{"id":6313,"date":"2009-11-05T13:07:23","date_gmt":"2009-11-05T05:07:23","guid":{"rendered":"http:\/\/techielobang.com\/blog\/?p=6313"},"modified":"2009-11-05T13:07:23","modified_gmt":"2009-11-05T05:07:23","slug":"the-top-10-things-you-need-to-know-about-internet-threats","status":"publish","type":"post","link":"https:\/\/techielobang.com\/blog\/2009\/11\/05\/the-top-10-things-you-need-to-know-about-internet-threats\/","title":{"rendered":"The Top 10 Things You Need To Know About Internet Threats"},"content":{"rendered":"<p style=\"text-align: left;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"6314\" data-permalink=\"https:\/\/techielobang.com\/blog\/2009\/11\/05\/the-top-10-things-you-need-to-know-about-internet-threats\/image001-4\/\" data-orig-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/11\/image001.gif?fit=166%2C42&amp;ssl=1\" data-orig-size=\"166,42\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"image001\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/11\/image001.gif?fit=166%2C42&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/11\/image001.gif?fit=166%2C42&amp;ssl=1\" class=\"size-full wp-image-6314 alignleft\" title=\"image001\" src=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/11\/image001.gif?resize=166%2C42\" alt=\"image001\" width=\"166\" height=\"42\" \/>This information is from Kaspersky. It is refreshing to see statistics like these.<\/p>\n<blockquote><p><span style=\"font-family: Verdana;\"><span><span><span><span><span><span><span><span style=\"line-height: 115%; font-size: 10pt;\" lang=\"EN-US\">Did you know the country with the most malicious URLs is  Canada?<span> <\/span>Or that the largest virus  doing the rounds is the massive <\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><span><span><span><span><span><span><span><span><span style=\"line-height: 115%; font-size: 10pt;\" lang=\"EN-US\">Trojan.Win32.Chifrax.d at  388 megabytes, while the smallest is just 30  kilobytes?<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p><\/blockquote>\n<p><span style=\"font-family: Verdana;\"><span><span><span><span><span><span><span><span><span style=\"line-height: 115%; font-size: 10pt;\" lang=\"EN-US\">More after the break.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"font-family: Verdana;\"><span><span><span><span><span><span><span><span><span style=\"line-height: 115%; font-size: 10pt;\" lang=\"EN-US\"><!--more--><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"center\"><strong>Kaspersky Reveals The Top 10 Things You Need To Know About Internet  Threats<\/strong><\/p>\n<p align=\"center\"><strong> <\/strong><strong>\u2018Malware Miscellany\u2019 \u2013 a monthly report into the facts, figures <\/strong><strong>and nature of internet  threats<\/strong><\/p>\n<p><strong>05 November, 2009  [Singapore]<\/strong> \u2013 Did you know the country with the most malicious URLs is  Canada?\u00a0 Or that the largest virus  doing the rounds is the massive  Trojan.Win32.Chifrax.d at  388 megabytes, while the smallest is just 30  kilobytes?<\/p>\n<p>Kaspersky Lab, a leading developer of secure  content management systems, revealed this and other interesting facts about the  threats PC users in Singapore and around the world face every  day.<\/p>\n<p>In its new \u2018Malware Miscellany\u2019 monthly report,  Kasperky Lab has identified the Top 10 things internet users need to know about  viruses and malware.<\/p>\n<p>While many of the facts appear fascinating,  Kaspersky Lab stresses that these threats can be dangerous and costly unless  your PC is protected with anti-virus  software.<\/p>\n<h1>Malware Miscellany, September  2009<\/h1>\n<table style=\"height: 675px;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" width=\"460\">\n<tbody>\n<tr>\n<td width=\"37\" valign=\"top\"><strong> <\/strong><\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\"><strong>Category<\/strong><\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\"><strong>Details<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"37\" valign=\"top\">1<\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\">Top 3 countries for malicious        URLs<\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\">Canada takes first place, hosting more than 21% of the        world\u2019s malicious URLs. The US is second with 16%, followed by China with        15%.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"37\" valign=\"top\">2<\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\">Top 3 countries hosting sites which spread        malware<\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\">China claims first place, hosting 26% of all malicious sites        globally. \u00a0The US comes second        with 18%, and Russia is third with 12%.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"37\" valign=\"top\">3<\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\">Malicious site which affects the biggest number of Internet        users<\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\"><a href=\"http:\/\/www.langlangdor.com\/\" target=\"_blank\">www.langlangdor.com<\/a> accounted        for 1.62% of all online infections globally. \u00a0This is a porn site located in        China. Porn always attracts a lot of visitors, and it&#8217;s no secret that        it&#8217;s often used by cybercriminals to spread malicious or suspicious        content. \u00a0There&#8217;ve been        attempts (which were blocked) to spread a wide variety of Trojans from        this site \u2013 most of them are Trojan-Downloader.Win32.Agent and        Trojan.Win32.StartPage variants.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"37\" valign=\"top\">4<\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\">Site spreading the biggest number of unique malicious        programs<\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\">1142 unique malicious programs were spread from <a href=\"http:\/\/www.gddsz.store.qq.com\/\" target=\"_blank\">www.gddsz.store.qq.com<\/a>. \u00a0The programs vary widely, and cover        virtually all the different types of malware behavior in Kaspersky Lab&#8217;s        classification.