Check Point Research reports that Trickbot, often used in the initial stages of ransomware attacks, is the most prevalent malware for the second month running
Our latest Global Threat Index for June 2021 has revealed that Trickbot is still the most prevalent malware, having first taken the top spot in May. Trickbot is a botnet and banking trojan that can steal financial details, account credentials, and personally identifiable information, as well as spread within a network and drop ransomware. Last month CPR reported that the average weekly number of ransomware attacks increased 93% over the past 12 months, and also warned that ransomware attacks often don’t start with ransomware. For example, in the Ryuk ransomware attacks, the Emotet malware was used to infiltrate the network, which was then infected with this month’s top malware, Trickbot, before the ransomware finally encrypted the data.
Since the Emotet botnet was taken down in January, the Trickbot trojan and botnet has gained popularity. It has also recently been linked to a new ransomware strain called ‘Diavol’. Trickbot is constantly being updated with new capabilities, features and distribution vectors, which enables it to be a flexible and customizable malware that can be distributed as part of multi-purpose campaigns.
CPR states that well-known ransomware groups such as Ryuk and REvil first rely on various forms of malware for the initial stages of infection – a key one being this month’s top malware, Trickbot. Organizations need to remain acutely aware of the risks and ensure adequate solutions are in place. In addition to the botnet and banking trojan, Trickbot, this month’s list includes a big range of different malware types including botnets, infostealers, backdoors, RATs and mobile. It’s crucial for organizations to have the right technologies in place to deal with such a wide variety of threats. If they do, the majority of attacks, even the most advanced ones such as REvil, can be prevented without disrupting the normal business flow.
CPR also revealed this month “HTTP Headers Remote Code Execution” is the most commonly exploited vulnerability, impacting 47% of organizations globally, followed by “MVPower DVR Remote Code Execution” which impacts 45% of organizations worldwide. “Dasan GPON Router Authentication Bypass” takes third place in the top exploited vulnerabilities list, with a global impact of 44%.
Top malware families
*The arrows relate to the change in rank compared to the previous month.
This Month, Trickbot is the most popular malware with a global impact of 7% of organizations, followed by XMRig and Formbook impacting 3% of organizations worldwide each.
Top exploited vulnerabilities
This month “HTTP Headers Remote Code Execution” is the most commonly exploited vulnerability, impacting 47% of organizations globally, followed by “MVPower DVR Remote Code Execution” which impacts 45% of organizations worldwide. “Dasan GPON Router Authentication Bypass” takes third place in the top exploited vulnerabilities list, with a global impact of 44%.
Top mobile malwares
This month xHelper takes first place in the most prevalent mobile malware, followed by Hiddad and XLoader.
This content was originally published here.