Emotet

January 2022’s Most Wanted Malware: Lokibot Returns to the Index and Emotet Regains Top Spot

Retrieved on: 
Tuesday, February 8, 2022

After only two and a half months since its return, Emotet has surged into the top spot.

Key Points: 
  • After only two and a half months since its return, Emotet has surged into the top spot.
  • It is unlikely that this will be a short-lived problem, said Maya Horowitz, VP Research at Check Point Software.
  • Check Point Research (CPR) revealed this month that Education/Research remains the most attacked industry globally, followed by Government/Military and ISP/MSP.
  • Check Point Software Technologies Ltd. ( www.checkpoint.com ) is a leading provider of cyber security solutions to corporate enterprises and governments globally.

Avast Q4/2021 Threat Report: Log4j opening doors for new attacks while ransomware and RAT attacks on decline

Retrieved on: 
Monday, January 31, 2022

At the same time, Avast saw less ransomware and remote access trojan (RAT) activity.

Key Points: 
  • At the same time, Avast saw less ransomware and remote access trojan (RAT) activity.
  • "On the other hand, we are happy to report decreases in RAT, information stealer, and ransomware attacks.
  • Most bot attacks were just probes testing the vulnerability, but Avast also noticed numerous attempts to load potentially malicious code.
  • Avast digital security products for Mobile, PC or Mac are top-ranked and certified by VB100, AV-Comparatives, AV-Test, SE Labs and others.

Check Point Software’s 2022 Security Report: Global Cyber Pandemic’s Magnitude Revealed

Retrieved on: 
Friday, January 21, 2022

SAN CARLOS, Calif., Jan. 21, 2022 (GLOBE NEWSWIRE) -- Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has released its 2022 Security Report. From the SolarWinds attack at the beginning of the year, which presented a whole new level of sophistication and spread, all the way through to December and the influx of Apache Log4j vulnerability exploitations, the 2022 Security Report reveals the key attack vectors and techniques witnessed by CPR during 2021.

Key Points: 
  • SAN CARLOS, Calif., Jan. 21, 2022 (GLOBE NEWSWIRE) -- Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has released its 2022 Security Report.
  • Follow Check Point Research via:
    Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community.
  • Check Point Software Technologies Ltd. ( www.checkpoint.com ) is a leading provider of cyber security solutions to corporate enterprises and governments globally.
  • Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industrys most comprehensive, intuitive unified security management.

December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague

Retrieved on: 
Wednesday, January 12, 2022

This month Apache Log4j Remote Code Execution is the most exploited vulnerability, affecting 48.3% of organizations globally.

Key Points: 
  • This month Apache Log4j Remote Code Execution is the most exploited vulnerability, affecting 48.3% of organizations globally.
  • The vulnerability caused a new plague, impacting almost half of all companies worldwide in a very short space of time.
  • This month we have also seen the Emotet botnet move from the seventh most prevalent malware to the second.
  • Apache Log4j Remote Code Execution (CVE-2021-44228) - A remote code execution vulnerability exists in Apache Log4j.

Netskope Threat Research Reveals More Than Two-Thirds of Malware Downloads Came From Cloud Apps in 2021

Retrieved on: 
Tuesday, January 11, 2022

The research showed that more than two-thirds of malware downloads came from cloud apps in 2021 and identified Google Drive as the app with the most malware downloads, taking the spot from Microsoft OneDrive.

Key Points: 
  • The research showed that more than two-thirds of malware downloads came from cloud apps in 2021 and identified Google Drive as the app with the most malware downloads, taking the spot from Microsoft OneDrive.
  • In 2021, malware downloads originating from cloud apps increased to 66% of all malware downloads when compared to traditional websites, up from 46% at the beginning of 2020.
  • "The increasing popularity of cloud apps has given rise to three types of abuse described in this report: attackers trying to gain access to victim cloud apps, attackers abusing cloud apps to deliver malware, and insiders using cloud apps for data exfiltration," said Ray Canzanese, Threat Research Director, Netskope Threat Labs.
  • The Netskope Cloud and Threat Spotlight is produced by Netskope Threat Labs, a team composed of the industry's foremost cloud threat and malware researchers who discover and analyze the latest cloud threats affecting enterprises.

