MENU

‘Most Wanted’ malware and vulnerabilities revealed

May 5, 2018 • Security, Top Stories

 ‘Most Wanted’ malware and vulnerabilities revealed

‘Most Wanted’ malware and vulnerabilities revealed.
(image: Yu Samoilov)

Check Point Software Technologies has published its latest Global Threat Index for the month of March, revealing a surge of cryptomining malware attacks, both globally and in South Africa. An endpoint cryptomining malware known as the XMRig variant has been particularly prevalent.

First seen in the wild in May 2017, XMRig entered Check Point’s top ten most wanted malware index (8th) for the first time during March 2018, after a 70% increase in global impact. By working on the endpoint device rather than the web browser itself, XMRig is able to mine the Monero cryptocurrency without needing an active web browser session on the victim’s computer.

“Cryptomining malware has been quite the success story for cybercriminals, and XMRig’s rise indicates that they are actively invested in modifying and improving their methods in order to stay ahead of the curve,” said Doros Hadjizenonos, Check Point Country Manager for SADC. “Besides slowing down PCs and servers, cryptomining malware can spread laterally once inside the network, posing a major security threat to its victims. It is therefore critical that enterprises employ a multi-layered cybersecurity strategy that protects against both established malware families and brand new threats.”

In March, Coinhive retained its most wanted spot for the fourth consecutive month impacting 18% of organisations globally, followed by the Rig EK Exploit Kit in second (17%) while the Cryptoloot miner was third (impacting 15%). XMRig was the 8th most common malware variant, impacting 5% of organisations.

March 2018’s Top 3 ‘Most Wanted’ Malware – Globally:

  • Coinhive – Crypto-Miner designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user’s knowledge or approval.
  • Rig EK – Rig delivers Exploits for Flash, Java, Silverlight and Internet Explorer.
  • Cryptoloot – Crypto-Miner that uses the victim’s CPU or GPU power and existing resources to add transactions to the blockchain and release new currency.

From a South African perspective, cryptomining malware also reigned supreme during March.

March’s Top 3 ‘Most Wanted’ malware – South Africa:

  • Coinhive – Crypto-Miner designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user’s knowledge or approval.
  • Cryptoloot – Crypto-Miner malware, using the victim’s CPU or GPU power and existing resources for crypto mining – adding transactions to the blockchain and releasing new currency.
  • Andromeda – Andromeda is a modular bot for malicious activity, first spotted in 2011. It is used mainly as a backdoor to deliver additional malware on infected hosts, but can be modified to create different types of botnets.

For the first time Check Point researchers also analysed the most exploited cyber vulnerabilities. CVE-2017-10271 came first with a global impact of 26%, in second place was the SQL injection vulnerability impacting 19%, and in third place was CVE-2015-1635 with a global impact of 12% of organisations.

March’s Top 3 ‘Most Wanted’ vulnerabilities:

  • Oracle WebLogic WLS Security Component Remote Code Execution (CVE-2017-10271) – A remote code execution vulnerability exists within Oracle WebLogic WLS. This is due to the way Oracle WebLogic handles xml decodes. A successful attack could lead to a remote code execution.
  • SQL Injection – Inserting an injection of SQL query to input from client to application, while exploiting a security vulnerability in an application’s software.
  • Microsoft Windows HTTP.sys Remote Code Execution (MS15-034: CVE-2015-1635) – A remote code execution vulnerability has been reported in Windows OS. The vulnerability is due to an error in the way HTTP.sys handles a malicious HTTP header. Successful exploitation would result in a remote code execution.

Check Point’s Global Threat Impact Index and its ThreatCloud Map are powered by Check Point’s ThreatCloud intelligence. ThreatCloud draws upon a wide variety of intelligence feeds coming from advanced in-house malware and threat research, AI algorithms and automated processes, partnerships and open sources in order to deliver threat data and attack trends. As the world’s largest threat intelligence network, ThreatCloud detects hundreds of millions of malicious events a day, collecting information from over a hundred thousand gateways and millions of endpoints worldwide.

Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter

Comments

comments


Comments are closed.

« »