Java Exploit Jumps From 10 To 1 In The BitDefender E-threat In October Top Ten

What digital pests currently threaten German user? Holzwickede, November 14, 2011 – a golden October for Java-based online pests: the top spot the malware-top ten for Germany, compiled by virus protection expert BitDefender (, occupied Java.Exploit.CVE-2010-0840.B, which was still ranked 10 in the past month. Three of his relatives are also positioned in the ranking. The exploit family exploits a vulnerability in Java to download more malware. Three Adware threats, see the top ten. Newly entered right on 2nd place is Trojan.Iframe.SC, ‘Perennial’ Conficker follows him.

Java.Exploit.CVE-2010-0840.B secures first place in the E-threat report with an infection rate of 5.07% to make after a jump from the last place at the front. Three his “Cousins” are also represented: Trojan.Mailbot.DG on rank 4 (3.16%), Trojan.Java.MailSend.A at position 5 (2.97%), as well as Trojan.Exploit.ANSH on 7th (2.54%). Together they form a share of around 14% am all malware occurrence in Germany. All four pests draw on a vulnerability in the Java virtual machine, allowing applications to perform operations, actually only a logged in user can cause. To install additional malware on the computer, download the E-threats browser helper objects (BHOs).

The newcomers Trojan.Iframe.SC ranks 2 (4.74%). It forwards queries of the user to arbitrarily selected sites with pornographic content after it has previously conducted an iFrame injection. To do so he wraps an iFrame tag in the source code of certain Web pages, downloaded over the content of third-party server. Win32.Worm.Downadup.Gen (4.36%), which since 2008 under the name Conficker remains stubbornly in the ranking and in October again did well some places stands in third place of the malware “Charts”. First and foremost, the worm prevents the user to download updates for the operating system of the computer or the installed antivirus solution, by he relevant websites blocks. In some cases, the threat invites in addition fake security programs on the computer.