当前位置:网站首页>The number one malware in January 2022: lokibot returned to the list, and emotet returned to the top
The number one malware in January 2022: lokibot returned to the list, and emotet returned to the top
2022-07-02 02:33:00 【Netgoods world】
Check Point Research Pointed out that , Information stealing procedure Lokibot Return to the most rampant malware ranking , and Emotet Instead of Trickbot Top the list . As the number one vulnerability most often exploited ,Apache Log4j It's still raging .
2022 year 2 month , The world's leading provider of network security solutions Check Point Software Technology Co., Ltd ( Nasdaq stock code :CHKP) Threat Intelligence Check Point Research Published its 2022 year 1 The latest edition of the month 《 Global threat index 》 The report . The researchers report that ,Emotet Now it will occupy the top place for a long time Trickbot Squeeze out the first place , Become the most rampant malware this month , Affecting the world 6% Enterprises and institutions . The fact proved that ,Log4j Still rampant , The global 47.4% Our institutions suffer , education / The research industry remains the primary target .
Only two and a half months after returning to the list ,Emotet Has jumped to the top . This notorious botnet is mainly spread through phishing emails containing malicious attachments or links .Trickbot The increasing rampancy of this malware has boosted the increasing use of this malware . meanwhile ,Dridex It has completely fallen out of the top ten malware list , In its place Lokibot, This information theft program is used to obtain email credentials 、 Cryptocurrency wallet password and FTP Server and other data .
Check Point Vice president of research and development of software technology company Maya Horowitz Express :“Emotet A comeback is expected . It is a kind of runaway malware , Therefore, it is difficult to detect , And it uses a variety of methods to infect the network , This will only further aggravate the threat situation . This month, ,Dridex Disappear from our top ten malware list , and Lokibot Then appear again .Lokibot Take advantage of the victims' busiest moments , Spread through carefully disguised phishing emails . These threats and Log4j The ongoing battle for vulnerabilities highlights cross network 、 Cloud 、 The importance of deploying the best security protection for mobile and user endpoints .”
Check Point Research (CPR) Pointed out that , This month, , education / The research industry remains the primary target of attack in the world , Second, the government / Military departments and ISP/MSP.“Apache Log4j Remote code execution ” It is still the most frequently exploited vulnerability , The global 47.4% Our institutions suffer , The second is “Web Server Exposed Git Repository information disclosure ”, Affecting the world 45% Institutions .“HTTP Header remote code execution ” Ranked third in the list of most frequently exploited vulnerabilities , The global scope of influence is 42%.
The number one malware family
* The arrow indicates the ranking change compared with the previous month .
This month, ,Emotet Is the most rampant malware , The global 6% Of enterprises and institutions have been affected , Next to that is Trickbot and Formbook, Have affected the whole world 4% and 3% Institutions .
1. ↑ Emotet - Emotet It is an advanced modular Trojan horse that can spread itself .Emotet Once used as a bank Trojan horse , Recently, it has been used as a propagator of other malware or malicious attacks . It uses a variety of methods and evasion techniques to ensure long-term stability and avoid detection . Besides , It can also be spread through phishing spam that contains malicious attachments or links .
2. ↓ Trickbot - Trickbot It is a modular botnet and bank Trojan , Keep adding new features 、 Properties and propagation vectors . This makes it a flexible and customizable malware , It is widely used in multi-purpose attacks .
3. ↓ Formbook - Formbook It's an information theft program , Available from various Web Get credentials in the browser 、 Collect screenshots 、 Monitor and record keystrokes , And according to its C&C Command download and execute files .
The most frequently exploited vulnerability
This month, ,“Apache Log4j Remote code execution ” It is still the most frequently exploited vulnerability , The global 47.4% Our institutions suffer , The second is “Web Server Exposed Git Repository information disclosure ”, Affecting the world 45% Institutions and enterprises .“HTTP Header remote code execution ” Ranked third in the list of most frequently exploited vulnerabilities , The global scope of influence is 42%.
1. Apache Log4j Remote code execution (CVE-2021-44228) - One exists in Apache Log4j Remote Code Execution Vulnerability in . Remote attackers can use this vulnerability to execute arbitrary code on the affected system .
2. Web Server Exposed Git Repository information disclosure - Git An information disclosure vulnerability reported by the repository . Once the attacker successfully exploits the vulnerability , It will make the user inadvertently cause the disclosure of account information .
3. HTTP Header remote code execution (CVE-2020-10826、CVE-2020-10827、CVE-2020-10828、CVE-2020-13756) - HTTP Headers allow clients and servers to pass along HTTP Other information requested . Remote attackers may use vulnerable HTTP Header runs arbitrary code on the infected machine .
Mainly mobile malware
This month, ,xHelper Ranked first among the most rampant mobile malware , The second is AlienBot and FluBot.
1. xHelper - since 2019 year 3 Malicious applications that have disappeared since September , Used to download other malicious applications and display malicious advertisements . The application can be invisible to users , And reinstall after uninstallation .
2. AlienBot - AlienBot The malware family is a family that targets Android Device malware as a service (MaaS), It allows remote attackers to first inject malicious code into legitimate financial applications . An attacker can gain access to the victim's account , And finally completely control its equipment .
3. FluBot - FluBot It is spread through phishing short messages Android Botnet malware , Usually posing as logistics distribution brand . Once the user clicks the link in the message ,FluBot Will quickly install and access all sensitive information on the phone .
Check Point《 Global threat impact index 》 And its 《ThreatCloud The roadmap 》 be based on Check Point ThreatCloud Written from intelligence data .ThreatCloud The Real-time Threat Intelligence provided comes from the deployment in the global network 、 Hundreds of millions of sensors on endpoints and mobile devices .AI The engine and Check Point Information and Research Department of software technology company Check Point Research Our exclusive research data further enrich the intelligence content .
To view 1 A complete list of the top ten malware families in August , Please visit Check Point Blog .
About Check Point Research
Check Point Research Can be Check Point Software Customers and the entire intelligence community provide leading cyber Threat Intelligence .Check Point The research team is responsible for collecting and analyzing ThreatCloud Stored global cyber attack data , In order to prevent hackers at the same time , Ensure that all Check Point All products enjoy the latest protection measures . Besides , The team consists of 100 A number of analysts and researchers , Be able to work with other security vendors 、 Law enforcement agencies and various computer security emergency response teams cooperate .
About Check Point Software Technology Co., Ltd
Check Point Software Technology Co., Ltd. is a leading provider of network security solutions for governments and enterprises around the world .Check Point Infinity Solution portfolio for malware 、 The capture rate of ransomware and other threats is at the industry-leading level , It can effectively protect enterprises and public organizations from the fifth generation network attacks .Infinity It contains three core pillars , It can provide excellent security protection and fifth generation threat protection across enterprise environments :Check Point Harmony( For remote users );Check Point CloudGuard( Automatically protect the cloud environment );Check Point Quantum( Effectively protect network boundaries and data centers )— All of this is through the most comprehensive 、 Intuitive unified safety management for control .Check Point Provide protection for more than 100000 enterprises of all sizes .
边栏推荐
- Analysis of FLV packaging format
- MySQL constraints and multi table query example analysis
- DNS domain name resolution
- Infix expression to suffix expression (computer) code
- Deployment practice and problem solving of dash application development environment based on jupyter Lab
- As a software testing engineer, will you choose the bank post? Laolao bank test post
- Software testing learning notes - network knowledge
- Ar Augmented Reality applicable scenarios
- SQL server calculates the daily average and annual average of the whole province
- 2022低压电工考试题模拟考试题库模拟考试平台操作
猜你喜欢

