Check Point World Threat List June 2019

Η Check Point Research, published the latest World Threat List for June at 2019. The research team confirms that the Emotet (the largest network in operation bots at this time), is off, and most of June saw no new campaigns. That's it Emotet, during the first six months of 2019, it was in the top five malwares worldwide while it has been distributed with major campaigns spam (spam).

The της Check Point πιστεύουν ότι το Emotet ενδέχεται να βρίσκεται εκτός λειτουργίας για εργασίες συντήρησης και s. Additionally, they believe that once its servers are back up, it will be reactivated with new, improved features.

Check Point

Maya Horowitz, Director of Check Point Information and Threat Research, said:

The Emotet appeared in the foreground as banking Trojan the 2014. However from 2018, we have seen it used as a botnet in large campaigns malspam, and used to share others malwares. Although its infrastructure was inactive for most of June, it remained in fifth place on the list of global threats, which proves how much it is being used - and is likely to reappear with new features.

and continued:

In the summer of 2017 and 2018 we noticed patterns of attacks they exploited banking Trojans. This demonstrates that cybercriminals are trying to exploit the tourist season and that users on holiday are less concerned with security practices, using online banking services from shared devices and less secure connections.

Check Point: 3 most popular malware threats in June 2019:

* The arrows indicate the change in rank relative to the previous month.

  1. XMRig - XMRig is a software CPU mining open source for the Monero cryptocurrency production process that was first launched in May on 2017.

  2. JSEcoin - JavaScript extraction software that can be embedded in websites. With JSEcoin, you can run mining software directly in your browser in exchange for a non-ad browsing experience, game coins, and other incentives.

  3. Cryptoloot - Encryption software that uses the power of the central processing unit (CPU) or graphics processor (GPU) and the victim's existing resources for cryptomining - adding transactions to the blockchain and generating new currencies. It competes with Coinhive, trying to oust it by demanding a lower percentage of revenue from the sites.

3 Most Popular Malware Threats in June 2019:

TLotoor continues to be at the top of the list of the most widespread malware threats on mobile devices. Here follows Triada and Ztorg, a new malware for the first time in the list.

  1. Lotoor Malware for Android, which adjusts legitimate applications and publishes them to third parties bedspread. Its main function is to display advertisements, however it is capable of accessing security information located in the operating system, allowing an attacker to obtain sensitive user data.

  1. Triada - Modular backdoor for Android that grants super user rights to downloaded malware, helping it integrate into system processes. Triada has also been observed to mislead URLs loaded into the browser.

  2. Ztorg - The Trojans belonging to the family Ztοrg, are gaining increasing privileges on devices Android and installed on directory of the system. The malware is able to install any other application on the device.

Check Point
Check Point's Prevention Resources Map

3 vulnerabilities 'most frequently exploited' for June 2019

In June, SQL Injections techniques continued to be at the top of the list, affecting 52% of organizations worldwide. The vulnerability of OpenSSL TLS DTLS Heartbeat Information Disclosure came in second, affecting 43% of organizations worldwide, closely followed by CVE-2015-8562 with an impact on 41% of organizations worldwide.

  1. - SQL Injection (various techniques) - This is the introduction of one SQL Query the data provided by client in an application, thereby exploiting a vulnerability that exists in the code of that application.

  1. OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346) A vulnerability in disclosing information that exists in OpenSSL. The vulnerability is due to an error handling TLS / DTLS heartbeat packets. An attacker can exploit this vulnerability to disclose contents of the memory of a connected client or server.

  1. Joomla Object Injection Remote Command Execution  (CVE-2015-8562)- A vulnerability related to remote platform command execution has been reported Joomla. The vulnerability exists due to a lack of validation on imported objects, which could lead to remote code execution. A remote attacker could exploit this vulnerability by sending a malicious request to the victim. Successful exploitation of this vulnerability could result in the execution of arbitrary code on the part of the target user.

* The complete list of the most common malware threats worldwide 10 can be found here.

_________________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).