Trojans still reigning in malware top 10

Trojans dominate GFI Software's top 10 malware threats of February.

Malware

Trojan-based attacks continue to be the biggest malware treat, a report from GFI Software has shown.

Trojans account for six of the top 10 malware threats of February and the report also confirmed the supremacy of Trojan.Win32.Generic!BT as the number one bug, growing from last month to 22.97 per cent of total detections.

Once in a user's system, these Trojans, associated with fake security programs, perform a scan of the computer and produce false warnings so that victims who take the bait buy malicious security software.

"These types of attacks notoriously cause a great deal of stress for the victim in addition to simply infecting their computer," said Chris Boyd, senior threat researcher at GFI Labs.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

GFI Labs also pointed to the growth of other forms of malware, which tend to be harder to detect. Among those are PDF exploits, which have shown a small increase since January.

"PDF exploits continue to be problematic, showing a small increase since January. February has also seen continued use of fake Java applet installs to infect PCs with malware," Boyd said.

"With new attacks popping up every day, users need to always stay cautious and research programs they plan to download when there is any doubt."

He also pointed to infected videogame patches distributed on P2P networks and phishing attempts on popular retailer Play.com.

Featured Resources

How inkjet can transform your business

Get more out of your business by investing in the right printing technology

Download now

Journey to a modern workplace with Office 365: which tools and when?

A guide to how Office 365 builds a modern workplace

Download now

Modernise and transform your sales organisation

Learn how a modernised sales process can drive your business

Download now

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now
Advertisement

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/pdf-software/29855/why-it-s-time-to-take-your-documents-digital
document management systems (DMS)

Why it’s time to take your documents digital

7 Feb 2020
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020
Visit/operating-systems/microsoft-windows/354739/windows-7-bug-blocks-users-from-shutting-down-their-pcs
Microsoft Windows

Windows 7 bug blocks users from shutting down their PCs

10 Feb 2020
Visit/hardware/354723/coronavirus-starts-to-take-its-toll-on-the-tech-industry
Hardware

Coronavirus starts to take its toll on the tech industry

6 Feb 2020