Date:16/03/18
Researchers at Check Point identified three different variants of malicious cryptomayers, who entered the list of top 10 most active malwares.
The first place in the ranking is retained by CoinHive, which attacked every fifth organization in the world. Cryptoloot rose to second place, in February a malicious minor attacked twice as many companies as in the previous month.
According to Check Point, in January 7% of organizations suffered from Cryptoloot, and in February – 16%. Next to the cryptomayners is a set of exploits Rig EK, which took 3rd place ranking thanks to attacks on 15% of the world’s companies.
According to Check Point, in February 2018 the number of attacks on Russian companies remained at the same level. Russia ranked 73rd in the Global Threat Index, while Coinhive and Cryptoloot also entered the top 3 active malware attacking Russian organizations.
Most of all in February, Botswana, Cameroon and New Caledonia were attacked. The least attacked Liechtenstein, the island of Guernsey in the English Channel and Kyrgyzstan.
The most active mobile malware of February were:
- Triada is a modular backdoor for Android, which gives huge privileges to downloaded malware;
- Lokibot is a banking Trojan for Android, which steals user data and requires a ransom for them. Malicious can lock the phone if you remove its administrator rights;
- Hiddad is a malware for Android, which repacks legitimate applications and then implements them in third-party stores.
42% of companies in the world suffered from crypto-mining in February
According to the Global Threat Impact Index report prepared by Check Point Software Technologies Ltd., 42% of companies suffered from illegal production of crypto-currencies in February this year.Researchers at Check Point identified three different variants of malicious cryptomayers, who entered the list of top 10 most active malwares.
The first place in the ranking is retained by CoinHive, which attacked every fifth organization in the world. Cryptoloot rose to second place, in February a malicious minor attacked twice as many companies as in the previous month.
According to Check Point, in January 7% of organizations suffered from Cryptoloot, and in February – 16%. Next to the cryptomayners is a set of exploits Rig EK, which took 3rd place ranking thanks to attacks on 15% of the world’s companies.
According to Check Point, in February 2018 the number of attacks on Russian companies remained at the same level. Russia ranked 73rd in the Global Threat Index, while Coinhive and Cryptoloot also entered the top 3 active malware attacking Russian organizations.
Most of all in February, Botswana, Cameroon and New Caledonia were attacked. The least attacked Liechtenstein, the island of Guernsey in the English Channel and Kyrgyzstan.
The most active mobile malware of February were:
- Triada is a modular backdoor for Android, which gives huge privileges to downloaded malware;
- Lokibot is a banking Trojan for Android, which steals user data and requires a ransom for them. Malicious can lock the phone if you remove its administrator rights;
- Hiddad is a malware for Android, which repacks legitimate applications and then implements them in third-party stores.
Views: 263
©ictnews.az. All rights reserved.Similar news
- The World in 2011: ICT Facts and Figures
- Analysis: BlackBerry licensing seen RIM's likeliest scenario
- Sergey Brin, Google Co-Founder, Says Internet Freedom Facing Greatest Threat Ever
- Drones are about to fill the skies within the next 5 years
- Will robots replace bank employees?
- Gartner predicts 7 percent growth of smartphone market in 2016
- By 2020, the app market with be worth $102 billion
- Cisco Visual Networking Index predicts 10 billion new connected devices by 2020
- IoT devices will overtake mobile phones by 2018
- Consulting firm predicts that half the world will be using mobile internet by 2020
- The top ten features coming to smartphones by 2017: Gartner
- Gartner’s top 10 security predictions
- 12 wild predictions about the world in 2036, according to Americans
- Cloud computing slows energy demand
- Bendable, curved, foldable: New report looks at the future of wearable and mobile displays