">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Tuesday, January 26, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

Malware attacks increased in October-Report

Milcah Lukhanyu by Milcah Lukhanyu
4 years ago
in Tech
12 min read
0

Check Point’s Threat Intelligence Research Team has revealed that the number of malware attacks increased in October, with both the number of active malware families and number of attacks increasing by 5% during the period, pushing the number of attacks on business networks to near peak levels, as seen earlier this year.

According to Nathan Shuchami, Head of Threat Prevention at Check Point, “With the number of attacks and malware families increasing, the scale of the challenge organizations face in ensuring their networks remain secure is tremendous.”

Shuchami adds that the fact the top ten malware remained virtually the same as September suggests that cyber criminals have enjoyed a considerable amount of success with these attack methods, calling organizations to proactively respond to protect their critical business assets.  He called on organizations to use the latest, multi-layered defenses to protect themselves and their customer-data.

Conficker retained its first place position as the world’s most prevalent malware, responsible for 17% of recognized attacks. Both second placed Locky, which only started its distribution in February of this year, and third placed Zeus, were responsible for 5% of known attacks.

Locky ransomware’s continued growth is the constant variation and expansion of its distribution mechanism, which is primarily through spams emails. Its creators are continually changing the type of files used for downloading the ransomware, including doc, xls and wsf files, as well as making significant structural changes to the spam emails.

For the seventh consecutive month, HummingBad, an android malware that establishes a persistent rootkit to carry out an array of malicious purposes, remained the most common malware used to attack mobile devices.

READ  Sports betting site SportPesa launches in Tanzania

October’s Top 10 ‘Most Wanted’ Malware

Related posts

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021
0

Stranded in Lockdown? Here Are 3 Ways You Can Make Money Via Cryptocurrencies Online

January 26, 2021
0
aimbot -8

UNDP Gifts Kenya With Robots That Will Aid In Fighting COVID-19

January 26, 2021
0

Signal Adds WhatsApp Like Features That Have Made The App More Interactive

January 26, 2021
0
  1. Conficker – Worm that allows remote operations and malware download. The infected machine is controlled by a botnet, which contacts its Command & Control server to receive instructions.
  2. Locky – Ransomware that started its distribution in February 2016, and spreads mainly via spam emails containing a downloader disguised as a Word or Zip file attachment, which then downloads and installs the malware that encrypts the user files.
  3. Zeus – Trojan that targets Windows platforms and often used to steal banking information by man-in-the-browser keystroke logging and form grabbing.
  4. Cutwail – Botnet mostly involved in sending spam e-mails, as well as some DDoS attacks. Once installed, the bots connect directly to the command and control server, and receive instructions about the emails they should send. After they are done with their task, the bots report back to the spammer exact statistics regarding their operation.
  5. Sality – Virus that allows remote operations and downloads of additional malware to infected systems by its operator. Its main goal is to persist in a system and provide means for remote control and installing further malware.
  6. Tinba – Banking Trojan that steals the victim’s credentials using web-injects and is activated when the users try to login to their bank’s website.
  7. HackerDefender – User-mode Rootkit for Windows that can be used to hide files, processes and registry keys, and also implements a backdoor and port redirector that operates through TCP ports opened by existing services. As a result, it is not possible to find the hidden backdoor through traditional means.
  8. Cryptowall – Ransomware that started as a Cryptolocker doppelgänger, but eventually surpassed it. After the takedown of Cryptolocker, Cryptowall became one of the most prominent ransomware to date. Cryptowall is known for its use of AES encryption and for conducting its Command & Control communications over the Tor anonymous network. It is widely distributed via exploit kits, malvertising and phishing
  9. Parite – Virus that infects executable files (.exe and .scr) on the infected host and network drive. It drops a malicious DLL file into the Windows temporary directory, which is injected into the explorer.exe process when an infected file is executed.
  10. Virut – Botnet that is known to be used for cybercrime activities such as DDoS attacks, spam, fraud, data theft and pay-per-install activities. It spreads through executable file infection (through infected USB sticks and other media), and more recently, through compromised HTML files (thus infecting vulnerable browsers visiting compromised websites).
READ  What WhatsApps End-to-end encryption means to you

 

October’s Top 3 ‘Most Wanted’ Mobile Malware

Mobile malware families continued to pose a significant threat to businesses, with 15 of the top 200 malware families targeting mobile devices. The three most common mobile families were:

  1. HummingBad – Android malware that establishes a persistent rootkit on the device, installs fraudulent applications and enables additional malicious activity such as installing a key-logger, stealing credentials and bypassing encrypted email containers used by enterprises.
  1. Triada – Modular Backdoor for Android that grants super-user privileges to downloaded malware, as helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.
  1.  XcodeGhost – A compromised version of the iOS developer platform, Xcode. This unofficial version of Xcode was altered so that it injects malicious code into any app that was developed and compiled using it. The injected code sends app information to a Command & Control server, allowing the infected app to read the device clipboard.

 

Readers 1,168

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Tags: cyber attackSecurity
Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

Tech

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021
0
Tech

Stranded in Lockdown? Here Are 3 Ways You Can Make Money Via Cryptocurrencies Online

January 26, 2021
0
aimbot -8
Tech

UNDP Gifts Kenya With Robots That Will Aid In Fighting COVID-19

January 26, 2021
0
Tech

Signal Adds WhatsApp Like Features That Have Made The App More Interactive

January 26, 2021
0
Toshiba
Tech

Chrome Now Helps You Change Weak Passwords

January 23, 2021
0
Tech

Top 5 Skills That Modern Software Developers Need to Have

January 22, 2021
0
Tech

What Software Developers Need to Know About Burnout

January 22, 2021
0
Tech

Which is Better, Leasing or Purchasing Farm Equipment?

January 22, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

Samsung, Safaricom partner to push Samsung Galaxy S21 pre-orders

January 26, 2021

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021

8 Facts People Don’t Know About Bitcoin

January 26, 2021

Stranded in Lockdown? Here Are 3 Ways You Can Make Money Via Cryptocurrencies Online

January 26, 2021

3 Tips On Avoiding Cryptocurrency Scams

January 26, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: