Check Point's researchers also report sharp increase in exploits against the 'Command Injection Over HTTP' vulnerability, impacting 33% of organizations globally.
The emails in both campaigns contained a malicious Microsoft Word document which, if opened by the recipient, attempts to download Emotet onto their computer. Emotet is primarily used as a distributor of ransomware or other malicious campaigns.
December also saw a significant increase in attempts to exploit the 'Command Injection Over HTTP' vulnerability, with 33% of organizations globally being targeted. This vulnerability rose from being the 5th most exploited in November to the top position last month. If successfully exploited, the payload was a DDoS botnet: the malicious file used in the attack also contained a number of links to payloads exploiting vulnerabilities in several IoT devices from manufacturers including D-Link,
'Over the past three months, the threats impacting most organizations have been versatile, multi-purpose malware like Emotet and xHelper. These give cyber-criminals multiple options for monetizing attacks, as they can be used for distributing ransomware or spreading further spam campaigns,' said
December 2019's Top 3 'Most Wanted' Malware:
*The arrows relate to the change in rank compared to the previous month.
Emotet impacted 13% of organizations globally in December, up from 9% in November. XMRig and Trickbot each impacted 7% of organizations.
- Emotet - Emotet is an advanced, self-propagating and modular Trojan. Emotet was formerly a banking Trojan, and recently has been used as a distributor of other malware or malicious campaigns. It uses multiple methods for maintaining persistence and evasion techniques to avoid detection. In addition, it can be spread through phishing spam emails containing malicious attachments or links.
- XMRig - XMRig is an open-source CPU mining software used for the mining process of the Monero cryptocurrency, and first seen in-the-wild on
- Trickbot - Trickbot is a dominant banking Trojan constantly being updated with new capabilities, features and distribution vectors. This enables Trickbot to be a flexible and customizable malware that can be distributed as part of multi purposed campaigns.
December's Top 3 'Most Wanted' Mobile Malware:
xHelper and Guerrilla continue to hold the top two positions of the mobile malware index.
- xHelper - A malicious Android application seen in the wild since
- Guerrilla - An Android Trojan found embedded in multiple legitimate apps which is capable of downloading additional malicious payloads. Guerrilla generates fraudulent ad revenue for the app developers.
- Hiddad - Android malware which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also access key security details built into the OS
December's 'Most Exploited' vulnerabilities:
The 'Command Injection Over HTTP' was the most common exploited vulnerability, impacting 33% of organizations globally. In 2nd place, the MVPower DVR Remote Code Execution vulnerability impacted 32% of organizations, and the Web Server Exposed Git Repository Information Disclosure impacted 29%.
- Command Injection Over HTTP - A command Injection over HTTP vulnerability can be exploited by a remote attacker by sending a specially crafted request to the victim. Successful exploitation would allow an attacker to execute arbitrary code on the target machine.
- MVPower DVR Remote Code Execution - A remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request.
- Web Server Exposed Git Repository Information Disclosure - An information disclosure vulnerability has been reported in Git Repository. Successful exploitation of this vulnerability could allow an unintentional disclosure of account information.
Check Point's Global Threat Impact Index and its ThreatCloud Map is powered by Check Point's ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, more than 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily.
The complete list of the top 10 malware families in December can be found on the Check Point Blog.
Check Point's Threat Prevention Resources are available at: //www.checkpoint.com/threat-prevention-resources/index.html
Blog: https://research.checkpoint.com/
Twitter: https://twitter.com/_cpresearch_
About
About
(C) 2020 Electronic News Publishing, source