Skip to main content

Top Viruses for 2004

In the year that is coming to an end, the Downloader.GK Trojan has been the malicious code that has caused most damage among users’ computers, according to the data gathered by Panda ActiveScan. The prevalence of this Trojan signifies an important change in the repercussions that malicious codes are having on users’ computers, as until now, first place in this annual ranking had always been occupied by a worm.

Panda Software’s ActiveScan is a free virus removal tool available for all computer users to repair their computers and fix the viruses missed by other antivirus providers.

Data provided throughout 2004 demonstrates Downloader.GK ranks #1 for 2004 and responsible for approximately 14% of all attacks. This Trojan doesn’t spread of its own accord, but is downloaded onto computers when unsuspecting users visit certain web pages and accept the installation of a specific ActiveX control. Downloader.GK installs and runs two adware programs on the computers it infects. More information about Downloader.GK can be found at:

http://www.pandasoftware.com/virus_info/encyclopedia/overview.aspx?idvirus=48242

The remainder of the Top Ten ranking of malicious code detected by Panda ActiveScan was comprised of:

2. Netsky.P (6.92%)
3. Sasser.ftp (4.97%)
4. Gaobot.gen (4.31%)
5. Mhtredir.gen (4.22%)
6. Netsky.D (3.98%)
7. Downloader.L (3.56%)
8. Qhost.gen (3.48%)
9. Netsky.B (3.45%)
10. StartPage.FH (3.34%)

The following conclusions can be drawn from the data collected by Panda ActiveScan during 2004:

2004 — THE FIRST TIME A TROJAN IS THE UNDISPUTED LEADER IN ANNUAL RANKING.

Since it first appeared in June 2004, Downloader.GK has been the malicious code responsible for most attacks on users’ systems, replacing worms as the primary threat and heralding the advent of a dangerous new trend in malware, as the impact of Trojans is on the increase. This is also manifest in the fact that four of the Top Ten are also Trojans, when in 2003 there were two, and in 2002 just one.

THE PRESENCE OF NETSKY Three of the Top Ten ranking are members of the Netsky family, (the P,B and D variants). The three share a number of characteristics, and as with many worms, they all spread via email in messages with variable characteristics.

VULNERABILITIES IN THE LINE OF FIRE Four of the malicious code in this year’s Top Ten use vulnerabilities in common software installed on computers in order to carry out their malicious action. This highlights the danger that these flaws represent and the need for users to install the patches provided by vendors to fix them.

Editors' Recommendations

Digital Trends Staff
Digital Trends has a simple mission: to help readers easily understand how tech affects the way they live. We are your…
Watch SpaceX’s Starship prototype blow its top during a ground test
watch spacexs starship prototype blow its top during a ground test

RIP Starship Mk1. @LabPadre stream:https://t.co/CwiHPUf7D3 pic.twitter.com/SckLfdIhw3
— Chris B - NSF (@NASASpaceflight) November 20, 2019

Well, that wasn’t supposed to happen.

Read more
Panoramic image of the southern sky shows our galaxy and others beyond
image 7773e tess southern sky 1

This mosaic of the southern sky was assembled from 208 TESS images. Among the many notable celestial objects visible is the glowing band (left) of the Milky Way, our home Galaxy seen edgewise, the Orion Nebula (top), a nursery for newborn stars, and the Large Magellanic Cloud (center), a nearby galaxy located about 163,000 light-years away. NASA / MIT / TESS / Ethan Kruse, USRA

This striking image shows the vast sea of stars in the southern sky, as imaged by NASA's planet-hunting satellite, the Transiting Exoplanet Survey Satellite (TESS) in its first year of operations.

Read more
The 2019 Freedom on The Net report says social media is ruining everything
protestor wearing anonymous mask

The internet today is far from the utopian place that it was in the past, the Freedom on the Net 2019 report by bipartisan watchdog and think tank Freedom House suggests. And it’s hard to disagree.

“Internet freedom is increasingly imperiled by the tools and tactics of digital authoritarianism, which have spread rapidly around the globe,” the report notes. “Repressive regimes, elected incumbents with authoritarian ambitions, and unscrupulous partisan operatives have exploited the unregulated spaces of social media platforms, converting them into instruments for political distortion and societal control.”

Read more