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"37\" valign=\"top\">5<\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\">Biggest malicious program<\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\">In September, this category was led by Trojan.Win32.Chifrax.d        at 388 MB. \u00a0There are numerous        modifications of this Trojan, all larger than 300 MB.        Trojan.Win32.Chifrax.d is the name used to detect CAB archives which have        been specially modified by virus writers in order to evade antivirus        solutions.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"37\" valign=\"top\">6<\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\">Smallest malicious program<\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\">Trojan.BAT.Shutdown.ab is a mere 30 bytes. \u00a0It\u2019s part of another Trojan that        uses it to shut down the victim\u2019s computer without asking the user\u2019s        consent.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"37\" valign=\"top\">7<\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\">Most widespread vulnerability on users\u2019        computers<\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\">In late July, Adobe Flash Players 9 and 10 were found to have        multiple vulnerabilities that can be exploited by cybercriminals to gain        access to a system, run arbitrary code, gain access to confidential data        or bypass security systems. \u00a0More information about the        vulnerabilities and how to fix them, can be found at: <a href=\"http:\/\/www.viruslist.com\/en\/advisories\/35948\" target=\"_blank\">http:\/\/www.viruslist.com\/en\/advisories\/35948<\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"37\" valign=\"top\">8<\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\">Most common exploit<\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\">Exploit.JS.DirektShow: in combination with        Exploit.Win32.DirektShow, this malware family exploits a critical        vulnerability in Internet Explorer 6.0 and 7.0 and has recently become        extremely widespread on the Internet.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"37\" valign=\"top\">9<\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\">Most widespread malware on the        Internet<\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\">In just a month, Packed.Win32.TDSS.z tried to penetrate        computers in 108 countries around the      world.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"37\" valign=\"top\">10<\/td>\n<td width=\"261\" valign=\"top\">\n<p align=\"left\">Worst joke (hoax programs that scare or annoy users but don\u2019t        have a clearly malicious payload)<\/p>\n<\/td>\n<td width=\"473\" valign=\"top\">\n<p align=\"left\">Hoax.JS.Agent.c displays an obscene video clip and bombards        victims with offensive messages which can&#8217;t be stopped.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p align=\"center\">###<\/p>\n<p><strong><br \/>\n<\/strong><strong>About Kaspersky  Lab<\/strong><\/p>\n<p>Kaspersky Lab delivers the world\u2019s most immediate protection  against IT security threats, including viruses, spyware, crimeware, hackers,  phishing, and spam. Kaspersky Lab is one of the top vendors of information  security solutions in the world. The company\u2019s products and technologies are  used by over 250 million people worldwide, its technology is licensed by leading  security vendors globally. The Kaspersky Lab group of companies is headquartered  in Moscow, has five regional divisions including Southeast Asia and numerous  local offices throughout the world. You can learn more about Kaspersky Lab by  visiting <a href=\"http:\/\/www.kaspersky-sea.com\/\" target=\"_blank\">www.kaspersky-sea.com<\/a>. For the latest on anti-virus, anti-spyware, anti-spam and other  IT security issues and trends, please visit  <a href=\"http:\/\/www.viruslist.com\/\" target=\"_blank\">www.viruslist.com<\/a>.<\/p>\n<p>To know more about Kaspersky latest news, events and activities,  please join Kaspersky Friends and Fan Klub, visit  <a href=\"http:\/\/www.kklub.net\/\" target=\"_blank\">www.kklub.net<\/a>.<\/p>\n<p>\u00a9 2009 Kaspersky Lab. The information  contained herein is subject to change without notice. The only warranties for  Kaspersky Lab products and services are set forth in the express warranty  statements accompanying such products and services. Nothing herein should be  construed as constituting an additional warranty. Kaspersky Lab shall not be  liable for technical or editorial errors or omissions contained  herein.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This information is from Kaspersky. It is refreshing to see statistics like these. Did you know the country with the most malicious URLs is Canada? Or that the largest virus doing the rounds is the massive Trojan.Win32.Chifrax.d at 388 megabytes, while the smallest is just 30 kilobytes? More after the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[4,14,3],"tags":[886,1493],"class_list":["post-6313","post","type-post","status-publish","format-standard","hentry","category-information","category-techie","category-technology","tag-kaspersky","tag-threats"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p8YKZ-1DP","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/6313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/comments?post=6313"}],"version-history":[{"count":3,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/6313\/revisions"}],"predecessor-version":[{"id":6317,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/6313\/revisions\/6317"}],"wp:attachment":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/media?parent=6313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/categories?post=6313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/tags?post=6313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}