Webroot Announces Most Common Threats

Webroot Software announces the most common forms of malicious security threats in the UK, at InfoSecurity Europe 2007

Dark Reading Staff, Dark Reading

April 24, 2007

1 Min Read
Dark Reading logo in a gray background | Dark Reading

LONDON -- Webroot Software, Inc., a leading provider of security software for the consumer, enterprise and SME markets, today announces the most common forms of malicious security threats in the UK, at InfoSecurity Europe 2007, Grand Hall, Olympia, London.

During the month of March, Trojan Downloader Zlob was the most commonly found Trojan worldwide. Some variants of the Trojan are capable of providing a hacker with the ability to remotely control and use the infected computer for malicious purposes. The Trojan disguises itself as a harmless program and is generally distributed as an email attachment. It often silently downloads and installs bogus security programs such as SpywareQuake, SpyFalcon, SpyLocked and WinAntivirusPro, but may install other malware as well.

In Webroot's monthly analysis of the most common forms of malicious attack, conducted by the company's automated spyware research system Phileas, 180search Assistant/Zango is identified as being the most widespread adware. Following closely behind is Hotbar/Zango and Starware Toolbar, an extremely high-level threat, capable of tracking a users' internet surfing habits and delivering information to a third party.

Perfect Keylogger is the most regular System Monitor, a critical threat capable of tracking software used to monitor computer activity. System Monitors range in capabilities and may monitor key strokes; emails; chat room conversations; instant messaging; websites visited; running programs; usernames and passwords. This information is gathered via remote access and stored or sold to a third party for criminal or immoral use.

Webroot Software Inc.

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights