September’s ‘Most Wanted’ Malware List By Check Point

Security researchers at Check Point published a monthly threat report for September 2016. This report have shown an increase in the global rensomware attack by 13%. This type of malware is dangerous because it locks important file on infected system and only attacker will be able to unlock the files.

The most active of the attacked countries in September were, Botswana, Uganda and Macedonia while the less attacked were the Dominican Republic and Lithuania. There is no change in term of most active malware which remain Conficker on the second place we found Sality followed by Locky:

  1. ↔ Conficker – Worm that allows remote operations and malware download. The infected machine is controlled by a botnet, which contacts its Command & Control server to receive instructions.
  2. ↑ Sality – Virus that allows remote operations and downloads of additional malware to infected systems by its operator. Its main goal is to persist in a system and provide means for remote control and installing further malware.
  3. ↑ Locky – Ransomware that started its distribution in February 2016, and spreads mainly via spam emails containing a downloader disguised as an Word or Zip attachment, which then downloads and installs the malware that encrypts the user files.
Check Point September Map

Check Point September Map

On the mobile malware we see:

  1. ↔ HummingBad – Android malware that establishes a persistent rootkit on the device, installs fraudulent applications and enables additional malicious activity such as installing a key-logger, stealing credentials and bypassing encrypted email containers used by enterprises.
  1. ↑Triada – Modular Backdoor for Android which grants super-user privileges to downloaded malware, and helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.
  1. ↓ Ztorg – Trojan that uses root privileges to download and install applications on the mobile phone without the user’s knowledge.

You can find the complete top10 list on Check Point blog post:

Notify of
Inline Feedbacks
View all comments