Check Point also said that 'Although the virtual money digging tool is still a major danger, many of the malware families on this list target user data such as login information, sensitive data, account information. banking, payment . shows that this information is still not very attractive to cyber criminals'.
Two virtual money-digging malware are followed by Dorkbot, an IRC computer worm with remote code execution, and Roughted, an advertising malware used to spread many forms of payloads. Andromeda backdoor allows its owner to create very powerful botnet and Jsecoin JavaScript-based digging tool occupies 5th and 6th position.
The end of this ranking is Monero's pre-mining CPU called XMRig, the bank Trojan used to categorize personal information, the famous Ramnit and computer worms Conficker with control and Remote malware release.
The 10th place is RAT FlawedAmmyy, the first face to appear, a remote version of the Trojan for remote desktop configuration software Ammyy Admin.
Here is a list of 10 global threat Threat Index
Coinhive
Cryptoloot
Dorkbot
Roughted
Andromeda
Jsecoin
XMRig
Coinficker
FlawedAmmyy SV
Top 3 malware on mobile
Triada
Lokibot
Hiddad
Top 3 most exploited vulnerabilities
Microsoft IIS WebDAV ScStoragePathFromUrl Buffer Overflow (CVE-2017-7269)
OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346
PHPMyAdmin Misconfiguration Code Injection web servers
See more:
LokiBot - bank trojan on Android turns into ransomware when you try to delete it
Hacker hijack CoinHive DNS to dig virtual money with thousands of websites
Malware digs virtual money over antivirus programs, forcing Windows to crash
the internet and digital internet corporation (icann) will make changes to the security keys for dns (domain names) for maintenance and this may cause the global internet to have connectivity problems in about 48 coming.
the global concept (global) means everything has access to it. in node.js, too, global objects are available for all modules. we do not need to declare or import them by the require () method but can still use them directly.
ransomware has become one of the top security threats in the past three years. the first ransomware strain and one of the worst nightmares in the history of global cybersecurity - wannacry - was discovered in may 2017.