Cisco has reported that the Rustock botnet was the most common security issue encountered by the firm's Remote Operations Services over the past three months.
The malware is one of the most prolific spam sources on the internet. It hit its peak over the summer, and represented 21 per cent of all threat events recorded by Cisco over the quarter.
Cisco believes that Rustock is primarily used for commercial spam selling goods such as pharmaceuticals and counterfeit watches.
The company also cited the September LinkedIn malware attacks as a major security event. That attack, fuelled by the Zeus malware Trojan, accounted for more than 31 per cent of all spam at its peak.
The Stuxnet botnet, meanwhile, picked up 38 per cent of its victims in the UK and 25 per cent in Hong Kong. The Netherlands, Australia and Brunei were also popular targets.
Despite recent reports of attacks on Adobe Reader, Cisco said that overall attacks targeting the Adobe platform were down in recent months.
Reader and Acrobat flaws accounted for just one per cent of attacks in September, down from three per cent in July.
Java, meanwhile, became an increasingly popular target over the period. Attacks on the platform reached seven per cent of all web malware in September, up from five per cent in July.
Resetting the telemetry circuits and associated boards brought the instrument back to operations mode
Fortnite news and updates: Flaw in Fortnite authentication could have helped attackers steal player login credentials
Attackers could have used Fortnite security flaw to buy in-game currency on players' stored credit cards
New photos show cotton seeds sprouting in sealed container - with other plants expected to sprout within days
Sudden increases in availability of sniper rifles on Vikendi