Top 7 Malware Targeted India in JFM 2014 - Report by ESET

Nethra AB's picture
Printer-friendly versionPrinter-friendly versionPDF versionPDF version

INF/Autorun.gen is the most identified threat and Win32/Bundpil.BO is the new worm entered in February and increased its activity by 4%


City, State, Country., April 28, 2014 - (PressReleasePoint) -BANGALORE / MUMBAI, India - April 28, 2014 
ESET, global provider of security solutions for businesses and consumers, reported top 7 malware targeted India during JFM 2014. ESET researchers are continuously studying on all the activities of new threats and variants on daily basis. ESET is also preparing prevalence maps of these threats for every country every-day. According to them,  INF/Autorun is the most identified malware and Win32/Bundpil.BO is the new threat variant entered India and spreading via removable media by 4% now. 


Among all 7 top threats INF/Autorun is the most identified malware among Indian users. It is  generic detection of the AUTORUN.INF configuration file created by malware. The AUTORUN.INF file contains the path to the malware executable. This file is usually dropped into the root folder of available drives in an attempt to autorun a malware executable when the infected drive is mounted. The AUTORUN.INF file(s) may have the System (S) and Hidden (H) attributes present in attempt to hide the file in Windows Explorer.
 
The chart 'Threat Analysis of JFM 2014' shows INF/Autorun.gen, took top position among all threats in JFM 2014, in India with the other 6 threats.
 
Threat%20Report%20JFM%202014.jpg
 
 
According to ESET, threats are targeting ESET users in a similar way with light variance and ESET has blocked new threats in a big way.
 
About Win32/Bundpil.BO:  It is the new threat variant of Bundpil which was detected in July 2013. This variant attacked Indian ESET users in February 2014. Bundpil has 4.92% of World Activity Peak and it has more affect in Afghanistan and Mangolia with more than 25% attack activity. This threat spreads via removable media. The worm contains an URL address, and it tries to download several files from the address. The files are then executed and the HTTP protocol is used. The worm may delete the files like *.exe, *.vbs, *.pif, *.cmd, *Backup.
 
All the threats are captured by Threatsense.net
 
# # #
 
About ThreatSense.Net®
ThreatSense.Net®is ESET's in-the-cloud malware collection system utilizing data from users of ESET solutions worldwide.  This continual streaming of information provides ESET Virus Lab specialists with a real-time accurate snapshot of the nature and scope of global infiltrations. Careful analysis of the threats, attack vectors and patterns serves ESET to fine-tune all heuristic and signature updates   ̶to protect its users against tomorrow's threats.
 
About ESET
Founded in 1992, ESET is a global provider of security solutions for businesses and consumers. ESET's flagship products ESET NOD32 Antivirus, ESET Smart Security and ESET Cyber security for Mac are trusted by millions of global users. ESET NOD32 Antivirus holds the world record for the number of Virus Bulletin "VB100" Awards, and has never missed a single "In-the-Wild" worm or virus since the inception of testing in 1998. 
 
The Company has global headquarters in Bratislava (Slovakia), with regional distribution headquarters in San Diego (U.S.), Buenos Aires (Argentina), and Singapore. ESET has malware research centers in Bratislava, San Diego, Buenos Aires, Prague (Czech Republic), Krakow (Poland), Montreal (Canada), Moscow (Russia), and an extensive partner network in 180 countries.
 
In India ESET products are exclusively supplied and supported by "ESS Distribution Pvt Ltd".  The sales of ESET products are executed through the Channel Partners across India. Website: www.esetindia.com/


Press Contact:
Aparna B Y
Bangalore
9900061851
http://changeagentspr.wordpress.com/
******.**@*h**g**g**t*.in
Email partially hidden to block spam. Please use the contact form here.
Contact Aparna B Y
Email the contact person for this press release. Do not send spam or irrelevant message.
8 + 9 =


Copy this html code to your website/blog to embed this press release.

Comments

Post new comment

15 + 4 =