0
  • Home
  • Editorials
  • Press Releases (multiple industries)
  • Events
  • B2B PR
  • Podcast
  • Advertise
  • Events/Conferences
  • Contact our team
  • PR Distribution
PICANTE Today - Hot News Today PICANTE Today - Hot News Today
PICANTE Today - Hot News Today PICANTE Today - Hot News Today
PICANTE Today - Hot News Today PICANTE Today - Hot News Today
  • Home
  • Editorials
  • Press Releases (multiple industries)
  • Events
  • B2B PR
  • Podcast
PICANTE Today - Hot News Today PICANTE Today - Hot News Today
  • Home
  • Editorials
  • Press Releases (multiple industries)
  • Events
  • B2B PR
  • Podcast
Home » Blog » November 2019’s Most Wanted Malware: Researchers Warn of Fast-growing Mobile Threat While Emotet’s Impact Declines
Archives

November 2019’s Most Wanted Malware: Researchers Warn of Fast-growing Mobile Threat While Emotet’s Impact Declines

Posted by GlobeNewswire December 13, 2019
Share
READ NEXT
VeeaSystems to Display the Full Range of Devices for VeeaHub Platform at MWC Shanghai Bringing Advanced Wireless Edge Computing to Smart Verticals

SAN CARLOS, Calif., Dec. 11, 2019 (GLOBE NEWSWIRE) — Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for November 2019. The research team reported that for the first time in over three years, a mobile trojan has entered the overall top malware listing as well as being the most prevalent mobile threat over the past month.

The mobile trojan is xHelper, which was first seen in the wild in March 2019. xHelper is a multi-purpose trojan targeting Android users that can download other malicious applications as well as display malicious advertisements.  It is also reported to be a persistent application, able to reinstall itself even if it is uninstalled by the victim. During the past six months the malware’s code has been constantly updated, helping it to evade mobile antivirus solutions and to keep on infecting new victims. As a result, it has entered the overall top 10 malware list at #8. 

November’s most wanted malware was the Emotet botnet, retaining the #1 position from October.  However, in November, it impacted 9% of organizations globally, down from 14% the previous month.

“Both Emotet and xHelper are versatile, multi-purpose malware that can be adapted to criminals’ needs, such as distributing ransomware, spreading spam campaigns or distributing malvertising to users’ devices.  This shows that criminals are trying multiple different illicit tactics to monetize their operations, rather than following a single trend like cryptomining which dominated the sector in 2018,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point. “As such, it’s essential that organizations deploy the latest generation anti-malware solutions on their networks as well as on employees’ mobile devices, to protect all enterprise endpoints. They should also educate employees about the dangers of opening email attachments, downloading resources or clicking on links that do not come from a trusted source or contact.”

November 2019’s Top 3 ‘Most Wanted’ Malware:
*The arrows relate to the change in rank compared to the previous month.

Emotet has maintained its position at the top of the malware list with a global impact of 9%. XMRig was the second most popular malware impacting 7% of organizations worldwide, followed by Trickbot, impacting 6% of organizations globally.

  1. ↔ Emotet – Emotet is an advanced, self-propagating and modular Trojan. Emotet was formerly a banking Trojan, and recently has been used as a distributor of other malware or malicious campaigns. It uses multiple methods for maintaining persistence and evasion techniques to avoid detection. In addition, it can be spread through phishing spam emails containing malicious attachments or links.
  2. ↔ XMRig – XMRig is an open-source CPU mining software used for the mining process of the Monero cryptocurrency which was first seen in-the-wild on May 2017.
  3. ↔ Trickbot – Trickbot is a dominant banking Trojan constantly being updated with new capabilities, features and distribution vectors. This enables Trickbot to be a flexible and customizable malware that can be distributed as part of multi purposed campaigns.

November’s Top 3 ‘Most Wanted’ Mobile Malware:
This month xHelper – a new entry to our top malware list – was the most prevalent mobile malware, followed by Guerilla and Lotoor.

  1. xHelper – A malicious Android application seen in the wild since March 2019, used for downloading other malicious apps and display advertisements. The application is capable of hiding itself from the user and mobile anti-virus programs, and reinstalls itself if the user uninstalls it.
  2. Guerrilla – An Android Trojan found embedded in multiple legitimate apps which is capable of downloading additional malicious payloads. Guerrilla generates fraudulent ad revenue for the app developers.
  3. Lotoor – Hack tool that exploits vulnerabilities on Android operating system in order to gain root privileges on compromised mobile devices.

