Check Point Research, its research department Check Point Software Technologies Ltd., published the latest Global Threat List for October at 2019 and about the online landscape in Greece.
The full list of 10 most popular malware threats in Greece for October is:
Emotet – Sophisticated modular trojan that replicates itself. Emotet once operated as a Trojan horse bank account data and was recently used to distribute other malicious software or malware propagation campaigns. It uses many avoidance methods and techniques to stay in the system and avoid detection. Additionally, it can spread through unwanted phishing emails that contain attachments or links to malicious content.
Hawkeye - Hawkeye is a malicious Info Stealer, designed primarily to extract user data from infected Windows-based platforms. Over the past few months, Hawkeye has improved by including, in addition to email and web browser theft, keylogging features. It is often sold on the market as MaaS (Malware as a Service) through various infection chain techniques.
Trickbot – Trickbot is a variation of Dyre that appeared in October of 2016. Since then, it has been primarily targeted at banking users in Australia and the United Kingdom, and has recently started appearing in India, Singapore and Malaysia.
Cryptoloot – Cryptocurrency software that uses the power of the central processing unit (CPU) or graphics processor (GPU) and the victim's existing resources to generate cryptocurrencies - adding transactions to the blockchain and generating new currencies. It competes with Coinhive.
agent Tesla – AgentTesla is a sophisticated RAT that acts as a keylogger and as password theft software by infecting computers from 2014. AgentTesla has the ability to monitor and collect the victim's keyboard and system clipboard entries, take screenshots and remove the credentials from software installed on the victim's machine (including Google Chrome, Mozilla Firefox and the email client of Microsoft Outlook). AgentTesla is sold as a legal RAT with interested parties to pay 15 - 69 dollars for a user license.
Lokibot – Lokibot is a spyware software that spreads primarily through phishing email and is used to intercept data such as e-mail credentials, as well as passwords to electronic cryptographic wallets and FTP servers.
Cryptic – Kryptik is a Trojan horse aimed at the Windows platform. It collects system information and sends it to the remote server. It can receive and run additional malware files on an infected system.
AZORult - AZORult is a trojan that gathers and removes data from the infected system. Once malware has been installed on a system (usually delivered by a exploitation kit like RIG), it can send stored passwords, local files, crypto purses, and computer profile information to a remote command & control server.
|Family of malware||Global impact||Effect Greece|
The World Threat Impact Directory and Check Point's ThreatCloud Map are based on Check Point's ThreatCloud intelligence, the largest anti-cyber crime network, which provides data on threats and trends in attacks, utilizing a global network threat detectors.
The ThreatCloud database includes more than 250 million addresses analyzed to detect bot, more than 11 million signatures of malware and more than 5,5 millions of infected sites, while recognizing millions of types of malware every day.
The full list of the most common malware threats worldwide for 10 in October can be found here.
Check Point's Threat Prevention Resources are available on the site:
How useful was this post?
Average rating / 5. Vote count:
No votes so far! Be the first to rate this post.