{"id":5087,"date":"2010-03-04T16:31:51","date_gmt":"2010-03-04T06:31:51","guid":{"rendered":"http:\/\/power-up.space\/?p=5087"},"modified":"2010-03-04T16:31:51","modified_gmt":"2010-03-04T06:31:51","slug":"exploits-overtake-trojans-as-the-highest-number-of-infections-in-february","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=5087","title":{"rendered":"Exploits overtake Trojans as the highest number of infections in February"},"content":{"rendered":"<p><em>BitDefender\u2019s February threat report shows removable devices poses biggest risk\u00a0<\/em><\/p>\n<p>With two Trojans, two Exploits and one Worm making up February\u2019s top five e-threats, this month\u2019s chart sees exploits through removable devices and operating system vulnerabilities retaking the top positions as the methods of infection to watch out for.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>February finished up with a surprise, with last month\u2019s number one e-threat (Trojan.Clicker.CM) disappearing from the top ten. Instead, <strong>Trojan.AutorunInf.Gen<\/strong> &#8211; the generic mechanism that spreads malware using removable devices such as USB keys, memory cards or external hard-disks &#8211;<strong> <\/strong>was the top e-threat of the month accounting for 9.09 percent of global malware infections.<\/p>\n<p>\u201cExternal devices should be scanned on a regular basis,\u201d advised Catalin Cosoi, senior researcher at BitDefender \u201cThis is a safe practice especially when these devices have been plugged into computers at work, internet cafes or other public locations,\u201d he added.<\/p>\n<p>An overview of the five most prevalent threats in February:<\/p>\n<p><strong>Win32.Worm.Downadup.Gen<\/strong> is up one place since January. Ranked second with 6.24 percent, this worm exploits a well-known Microsoft<strong>\u00ae<\/strong> Windows<strong>\u00ae<\/strong> vulnerability. \u201cWin32.Worm.Downadup.Gen\u2019s continued presence in our monthly top 10\u2019s suggests computer users\u2019 reluctance to update their operating system and their antimalware solution,\u201d explained Catalin Cosoi.<\/p>\n<p>\u201cMore alarmingly, security fixes issued by Microsoft\u00ae a year ago rectifies this vulnerability, but it is evident from the amount of infections each month that people are ignoring this too.\u201d<\/p>\n<p>BitDefender\u2019s third and fourth e-threats for February<strong> <\/strong>are<strong> Exploit.PDF-JS.Gen<\/strong> with 5.13 percent and <strong>Exploit.PDF-Payload.Gen<\/strong> with 4.21 percent of the total amount of infections. These generic detections deal with manipulated PDF files exploiting different vulnerabilities found in Adobe<strong>\u00ae<\/strong> Acrobat Reader&#8217;s Javascript engine. Their purpose is to execute malicious code on users\u2019 computers. <strong>\u00a0<\/strong><\/p>\n<p>Torrents continue to be one of the favorite vectors of malware distribution. <strong>Trojan.Wimad.Gen.1<\/strong> is February\u2019s number five e-threat with an infection percentage of 3.37.<\/p>\n<p>A yet-to-be-aired episode of your favorite<strong> <\/strong>series or a box-office movie could be your ticket for infection by this Trojan.<\/p>\n<h2>BitDefender\u2019s\u00ae February 2010 Top 10 E-Threat list includes:<\/h2>\n<p>\u00a0<\/p>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"327\">\n<tbody>\n<tr>\n<td width=\"64\" valign=\"bottom\"><strong>Rank<\/strong><\/td>\n<td width=\"197\" valign=\"bottom\"><strong>Threat<\/strong><\/td>\n<td width=\"65\" valign=\"bottom\"><strong>Percent<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">1<\/td>\n<td width=\"197\" valign=\"bottom\">Trojan.AutorunINF.Gen<\/td>\n<td width=\"65\" valign=\"bottom\">9,09<\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">2<\/td>\n<td width=\"197\" valign=\"bottom\">Win32.Worm.Downadup.Gen<\/td>\n<td width=\"65\" valign=\"bottom\">6,24<\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">3<\/td>\n<td width=\"197\" valign=\"bottom\">Exploit.PDF-JS.Gen<\/td>\n<td width=\"65\" valign=\"bottom\">5,13<\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">4<\/td>\n<td width=\"197\" valign=\"bottom\">Exploit.PDF-Payload.Gen<\/td>\n<td width=\"65\" valign=\"bottom\">4,21<\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">5<\/td>\n<td width=\"197\" valign=\"bottom\">Trojan.Wimad.Gen.1<\/td>\n<td width=\"65\" valign=\"bottom\">3,37<\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">6<\/td>\n<td width=\"197\" valign=\"bottom\">Win32.Sality.OG<\/td>\n<td width=\"65\" valign=\"bottom\">2,77<\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">7<\/td>\n<td width=\"197\" valign=\"bottom\">Trojan.Autorun.AET<\/td>\n<td width=\"65\" valign=\"bottom\">1,92<\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">8<\/td>\n<td width=\"197\" valign=\"bottom\">Worm.Autorun.VHG<\/td>\n<td width=\"65\" valign=\"bottom\">1,85<\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">9<\/td>\n<td width=\"197\" valign=\"bottom\">Exploit.Comele.A<\/td>\n<td width=\"65\" valign=\"bottom\">1,48<\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">10<\/td>\n<td width=\"197\" valign=\"bottom\">Trojan.SWF.HeapSpray.B<\/td>\n<td width=\"65\" valign=\"bottom\">1,40<\/td>\n<\/tr>\n<tr>\n<td width=\"64\" valign=\"bottom\">\u00a0<\/td>\n<td width=\"197\" valign=\"bottom\">OTHERS<\/td>\n<td width=\"65\" valign=\"bottom\">62.53<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>BitDefender\u2019s February threat report shows removable devices poses biggest risk\u00a0 With two Trojans, two Exploits and one Worm making up February\u2019s top five e-threats, this month\u2019s chart sees exploits through removable devices and operating system vulnerabilities retaking the top positions as the methods of infection to watch out for. \u00a0 February finished up with a<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=5087\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5087","post","type-post","status-publish","format-standard","hentry","category-game-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/5087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5087"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/5087\/revisions"}],"predecessor-version":[{"id":5088,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/5087\/revisions\/5088"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}