Check Point Greece June 2019 the most widespread malware

Η Check Point Research, except from World Threat List for June of 2019 also published 10 most popular threats in Greece for the same month.

Let's look at them in detail:

Check Point

Hawkeye - The Hawkeye is a malicious one Info Stealer, designed primarily to extract user data from infected platforms running Windows. In recent months, the Hawkeye has been improved including now, in addition to code theft Email and websites browser, features keylogging. Often sold in the market as MaaS (Malware as a Service) through various infection chain techniques.

JSEcoin - JavaScript mining software that can be embedded in websites. With JSEcoin, you can run the production software directly on your browser in exchange for an ad-free browsing experience, game currencies, and other incentives.

Trickbot - Trickbot is a variant of it Dyre which appeared in October 2016. Since then, it has mainly targeted bankers in Australia and the UK and has recently started appearing in India, Singapore and Malaysia.

Lokibot - Το Lokibot είναι λογισμικό υποκλοπής πληροφοριών που διαδίδεται κυρίως μέσω email ηλεκτρονικού ψαρέματος (phishing) και χρησιμοποιείται για την υποκλοπή δεδομένων όπως διαπιστευτηρίων ηλεκτρονικού ταχυδρομείου, καθώς και κωδικών ς σε ηλεκτρονικά πορτοφόλια κρυπτονομισμάτων και διακομιστές FTP.

XMRig - XMRig is a software CPU mining source code that is used for the production process of the Monero cryptocurrency and was first seen in circulation in May 2017.

AZORult – AZORult is a trojan that collects and removes data from the infected system. Once the malware is installed on a system (usually delivered by an exploit kit like RIG), it can send saved passwords, local files, crypto-wallets and Profile in remote command & control server.

FormBook - The FormBook it is a InfoStealer targeting the operating system of Windows and 2016 was first detected. Advertised on hacking Forums as a tool with powerful avoidance techniques and relatively low prices. The FormBook collects credentials from various websites browsers and screenshots, monitors and logs keyboards, and can download and execute files according to instructions C & C given to him.

NanoCore - NanoCore is a remote access trojan that was first noticed by 2013 and targets users of the Windows operating system. All versions include features such as screen capture, crypto mining, remote control and more.

Emotet - Sophisticated modular trojan that reproduces itself. Emotet once served as a scam bank account spy and has recently been used to distribute other malware or dissemination campaigns malware. It uses many methods and avoidance techniques to stay in the system and avoid detection. In addition, it can be spread through spam phishing emails containing attachments or links to malicious content.

Cryptoloot - Cryptocurrency software that uses the power of the central processing unit (CPU) or graphics processor (GPU) and the victim's existing resources to generate cryptocurrencies - adding transactions to the blockchain and generating new currencies. It competes with Coinhive.

Check Point: 10 most prevalent malware threats in Greece for June 2019

Family of malware

Global impact

Effect Greece

Hawkeye

1.30%

9.94%

Jsecoin

2.70%

8.13%

Trickbot

1.11%

8.13%

Lokibot

1.09%

6.93%

XMRig

3.61%

6.63%

AZORult

0.45%

6.33%

Nanocore

1.27%

5.12%

Formbook

1.24%

5.12%

Emotet

1.30%

9.94%

Cryptoloot

0.69%

4.64%

Her Threat Prevention Sources Check Point are available on the following website:

http: //www.checkpoint.com/threat-prevention-Resources/index.html

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).