Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

Top 10 Malware Threats for March, 2010

Top 10 Malware Threats for March

Top 10 Malware Threats for March

Sunbelt Software has announced the top 10 most prevalent malware threats for the month of March 2010. The list of detections for March shows the continued prevalence of Trojan horse programs circulating on the Internet and the growing trend of generic and behavior-based detections in antivirus detections. Generic and behavior-based detections by the antivirus industry have improved thanks to the massive increase in new malcode, which number thousands per day.

The top two detections for March remained in the same positions as February. Both Trojan.Win32.Generic!BT (31.07%) and Trojan-Spy.Win32.Zbot.gen (4.97%) remained consistent in the overall malware tracked. The top 10 made up more than 50 percent of all detections for the month and the top two made up greater than 36 percent of all detections.

March saw the additions of INF.Autorun (v) and BehavesLike.Win32.Malware (v) appearing in the fifth and sixth spots and Trojan.Win32.Agent and Trojan-Spy.Win32.Zbot.gen (v) dropped off the list. Other detections with a significant change in March include Exploit.PDF-JS.Gen (v), which saw its percentage of total detections grow by almost 50 percent, and Trojan.Win32.Generic.pak!cobra – which saw a significant drop in its share from 3.37% to 1.37% of all detections.

The top 10 Most Prevalent Malware Threats for March, 2010 are:

1. Trojan.Win32.Generic!BT 31.07%

2. Trojan-Spy.Win32.Zbot.gen 4.97%

3. Exploit.PDF-JS.Gen (v) 3.76%

4. Trojan.Win32.Generic!SB.0 3.36%

5. INF.Autorun (v) 1.70%

6. BehavesLike.Win32.Malware (v) 1.47%

7. Trojan.Win32.Generic.pak!cobra 1.37%

8. Trojan.Win32.Malware 1.37%

9. Trojan.ASF.Wimad (v) 1.23%

10. Virtumonde 1.21%

The top 10 results represent the number of times a particular malware infection detected and reported back to ThreatNet, Sunbelt’s community of opt-in users. These threats are classified as moderate to severe based on method of installation among other criteria established by SunbeltLabs.

Written By

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.


Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.

Malware & Threats

Security researchers are warning of a new wave of malicious NPM and PyPI packages designed to steal user information and download additional payloads.

Malware & Threats

Cybercrime in 2017 was a tumultuous year "full of twists and turns", with new (but old) infection methods, a major return to social engineering,...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...