Validity and Spamhaus Launch Partnership to Educate Email Marketers and Enable Safer Outreach

Retrieved on: 
Tuesday, August 3, 2021

In order to keep pace with the onslaught of malicious activity, Validity integrates the leading blocklists into its platform, courtesy of Spamhaus.

Key Points: 
  • In order to keep pace with the onslaught of malicious activity, Validity integrates the leading blocklists into its platform, courtesy of Spamhaus.
  • The ongoing partnership will bring together more data exchanges that help each partner do what they do best - educate senders and fight malicious mail.
  • For example, in Q2 2021 Spamhaus worked with the FBI to help remediate the compromised email accounts following the Emotet botnet takedown.
  • When marketers conduct email efforts fairly, security services and mail providers can spend more time focusing on truly malicious senders.

Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities

Retrieved on: 
Tuesday, July 27, 2021

PALO ALTO, Calif., July 27, 2021 (GLOBE NEWSWIRE) -- HP Inc. (NYSE: HPQ) today released its latest global Threat Insights Report, providing analysis of real-world cybersecurity attacks and vulnerabilities.

Key Points: 
  • PALO ALTO, Calif., July 27, 2021 (GLOBE NEWSWIRE) -- HP Inc. (NYSE: HPQ) today released its latest global Threat Insights Report, providing analysis of real-world cybersecurity attacks and vulnerabilities.
  • The drop in Emotet activity in Q1 2021 has led to Dridex becoming the top malware family isolated by HP Wolf Security.
  • HPs most advanced embedded security features are available on HP Enterprise and HP Managed devices with HP FutureSmart firmware 4.5 or above.
  • HP Security is now HP Wolf Security.Security features vary by platform, please see product data sheet for details.

June 2021’s Most Wanted Malware: Trickbot Remains on Top

Retrieved on: 
Tuesday, July 13, 2021

Researchers report that Trickbot is still the most prevalent malware, having first taken the top spot in May.

Key Points: 
  • Researchers report that Trickbot is still the most prevalent malware, having first taken the top spot in May.
  • Since the Emotet botnet was taken down in January, the Trickbot Trojan and botnet has gained popularity.
  • Trickbot- Trickbot is a modular Botnet and Banking Trojan constantly being updated with new capabilities, features and distribution vectors.
  • This enables Trickbot to be a flexible and customizable malware that can be distributed as part of multi-purpose campaigns.

February 2021’s Most Wanted Malware: Trickbot Takes Over Following Emotet Shutdown

Retrieved on: 
Thursday, March 11, 2021

Researchers reported that the Trickbot trojanhas topped the Index for the first time, rising from third position in January.

Key Points: 
  • Researchers reported that the Trickbot trojanhas topped the Index for the first time, rising from third position in January.
  • Following the takedown of the Emotet botnet in January, Check Point researchers report that cyber-criminal groups continue to utilize other top threats, with malware such as Trickbot using new techniques for their malicious activities.
  • Trickbot was the 4th most prevalent malware globally during 2020, impacting 8% of organizations.
  • Trickbot - Trickbot is a dominant botnet and banking Trojan constantly being updated with new capabilities, features and distribution vectors.

January 2021’s Most Wanted Malware: Emotet Continues Reign as Top Malware Threat Despite Takedown

Retrieved on: 
Thursday, February 11, 2021

Even so, Emotet maintained the top position in the Global Threat Index, highlighting the vast global impact this botnet has had.

Key Points: 
  • Even so, Emotet maintained the top position in the Global Threat Index, highlighting the vast global impact this botnet has had.
  • Emotets malicious spam campaign uses different delivery techniques to spread Emotet, including embedded links, document attachments, or password-protected Zip files.
  • First identified in 2014, Emotet has been regularly updated by its developers to maintain its effectiveness for malicious activity.
  • The Department of Homeland Security has estimated that each incident involving Emotet costs organizations upwards of $1 million dollars to rectify.