November’s ‘Most Exploited’ vulnerabilities:
This month the three top exploited remained the same as in the previous month – SQL injection techniques continue to lead the list, impacting 39% of organizations globally, followed by the OpenSSL TLS DTLS Heartbeat Information Disclosure vulnerability and MVPower DVR Remote Code Execution – impacting 34% and 33% of organizations worldwide respectively.

  1. SQL Injection (several techniques) – Inserting an injection of SQL query in input from client to application, while exploiting a security vulnerability in an application’s software.
  2. OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346) – An information disclosure vulnerability exists in OpenSSL. The vulnerability is due to an error when handling TLS/DTLS heartbeat packets. An attacker can leverage this vulnerability to disclose memory contents of a connected client or server.
  3. MVPower DVR Remote Code Execution – A remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request.

Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, more than 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily.

The complete list of the top 10 malware families in November can be found on the Check Point Blog.  

Follow Check Point Research via:
Blog: https://research.checkpoint.com/
Twitter: https://twitter.com/_cpresearch_

About Check Point Research
Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Tags: itindustry Tech
Share
Share on Facebook Share on Twitter Share on Pinterest Share on Email
GlobeNewswire December 13, 2019
GlobeNewswire
View More Posts
GlobeNewswire is one of the world's largest newswire distribution networks, specializing in the delivery of corporate press releases financial disclosures and multimedia content to the media, investment community, individual investors and the general public.
Previous Article Shareholder Alert: Robbins LLP Announces Adamas Pharmaceuticals, Inc. (ADMS) Sued for Misleading Shareholders
Next Article 2019 Fuel Cell & Battery Research Review: Electric Vehicle Charging, Lithium Batteries, Portable Battery-Powered Products, and More

You Might Also Enjoy

One United Properties posts a consolidated turnover of 285.5 million euros and a gross profit of 88.6 million euros in 2024

Posted by Zoltán Tűndik February 27, 2025
READ MORE

QNB Group Strengthens Innovation and Fintech Ecosystem with Strategic MoUs at Web Summit Qatar 2025

Posted by Zoltán Tűndik February 27, 2025
READ MORE

Calderys invests in a state-of-the-art Innovation Center in Neuwied, Germany

Posted by Zoltán Tűndik February 27, 2025
READ MORE

MEXC Launches Campaign for ENA & USDe with $1,000,000 Rewards

Posted by Zoltán Tűndik February 27, 2025
READ MORE

PICANTE is a news publishing website which digests / hand picks the latest news about technology, entertainment, lifestyle, finance and politics and serves them to you daily.

Whenever you are looking the find out more about the latest in AI or mobile, wining and dining, home-land security across the world, data analytics, fashion, pop and movie culture, political developments and much more, you are in the right place. Just head to our menu and browse the topics by category. We are sure you will find information that you might not find in other media sources

Email: [email protected]

Latest Posts

Esker (Market Dojo) Recognised in the 2025 Gartner® Market Guide for Sourcing Applications

February 27, 2025

Whatfix Unveils ScreenSense: An AI Technology to Shape the Next Frontier of Digital Adoption

February 27, 2025

Veeva Direct Data API Now Included with Vault Platform to Enable AI Innovation

February 27, 2025

Consensus concludes sold-out debut event in Hong Kong and announces return to Asia in 2026

February 27, 2025

Bybit Takes Aim at Crypto Crime with Launch of Industry-first LazarusBounty.com Platform

February 27, 2025

HIPTHER Talks Podcast

  • About PICANTE
  • Advertise
  • Authors at PICANTE
  • Cookies
  • Contact Us
  • RSS
  • Sitemap
  • B2B Press Releases
  • Press Release Distribution Services
  • Privacy Policy
  • Terms of Service

Copyright © 2007 – 2025 HIPTHER. All Rights Reserved Registered in Romania under Proshirt SRL, Company number: 2134306, EU VAT ID: RO21343605. Office address: Blvd. 1 Decembrie 1918 nr.5, Targu Mures, Romania

Our website uses cookies to improve your experience. Learn more about: Cookie Policy

Accept