{"id":1769,"date":"2004-09-07T00:00:00","date_gmt":"2004-09-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/07\/over-3000-malicious-codes-detected-in-august-trend-micro\/"},"modified":"2021-12-30T11:39:57","modified_gmt":"2021-12-30T11:39:57","slug":"over-3000-malicious-codes-detected-in-august-trend-micro","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/07\/over-3000-malicious-codes-detected-in-august-trend-micro\/","title":{"rendered":"Over 3,000 malicious codes detected in August: Trend Micro"},"content":{"rendered":"<p>Around 3,300 new malicious codes have been detected by security software provider Trend Micro between August 1-20 this year.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the Trend Micro World Wide Tracking Centre, Sasser was the most prevalent virus in August with 325,409 victims and made up nearly 31 percent of infections in the August top 10 virus list.<\/p>\n<p>Mark Sinclair, Trend Australia&#8217;s technical services manager, said both viruses were written by the same programmer; an 18-year old German who was responsible for 77 percent of infections by the top ten viruses in August.  &#8220;According to Trend Micro statistics, the NetSky series has been listed among the top ten viruses since February, accounting for over half of the top ten viruses between April and July.<\/p>\n<p>Most of the new viruses were variations of previous viruses, with eight new variants of the Worm _rbot series, and nine variants of the Worm_sdbot series.  Another possible motive is to build a dormant &#8220;dark&#8221; network that could be used in the future to perform a large-scale attack against one or more targets.  <\/p>\n<p>&#8220;Mass mailers usually feature executable file attachments and stripping these attachments at the gateway is a simple method of reducing infection,&#8221; Sinclair said.  &#8220;The authors of Bagle continue to wage war on Netsky; proof of concept viruses are appearing for wireless devices and 64 bit operating systems and phishing\/keyboard logging Trojans are becoming more prevalent,&#8221; he said.  &#8220;The potential to see new damaging network worms such as Sasser, SQL Slammer and Blaster is always there.<\/p>\n<p>The top five targets of Internet bank fraud in August were US Bank, Citibank, Suntrust Bank, eBay and Paypal.<\/p>\n<p>http:\/\/www.zdnet.com.au\/news\/security\/0,2000061744,39158445,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1769","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1769"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1769\/revisions"}],"predecessor-version":[{"id":4256,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1769\/revisions\/4256"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}