More than two years since first appearing, the Netsky-P worm remains the most widespread piece of malware spreading via email, Sophos has said.
In its latest monthly investigation into the top ten Malware threats, the security vendor has also found the Mytob worm family was also the source of numerous infections.
Some five different variants of the worm appeared in the company’s May threat list.
Sophos also identified 1538 new threats during the month, bringing the total Malware pool identified by the company to 122,634.
Trojans continued to form the majority of the new threats during the period accounting for 85.1 percent of identified threats. Worms or viruses formed 12.3 percent.
Sophos also said that hackers continued to turn to targeted Trojans over mass mailing attacks as their preferred modus operandi. In May 2005, one in every 38 emails were infected by a worm or virus whereas this figure was now just one in 141 emails.
The top ten list of malware in May 2006:
1. Netsky-P 16.7 %
2. Zafi-B 11.4 %
3. Nyxem-D 7.5 %
4. Mytob-AS 6.3 %
5. Mytob-P/Mytob-M 5.3 %
7. Netsky-D 3.7 %
8. MyDoom-O 3.6 %
9. Mytob-FO 2.9 %
10. Mytob-C 2.1 %
Others 35.2 %
Netsky-P worm tops Sophos May threat list
By
Staff Writers
on Jun 2, 2006 10:47AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Tech For Good program gives purpose and strong business outcomes

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Channel can help lead customers to boosting workplace wellbeing with professional headsets
Sponsored Whitepapers

Easing the burden of Microsoft CSP management
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management