Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Malware

Blackhole dominates web malware attacks

Paul Anderson by Paul Anderson
January 27, 2012 - Updated on July 15, 2012
in Malware, Security, Technology News
1
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

According to a recent security article from Sophos, “drive-by” download attempts now comprise more than half of malware assaults on Web users. And the most seen drive-by exploit accounts for 31 percent of the internet attacks discovered by the company’s security package in the last half of 2011—a bundle called Blackhole.

You might also like

BlueSky Ransomware Infects KMSAuto Activator users

Downthem DDoS service owner gets a 2-year prison sentence

Cloudflare Stops Record-Breaking DDoS

Blackhole constitutes an exploit kit accustomed to inject malware, adware and spyware into PCs that visit an exploit internet site, or are redirected to such a site from a different, compromised website. The kit’s developers endlessly update Blackhole’s exploit capabilities, which revolve around Java vulnerabilities, but Sophos alleges that a lot of computers continue to have older exposures because of haphazard Java patch installment. Hackers commonly apply the exploit kit to drop malware specified botnets assembled with the Zeus toolkit, rootkits, or false antivirus bundles that pressure users to pay for deceitful malware protection.

 

Amongst the additional security statistics in Sophos’s article:

 

  • The US tops the world in sources of spam e-mails, accounting for 11.43 percent of 2011’s detected traffic. India was the closest runner-up, at 8 percent.
  • The riskiest place to run a computer network in the world is Chile, measured by the percentage of computers experiencing a malware attack over a three month period, scoring a threat exposure rate (TER) of 61, nearly ten times the rate of attacks on systems in the US. China came in second with a TER of 45. The country with the safest network: Luxembourg.
  • Conficker, the Windows worm also known as Downup and Kido, is still the most commonly detected malware in the world over three years after its first detection. The worm, which spreads over network connections, thumb drives, and other removable media, accounted for nearly 15 percent of all infection attempts caught by Sophos in the last six months.
Tags: androidanonymousbackdoordownloadshackedinternetsecurity newsSOPAZer0Security
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

BlueSky Ransomware Infects KMSAuto Activator users

by Kyle
July 20, 2022 - Updated on July 22, 2022
0
BlueSky Ransomware backdoors KMSAuto activator

A financially motivated threat actor has been discovered spreading a new ransomware strain, dubbed BlueSky. The group is believed to be connected to the Conti ransomware group. CloudSEK's...

Read more

Downthem DDoS service owner gets a 2-year prison sentence

by Christi Rogalski
June 30, 2022 - Updated on July 7, 2022
0
Downthem DDoS Service owner sentenced

Matthew Gatrel, a resident of St. Charles, Illinois, has been sentenced to two years in prison for violating the Computer Fraud and Abuse Act (CFAA). The 33-year-old was...

Read more

Cloudflare Stops Record-Breaking DDoS

by Christi Rogalski
June 29, 2022
0
Cloudflare record breaking DDoS

Cloudflare has reported that it successfully neutralized the largest recorded DDoS attack in history. The attack, a 26 million request per second onslaught, targeted a customer on the...

Read more

Syslogk Linux Rootkit triggers with magic packets

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Syslogk Linux Rootkit triggers with magic packets

Avast researchers have spotted a Linux rootkit that has the ability to hide malicious processes. The new Linux rootkit, called Syslogk, works by using magic packets to activate...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more
Next Post
Hcon Security FrameWork [Fire base]

Hcon Security FrameWork [Fire base]

Related News

BlueSky Ransomware backdoors KMSAuto activator

BlueSky Ransomware Infects KMSAuto Activator users

July 20, 2022 - Updated on July 22, 2022
BlackCat Ransomware aka “ALPHV” infections on the rise

BlackCat Ransomware aka “ALPHV” infections on the rise

June 16, 2022 - Updated on July 20, 2022
GIFs in messaging apps are tracking you

GIFs in messaging apps are tracking you

July 19, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.