SV joins the top 10 global threats
Remote Access Trojan (RAT), called FlawedAmmyy, recently joined the Global Threat Index after researchers at Check Point discovered a lot of attack campaigns using SV, culminating in in October 2018.
Checkpoint said FlawedAmmyy, this attack allows the culprit to control the victim's computer remotely, take full control of the camera, microphone of the device, collect screenshots, steal login information, data sensitive data and monitor user activity.
This is the first time that RAT has joined the Global 10 Top Index, even though it only ranked last. Meanwhile, malware-hunting malware dominates the top positions. Coinhive dominates this chart when it accounts for about 18% of global influence (ie about one-fifth of organizations worldwide are affected by this malware). Cryptloot affects 8% of organizations that have been attacked by malware in the past few months.
The map shows the impact of regional malware
Check Point also said that 'Although the virtual money digging tool is still a major danger, many of the malware families on this list target user data such as login information, sensitive data, account information. banking, payment . shows that this information is still not very attractive to cyber criminals'.
Two virtual money-digging malware are followed by Dorkbot, an IRC computer worm with remote code execution, and Roughted, an advertising malware used to spread many forms of payloads. Andromeda backdoor allows its owner to create very powerful botnet and Jsecoin JavaScript-based digging tool occupies 5th and 6th position.
The end of this ranking is Monero's pre-mining CPU called XMRig, the bank Trojan used to categorize personal information, the famous Ramnit and computer worms Conficker with control and Remote malware release.
The 10th place is RAT FlawedAmmyy, the first face to appear, a remote version of the Trojan for remote desktop configuration software Ammyy Admin.
Here is a list of 10 global threat Threat Index
- Coinhive
- Cryptoloot
- Dorkbot
- Roughted
- Andromeda
- Jsecoin
- XMRig
- Coinficker
- FlawedAmmyy SV
Top 3 malware on mobile
- Triada
- Lokibot
- Hiddad
Top 3 most exploited vulnerabilities
- Microsoft IIS WebDAV ScStoragePathFromUrl Buffer Overflow (CVE-2017-7269)
- OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346
- PHPMyAdmin Misconfiguration Code Injection web servers
See more:
- LokiBot - bank trojan on Android turns into ransomware when you try to delete it
- Hacker hijack CoinHive DNS to dig virtual money with thousands of websites
- Malware digs virtual money over antivirus programs, forcing Windows to crash
You should read it
- Ragnarok Origin Global on PC
- GAN (Global Area Network) price, marketcap, chart, and fundamentals info
- How does GPS global positioning system work?
- Global keywords in Python
- Research to warn snake mushrooms can be a global threat
- Warning: Global Internet may be interrupted in the next 48 hours
- Only 13% of the world's tiger reserves meet the global standards
- Global objects in Node.js
- Tomorrow, global GPS will end its operation cycle, 'Y2K incident' can happen again
- The malware owner earned $ 63,000 from digging Monero on the IIS server
- Index (INDEX) in SQL
- HMD Global plans to launch a global data roaming SIM card, saving up to 70% on costs
May be interested
Raspberry Pi 3 Model A +: 8-core chip, clocked at 1.4GHz, priced at $ 25
Portal, a better YouTube video platform, does not advertise
AQUOS R2 Compact: The smartphone has both moles and rabbit ears, being rated 'worst in history'
Microsoft brought the brightness slider back to Windows 10
Instructions for canceling network transfers keep the number unchanged
PhotoScan, the application that turns images into digital copies from Google owners, invites and experiences