Η Check Point Research, except from World Threat List for June of 2019 also published 10 most popular threats in Greece for the same month.
Let's look at them in detail:
Hawkeye - The Hawkeye is a malicious one Info Stealer, designed primarily to extract user data from infected platforms running Windows. In recent months, the Hawkeye has been improved including now, in addition to code theft e-mail and website browser, features keylogging. Often sold in the market as MaaS (Malware as a Service) through various infection chain techniques.
Trickbot - Trickbot is a variant of it Dyre that appeared in October on 2016. Since then, it has been targeting mainly bank users in Australia and the United Kingdom and has recently begun to appear in India, Singapore and Malaysia.
Lokibot - Lokibot is a spyware software that spreads primarily through phishing email and is used to intercept data such as e-mail credentials, as well as passwords to electronic cryptographic wallets and FTP servers.
XMRig - XMRig is a software CPU mining open source code used for the Monero cryptocurrency production process and was first released in 2017 in May.
AZORult - AZORult is a trojan that collects and removes data from the infected system. Once the malware is installed on a system (usually delivered by an operating kit such as RIG), it can send stored passwords, local files, cryptocurrencies and computer profile information to a remote command & control server.
FormBook - The FormBook it is one InfoStealer targeting the operating system of Windows and 2016 was first detected. Advertised on hacking Forums as a tool with powerful avoidance techniques and relatively low prices. The FormBook collects credentials from various website browsers and screenshots, monitors and logs keyboards, and can download and execute files according to instructions C & C given to him.
NanoCore - NanoCore is a remote access trojan that was first noticed by 2013 and targets users of the Windows operating system. All versions include features such as screen capture, crypto mining, remote control and more.
Emotet - Sophisticated modular trojan that reproduces itself. Emotet once served as a scam bank account spy and has recently been used to distribute other malware or dissemination campaigns malware. It uses many methods and avoidance techniques to stay in the system and avoid detection. In addition, it can be spread through spam phishing emails containing attachments or links to malicious content.
Cryptoloot - Cryptocurrency software that uses the power of the central processing unit (CPU) or graphics processor (GPU) and the victim's existing resources to generate cryptocurrencies - adding transactions to the blockchain and generating new currencies. It competes with Coinhive.
Check Point: 10 most prevalent malware threats in Greece for June 2019
Family of malware
Her Threat Prevention Sources Check Point are available on the following website: