{"id":2198,"date":"2008-04-03T00:00:00","date_gmt":"2008-04-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/03\/top-malware-report-for-march\/"},"modified":"2021-12-30T11:40:52","modified_gmt":"2021-12-30T11:40:52","slug":"top-malware-report-for-march","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/03\/top-malware-report-for-march\/","title":{"rendered":"Top Malware Report For March"},"content":{"rendered":"<p>March 2008 proved to be somewhat atypical in terms of malicious code in mail traffic. Firstly, there were no new malicious programs in the Top Twenty.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secondly, the new malicious programs which had appeared in the last few months were also absent from the rankings, although there had been no indication that this would happen.   <\/p>\n<p>And finally, this month&#8217;s chart contains an increased number of worms which we&#8217;ve been detecting for years.This epidemic indicated that someone was preparing to create an enormous botnet.<\/p>\n<p>Our old friend, NetSky.q, continues to lead the rankings this month, and Mydoom.m rose a significant nine places to come in second.  The last time these two worms were in such close competition with each other was way back in 2004.<\/p>\n<p>The only program which could more or less be termed new in the entire Top Twenty is another Trojan-Downloader.<\/p>\n<p>All the representatives of the Zhelatin (Storm Worm) and Warezov families have disappeared from the rankings.  Worms from the NetSky family have come to fill the void created by the absence of new epidemics, with three of the five programs re-entering the rankings in March belonging to this family.<\/p>\n<p>Overall, March has been the most peaceful month that we&#8217;ve seen for a while.<\/p>\n<p>http:\/\/www.net-security.org\/qualys2008\/rsa2008c.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2198","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2198"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2198\/revisions"}],"predecessor-version":[{"id":4685,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2198\/revisions\/4685"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}