Malicious worms top web threat list

The classic worm attack has hit back with a vengeance - targeting business networks, social networks and smartphones.

The Conficker worm, the Facebook virus Koobface and the smartphone virus Sexy View' have been the biggest security threats so far this year, according to F-Secure.

The security vendor said that the Conficker virus had been the prominent classic worm', with heavy encryption, peer-to-peer functionality and the ability to convert itself and update itself.

Advertisement - Article continues below

Conficker began, to become a serious threat earlier this year, with hype peaking on 1 April.

Since then, researchers have noted a copycat worm called Neeris, which has taken over some of Conficker's functionality.

"The authors behind Conficker are professionals," Mikko Hyponnen, F-Secure's chief research officer said in a statement. "They have infected millions of computers, and could do anything they wanted with them.

"The mystery is why they haven't done that. Not yet, anyway."

F-Secure said the second biggest threat of the first quarter of 2009 was the Koobface' worm, which spread on Facebook and other social networking sites to steal login credentials.

Microsoft recently shared details about how it worked with Facebook to get rid of the worm using its Malicious Software Removal Tool (MSRT).

Microsoft Malware Protection Centre principle program group manager Jeff Williams said last week that the tool had removed Koobface 200,000 times from over 133,677 computers in more than 140 different countries.

Advertisement
Advertisement - Article continues below

The third biggest threat was Sexy View', the very first SMS worm, which was a social engineering virus using the stored contacts of a smartphone to spread.

Hypponen said: "It's also the first mobile phone worm that circumvents the signature checks that are meant to secure the latest smartphones."

Featured Resources

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Download now

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

Download now

The IT expert’s guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

Download now
Advertisement

Recommended

Visit/security/vulnerability/355276/businesses-brace-for-second-fujiwhara-effect-of-2020-as-patch-tuesday
vulnerability

Businesses brace for second 'Fujiwhara effect' of 2020 as Patch Tuesday looms

9 Apr 2020
Visit/security/cyber-security/355267/zoom-hires-ex-facebook-cso-to-boost-platform-security
cyber security

Zoom hires ex-Facebook CSO Alex Stamos to boost platform security

8 Apr 2020
Visit/security/vulnerability/355236/hp-support-assistant-flaws-leave-windows-devices-open-to-attack
vulnerability

HP Support Assistant flaws leave Windows devices open to attack

6 Apr 2020
Visit/security/cyber-security/355234/safari-bug-let-hackers-access-cameras-on-iphones-and-macs
cyber security

Safari bug let hackers access cameras on iPhones and Macs

6 Apr 2020

Most Popular

Visit/mobile/mobile-phones/355239/microsofts-patent-design-reveals-a-mobile-device-with-a-third-screen
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
Visit/security/cyber-security/355271/microsoft-gobbles-up-corpcom-domain-to-keep-it-from-hackers
cyber security

Microsoft gobbles up corp.com domain to keep it from hackers

8 Apr 2020
Visit/software/video-conferencing/355257/taiwan-first-country-to-ban-zoom-amid-security-concerns
video conferencing

Taiwan becomes first country to ban Zoom amid security concerns

8 Apr 2020