The threat of infection by the banking trojan known as Spy.Win32.Zbot.gen subsided slightly last month but a DNSChanger malware variant is on the rise, latest intelligence has revealed.

According to data compiled from monthly scans carried out by Sunbelt Software’s anti-malware labs, there has been a fall off in the number of infections for the top threat, which was down 38% from 8% to 5% of total threats seen last month. 

Trojan-Spy.Win32.Zbot.gen disables firewalls, and is used in attempts to steal sensitive financial data like credit card numbers, online banking login details. 

It can also make screen snapshots, and is known to download additional components that could provide a hacker with the remote access to the compromised system.

For July, SunbeltLabs reported increased activity of the second-highest detected malware threat in the form of a DNSChanger variant.

This is included in a group of Trojans that uses down-loaders for rogue anti-malware applications to drop malicious code on users’ PCs. 

The installed software code could then contact malicious Web sites before downloading further malware, SunbeltLabs has warned.