th place.

Use of the first of these two vulnerabilities by cybercriminals is nothing new, but the active use of CVE-2010-0840 was recorded for the first time in February.

Statistics from our products’ heuristic modules confirm that the use of CSS for protecting exploits, and ultimately spreading malware, is currently the most prevalent method being used by cybercriminals in drive-by attacks. The majority of the domains where the redirects take place are already detected as Blocked in our web antivirus database.

Vulnerabilities in PDF still posing a threat

Statistical data generated by the heuristic modules in our products shows that the number of unique computers on which PDF exploits were detected exceeded 58 thousand. Exploitation of vulnerabilities in PDF files is currently one of the most popular methods of delivering malware to users’ computers. One PDF exploit – Exploit.JS.Pdfka.ddt – entered the Top 20 malicious programs on the Internet in 8th place.

Packaged Palevo

The malicious packer that is used to help protect the Palevo P2P worm was detected on more than 67 thousand unique computers. The Palevo worm was responsible for the creation of the Mariposa botnet that was shut down by Spanish police a while ago. It seems likely that the recent spread of this packed worm is linked to an attempt by cybercriminals to create a new botnet or restore the old one.

One interesting aspect of this packer is that it adds lots of random lines to the file that is being packed.

Mobile threats

Android

February saw the discovery of a number of new malicious programs for the Android platform. One of them – Trojan-Spy.AndroidOS.Adrd.a – has backdoor functionality. It connects to a remote server and sends the infected mobile phone’s IMEI and IMSI identification data. In response, the command center sends information that is used by the malware to run queries on the search system in background mode. The queries are used to increase the hit rating of specific sites. It’s worth noting that this malicious program has only been detected in Chinese repositories.

A second piece of malware for Android called Trojan-Spy.AndroidOS.Geinimi.a is an “enhanced” version of the Adrd family and was detected not only in China but also the USA, Spain, Brazil and Russia.

Trojan-SMS on J2ME

Malicious programs for the J2ME platform are also proving to be popular. For example, Trojan-SMS.J2ME.Agent.cd entered the Top 20 most widespread malicious programs on the Internet at 18th place. Its main function is to send SMSs to premium-rate numbers. It spreads primarily via links in spam messages sent over the ICQ instant messenger service and is most prevalent in Russia and Spain.

 

TOP 20 malicious programs on the Internet

Verdict

Delta

Current rank

Previous month rank

Trojan-Downloader.HTML.Agent.sl

new

1

 

Trojan-Downloader.Java.OpenConnection.cx

18

2

20

Trojan-Downloader.Java.OpenConnection.dd

new

3

 

Exploit.HTML.CVE-2010-1885.ad

new

4

 

AdWare.Win32.FunWeb.gq

-1

5

4

AdWare.Win32.HotBar.dh

-5

6

1

Trojan.Java.Agent.ak

new

7

 

Exploit.JS.Pdfka.ddt

new

8

 

Trojan-Downloader.Java.OpenConnection.dc

new

9

 

Trojan.JS.Iframe.rg

new

10

 

Trojan-Downloader.Java.OpenConnection.cg

-2

11

9

Trojan.HTML.Iframe.dl

-7

12

5

Exploit.JS.StyleSheeter.b

new

13

 

Trojan.JS.Fraud.ba

-1

14

13

Trojan-Clicker.JS.Agent.op

-8

15

7

Trojan.JS.Popupper.aw

-8

16

8

Trojan.JS.Agent.bhr

-7

17

10

Trojan-SMS.J2ME.Agent.cd

new

18

 

Trojan.JS.Agent.bte

new

19

 

Exploit.JS.Agent.bab

-6

20

14

 

TOP 20 malicious programs detected on users’ computers

Verdict

Delta

Current rank

Previous month rank

Net-Worm.Win32.Kido.ir

0

1

1

Virus.Win32.Sality.aa

0

2

2

HackTool.Win32.Kiser.zv

6

3

9

Net-Worm.Win32.Kido.ih

-1

4

3

Virus.Win32.Sality.bh

2

5

7

Hoax.Win32.Screensaver.b

-2

6

4

AdWare.Win32.HotBar.dh

-2

7

5

Virus.Win32.Virut.ce

0

8

8

Trojan.JS.Agent.bhr

-3

9

6

HackTool.Win32.Kiser.il

1

10

11

Packed.Win32.Katusha.o

-1

11

10

Worm.Win32.FlyStudio.cu

0

12

12

Trojan-Downloader.Win32.VB.eql

2

13

15

Worm.Win32.Mabezat.b

2

14

16

Packed.Win32.Klone.bq

3

15

18

Trojan-Downloader.Win32.Geral.cnh

-2

16

14

Trojan.Win32.Starter.yy

New

17

 

AdWare.Win32.FunWeb.gq

New

18

 

Worm.Win32.Autoit.xl

Returned

19

19

Trojan-Downloader.HTML.Agent.sl

New

20

 

 

 

Contact voor de Pers

Nanda Bechtholt

Stuur een e-mail
Tel.: +31-(0)23-56 56 850
Fax: +31-(0)23-56 56 859

download document

Kaspersky Lab on the Web

Virus Analyst Blogs