BitDefender E-threat report: large vulnerabilities in PDF and Java applications Holzwickede, November 11, 2010 in his monthly E-threat report expert antivirus BitDefender (www.bitdefender.de) has in particular the threat situation in Germany in the eye. Here a clear picture is emerging: many PCs are infected in particular on the basis of security vulnerabilities in the Adobe PDF reader or Web site infested by the visit. In the latter case the danger is mostly behind Java applets. The third major attack vector is the Windows autorun feature and the associated vulnerability of removable media. Total fall equal to eight out of ten E-threats in one of these three categories. The leading positions among the top digital pests in Germany have two PDF exploits. PDF Payload.Gen (rank 1 8.58%) and PDF-JS.Gene (rank 2 7.52%) the places have changed compared with the quarter report published in September in the security software manufacturer.
The third member of the virus family can be found at position 9 Exploit.PDF-TTF.Gen has an infection rate of 1.75%. All three use different vulnerabilities in PDF Adobe Reader. New entrants Java.Trojan.Exploit.Bytverify.N occupies 3rd place (5,06%) right off the bat. This kind of malware has the peculiarity that it occurs in very many different ways. So take two more family members”Java.Trojan. Exploit.Bytverify.I (rank 5 3.63%) and Java.Trojan.Exploit.Bytverify.J (rank 10 1.73%) also places in the October top 10 of the security software manufacturer.
While the former compared to the quarterly report to three places have risen, falls the J option to seven places. Nevertheless, their effectiveness in the infection of computers in Germany remains remarkable. The pests spread via Internet browser and contaminate the respective PC then with additional malware. A second newcomer to fourth place with an infection rate of 4.29% finds himself: attackers use gene: Variant: Hiloti. 3 all to manipulate virtual systems. The E-threat to do is to go to the location, local antivirus programs and virus scanner, and also has a very effective camouflage mechanism, which also makes it hard for users the culprit”.