A global leader in “high-performance network security,” Fortinet (News - Alert) today announced the reports of its FortiGuard threat landscape research team for the period of October 1 - December 31, 2012.
Based on the research, FortiGuard Labs presented samples of malware that typically highlight four different methods by which cyber criminals are extracting money from the victims today.
At the same time, the study also reports a growing activity in mobile malware variants of Android’s (News - Alert) Plankton ad kit and vulnerability scanning for its hacktivist Web server.
FortiGuard Labs presented samples of four money making malware to be aware of in 2013. In the past three months, the research team has identified four malware that is being widely used, featuring high levels of unscrupulous activities within a short time period, from a day to a week.
Presented here are the four ways cyber criminals are currently monetizing their malware today:
Android Mobile Advertising Malware
FortiGuard Labs has also detected a huge surge in spreading Android Plankton ad kit. The malware skillfully embeds common toolsets into users’ android devices, which serve as unwanted advertisements in the status bar. It then tracks the user’s International Mobile Equipment Identity numbers and drops the icons on the desktop of android device.
At the same time, they reported high activity levels of ZmEu, a hacking tool that was developed to scan the Web servers that run vulnerable versions of MySQL administration software, to take control of these servers.
Fortinet is the market leader in unified threat management, and a global landmark for advanced network security appliances.