• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
  • / yourpost
home / News / Check Point World Threat List June 2019

Check Point World Threat List June 2019

05/08/2019 15:41 by giorgos

Η Check Point Research, published the latest World Threat List for June at 2019. The research team confirms that the Emotet (the largest network in operation bots at this time), is off, and most of June saw no new campaigns. That's it Emotet, during the first six months of 2019, it was in the top five malwares worldwide while distributed with major messaging campaigns spam (spam).

Check Point researchers believe Emotet may be out of service for maintenance and upgrades. In addition, they believe that once its servers are restored, they will be reactivated with new, improved features.

virus - Check Point Global Threat List June 2019

Maya Horowitz, Director of Check Point Information and Threat Research, said:

The Emotet appeared in the foreground as banking Trojan the 2014. However from 2018, we have seen it used as a botnet in large campaigns malspam, and used to share others malwares. Although its infrastructure was inactive for most of June, it remained in fifth place on the list of global threats, which proves how much it is being used - and is likely to reappear with new features.

and continued:

In the summer of 2017 and 2018 we noticed patterns of attacks they exploited banking Trojans. This demonstrates that cybercriminals are trying to exploit the tourist season and that users on holiday are less concerned with security practices, using online banking services from shared devices and less secure connections.

Check Point: 3 most popular malware threats in June 2019:

* The arrows indicate the change in rank relative to the previous month.

  1. ↑ XMRig - XMRig is a software CPU mining open source for the Monero cryptocurrency production process that was first launched in May on 2017.

  2. ↑ JSEcoin - JavaScript extraction software that can be embedded in websites. With JSEcoin, you can run mining software directly in your browser in exchange for a non-ad browsing experience, game coins, and other incentives.

  3. ↓ Cryptoloot - Encryption software that uses the power of the central processing unit (CPU) or graphics processor (GPU) and the victim's existing resources for cryptomining - adding transactions to the blockchain and generating new currencies. It competes with Coinhive, trying to oust it by demanding a lower percentage of revenue from the sites.

3 Most Popular Malware Threats in June 2019:

TLotoor continues to be at the top of the list of the most widespread malware threats on mobile devices. Here follows Triada and Ztorg, a new malware for the first time in the list.

  1. ↑ Lotoor Malware for Android, which adjusts legitimate applications and publishes them to third parties bedspread. Its main function is to display ads, however it is capable of accessing security information on the operating system, allowing an intruder to obtain sensitive user data.

  1. ↓ Triada - Modular backdoor for Android that grants super user rights to downloaded malware, helping it integrate into system processes. Triada has also been observed to mislead URLs loaded into the browser.

  2. ↑ Ztorg - The Trojans belonging to the family Ztοrg, are gaining increasing privileges on devices Android and installed on directory of the system. The malware is able to install any other application on the device.

image002 - Check Point Global Threat List June 2019
Check Point’s Threat Prevention Resources Map

3 vulnerabilities 'most frequently exploited' for June 2019

In June, SQL Injections techniques continued to be at the top of the list, affecting 52% of organizations worldwide. The vulnerability of OpenSSL TLS DTLS Heartbeat Information Disclosure came in second, affecting 43% of organizations worldwide, closely followed by CVE-2015-8562 with an impact on 41% of organizations worldwide.

  1. - SQL Injection (various techniques) - This is the introduction of one SQL query the data provided by client in an application, thereby exploiting a vulnerability that exists in the code of that application.

  1. ↑ OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346) A vulnerability in disclosing information that exists in OpenSSL. The vulnerability is due to an error handling TLS / DTLS heartbeat packets. An attacker can exploit this vulnerability to disclose contents of the memory of a connected client or server.

  1. ↑ Joomla Object Injection Remote Command Execution  (CVE-2015-8562)- A vulnerability related to remote platform command execution has been reported Joomla. The vulnerability exists due to the lack of validation in the objects being imported, which can lead to remote code execution. A remote attacker could exploit this vulnerability by sending a malicious request to the victim. Successful exploitation of this vulnerability can result in arbitrary code execution by the target user.

* The complete list of the most common malware threats worldwide 10 can be found here.

_________________________

  • Windows 10 Build 18950 ISO: Snip & Sketch with zoom!
  • Facebook Like EU: everyone who uses it is responsible
  • Comodo Antivirus is released with vulnerabilities
Check Point World Threat List June 2019 was last modified: August 5, 2019, 3: 41 mm by giorgos

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: Newstag: 2014, Check Point, online, SQL, TLS

You May Also Like

What is a NoSQL injection vulnerability?
Do you know what your kids are doing online?
RainbowSQL: A very fast dork scanner

About Us giorgos

George still wonders what he's doing here ...

Previous Post: « Cheaters try to convince you to give them access to your pc
Next Post: Beware of emails asking you to "confirm your deletion" »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loading Cancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.