Twitter is used by hackers to control the mobile botnets

Posted: September 8, 2012 in Articles
Tags: , , , , , ,

McAfee logoIn the second quarter of 2012, the company’s specialists McAfee was found on 1.5 million more malware than in the first quarter of 2012, number of malicious programs has grown at a rate of approximately 100 thousand samples per day – such data is presented in the report on threats to McAfee. “This increase in the number of detected malware has not been seen for four years,” – the company said.

“Over the last quarter we have often found good examples of malware threatening ordinary consumers, businesses and critical infrastructure,” – said Vincent Weafer, senior vice president of McAfee Labs. – Some of the biggest attacks using malware in the second quarter of 2012 include Flashback, aimed at device Macintosh, and Flame, the object of which was the energy sector. This is a good illustration of the growing number of threats. “

After a sharp increase in the number of malicious programs for mobile devices, which occurred in the first quarter of 2012, the pace of malware for Android do not show signs of slowing down, forcing the user to be in high alert, said the McAfee. Almost all new malicious programs for mobile devices, found in the second quarter of 2012 (the program to send SMS, mobile botnets, spyware, destructive “Trojan horses”), focused on the platform Android.

The report also notes the company’s steady growth in the spread of malicious programs for Macintosh: so, in the second quarter of 2012, McAfee experts found more than 100 new designs.

In the reporting quarter, again made themselves felt botnet (a network of compromised computers infected with malicious software and used to generate spam, spread viruses or disable web servers), demonstrating the highest in the past 12 months, the rate of infection, said the McAfee. The world’s largest home to a server to control botnets is the USA. Began to appear, and new ways to manage botnets. So, for example, to control botnets, consisting of mobile devices, has been used Twitter – attacker with relative anonymity, publishing team on Twitter and all the infected device to perform.

In the second quarter showed significant growth malware to damage the flash drive and steal passwords. For example, a worm with a startup, the number of new models which was almost 1.2 million, is distributed via flash drives by performing a code embedded in the startup files for all detected flash drives. Overall, the number of new samples of malware to steal passwords was about 1.6 million These programs collect user data and passwords, allowing an attacker to impersonate someone who was a victim of his attack, the Company explained.

Web site can get the reputation of malware, if it contains malware or potentially unwanted software, or if it is created for phishing. In the reporting quarter, McAfee Labs experts were recorded monthly average of 2.7 million new URL-addresses with a bad reputation, which makes about 10 thousand new malicious domains daily. In this case, 94.2% of new URL-addresses with a bad reputation are used to host malware, exploits, or code that is specifically designed to break into computers, the report said.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s