CVPR 2022 | Dalian Institute of technology proposes a self calibration lighting framework for low light level image enhancement of real scenes

LFM信号加噪、时频分析、滤波

研发中台拆分过程的一些心得总结
![[learn C and fly] 2day Chapter 8 pointer (practice 8.1 password unlocking)](/img/2e/8fe55393ccca6663d98c0b3dd9a146.png)
[learn C and fly] 2day Chapter 8 pointer (practice 8.1 password unlocking)

附加:信息脱敏;

CVPR 2022 | 大连理工提出自校准照明框架,用于现实场景的微光图像增强

STM32__05—PWM控制直流电机

【读书笔记】程序员修炼手册—实战式学习最有效(项目驱动)

RTL8189FS如何关闭Debug信息

How to build and use redis environment
随机推荐
Build a modern data architecture on the cloud with Amazon AppFlow, Amazon lake formation and Amazon redshift
Realize the code scanning function of a custom layout
Sword finger offer 42 Maximum sum of continuous subarrays
flutter 中间一个元素,最右边一个元素
Duplicate keys detected: ‘0‘. This may cause an update error. found in
Cesium dynamic diffusion point effect
What are the common proxy servers and what are the differences?
Which brand of running headphones is good? How many professional running headphones are recommended
Es interview questions
Learning notes of software testing -- theoretical knowledge of software testing
How to hide the scroll bar of scroll view in uniapp
How does proxy IP participate in the direct battle between web crawlers and anti crawlers
How to execute an SQL in MySQL
C # use system data. The split mixed mode assembly is generated for the "v2.0.50727" version of the runtime, and it cannot be loaded in the 4.0 runtime without configuring other information
What is the difference between an intermediate human resource manager and an intermediate economist (human resources direction)?
STM32__ 05 - PWM controlled DC motor
设置状态栏颜色
Kibana操控ES
QT uses sqllite
leetcode373. Find and minimum k-pair numbers (medium)