Top 10 malware list shows rise of fake anti-virus

The top 10 malware threat list from Sunbelt Software has provided further proof of the rise of fake anti-virus software.

IT security

While Trojans and bots are the most prevalent forms of malware circulating the web, cyber criminals' use of rogue anti-virus software is steadily increasing.

So claims Sunbelt Software, which released its list of the top 10 malware threats in April. The rankings were largely unchanged from March apart from the entry of a loader for a rogue security product named SecurityTool.

The FraudTool.Win32.SecurityTool (v) threat took the final place in the top 10, removing Virtumonde from the list.

A recent report from Google claimed that fake anti-virus software now accounts for 15 per cent of all malware on the web.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"Trojans and bots are very prevalent. We also have an indication that rogue security products continue to spread," said Sunbelt Software research centre manager Tom Kelchner.

"In recent months many security researchers at antivirus companies have been noticing a slow but steady increase in rogue activity. It's becoming a very significant source of income for the bad guys," he added in a statement.

Trojan.Win32.Generic!BT was ranked as the most prevalent form of malware threat by Sunbelt, with a 33.74 share, far ahead of Exploit.PDF-JS.Gen in second place on 3.41 per cent.

Featured Resources

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management

Download now

6 ways your business could suffer if you don’t backup Office 365

Office 365 makes it easy to lose valuable data regularly, unpredictably, unintentionally, and for good

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now

8 digital best practices for IT professionals

Don't leave anything to chance when going digital

Download now
Advertisement

Recommended

Visit/security/30081/what-is-a-trojan-virus
Security

What is a Trojan?

14 Aug 2019
Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/mobile/google-android/354816/android-11-developer-access-arrives-earlier-than-expected
Google Android

Android 11 developer access arrives earlier than expected

20 Feb 2020
Visit/policy-legislation/data-protection/354814/google-to-shift-uk-user-data-to-the-us-post-brexit
data protection

Google to shift UK user data to the US post-Brexit

20 Feb 2020

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/technology/artificial-intelligence-ai/354796/ai-identifies-11-earth-bound-asteroids
artificial intelligence (AI)

AI identifies 11 earth-bound asteroids

18 Feb 2020
Visit/operating-systems/27717/how-to-fix-a-stuck-windows-10-update
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020