Story image

Check Point names February’s most disruptive malware

12 Mar 2019

Check Point Research has published its latest Global Threat Index for February 2019.

The index reveals that Coinhive has once again led the Global Threat Index for the 15th consecutive month, despite the announcement that its services have been shut down from March 8, 2019.

Check Point's researchers have also discovered several widespread campaigns distributing the GandCrab ransomware that have targeted Japan, Germany, Canada and Australia.

These nations are just part of the targeted countries.

These operations have emerged over the last two months, and Check Point's researchers noticed a new version of the ransomware being distributed in one of the latest campaigns.

The new version, Gandcrab V5.2, includes most of the features of the last, but with a change in the encryption method that causes the decryption tool for previous versions of the ransomware to be ineffective.

In February, the most prevalent malware variants were cryptominers.

Coinhive remains the top malware, impacting 10% of organisations worldwide.

This follows a downward trend in Coinhive's global impact, from 18% in October 2018 to 12% in January 2019 and with a 2% drop this month.

This decrease has been caused by the rising cost of mining along with the decline in Monero's value.

Cryptoloot rose to second place in February replacing XMRig, and was followed by Emotet, an advanced, self-propagate and modular Trojan, which replaced Jsecoin in third place in the index.

Check Point threat intelligence and research director Maya Horowitz says, “As we saw in January, threat actors continue to exploit new ways to distribute malware, while creating new and more dangerous variants of existing malware forms.

“GandCrab's new version proves once again that although there are malware families that stay in the top malware list for several months and seems to be static, they are actually evolving and being developed to evade detection.

“To effectively combat this, our researchers continuously trace them based on their malware family DNA – so it's essential that organisations keep their security solutions fully updated,” she says.

February 2019's Top 3 Most Wanted Malware: 

1.       Coinhive - Cryptominer designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user's knowledge or approval the profits with the user. The implanted JavaScript uses a great deal of the computational resources of end users' machines to mine coins, and may crash the system.

2.       Cryptoloot - Cryptominer that uses the victim's CPU or GPU power and existing resources for crypto mining - adding transactions to the blockchain and releasing new currency. It is a competitor to Coinhive, trying to pull the rug under it by asking a smaller percentage of revenue from websites.

3.       Emotet – Advanced, self-propagating and modular Trojan. Emotet once used to employed as a banking Trojan, and recently is used as a distributor for other malware or malicious campaigns. It uses multiple methods for maintaining persistence and evasion techniques to avoid detection. In addition, it can be spread through phishing spam emails containing malicious attachments or links.

This month Lotoor is the most prevalent mobile malware, replacing Hiddad at first place in the top mobile malware list. Triada remains in third place.

February's Top 3 Most Wanted Mobile Malware:

1.       Lotoor - Hack tool that exploits vulnerabilities on Android operating system in order to gain root privileges on compromised mobile devices.

2.       Hiddad - Android malware which repackages legitimate apps and then released them to a third-party store. Its main function is displaying ads, however it is also able to gain access to key security details built into the OS, allowing an attacker to obtain sensitive user data.

3.       Triada - Modular Backdoor for Android which grants superuser privileges to downloaded malware, as helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.

Check Point's researchers also analysed the most exploited cyber vulnerabilities.

CVE-2017-7269 is still leading the top exploited vulnerabilities with 45%.

OpenSSL TLS DTLS Heartbeat Information Disclosure is the second most prevalent vulnerability with a global impact of 40%, followed by Web servers PHPMyAdmin Misconfiguration Code Injection exploit, impacting 34% of organisations worldwide.

February's Top 3 Most Exploited vulnerabilities:

1.      Microsoft IIS WebDAV ScStoragePathFromUrl Buffer Overflow (CVE-2017-7269) - By sending a crafted request over a network to Microsoft Windows Server 2003 R2 through Microsoft Internet Information Services 6.0, a remote attacker could execute arbitrary code or cause a denial of service conditions on the target server. That is mainly due to a buffer overflow vulnerability resulted by improper validation of a long header in HTTP request.

2.      OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346) - An information disclosure vulnerability exists in OpenSSL. The vulnerability is due to an error when handling TLS/DTLS heartbeat packets. An attacker can leverage this vulnerability to disclose memory contents of a connected client or server.

3.      Web servers PHPMyAdmin Misconfiguration Code Injection - A code injection vulnerability has been reported in PHPMyAdmin. The vulnerability is due to PHPMyAdmin misconfiguration. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request to the target.

Dropbox invests in hosting data inside Australia
Global collaboration platform Dropbox has announced it will now host Australian customer files onshore to support its growing base in the country.
Opinion: Meeting the edge computing challenge
Scale Computing's Alan Conboy discusses the importance of edge computing and the imminent challenges that lie ahead.
Alibaba Cloud discusses past and unveils ‘strategic upgrade’
Alibaba Group's Jeff Zhang spoke about the company’s aim to develop into a more technologically inclusive platform.
Protecting data centres from fire – your options
Chubb's Pierre Thorne discusses the countless potential implications of a data centre outage, and how to avoid them.
Opinion: How SD-WAN changes the game for 5G networks
5G/SD-WAN mobile edge computing and network slicing will enable and drive innovative NFV services, according to Kelly Ahuja, CEO, Versa Networks
TYAN unveils new inference-optimised GPU platforms with NVIDIA T4 accelerators
“TYAN servers with NVIDIA T4 GPUs are designed to excel at all accelerated workloads, including machine learning, deep learning, and virtual desktops.”
AMD delivers data center grunt for Google's new game streaming platform
'By combining our gaming DNA and data center technology leadership with a long-standing commitment to open platforms, AMD provides unique technologies and expertise to enable world-class cloud gaming experiences."
Inspur announces AI edge computing server with NVIDIA GPUs
“The dynamic nature and rapid expansion of AI workloads require an adaptive and optimised set of hardware, software and services for developers to utilise as they build their own solutions."