According to recent findings, the number of active malware families has increased by 61% in the year 2016. It is important for companies to be aware of the most destructive and active malware in order to protect themselves from a possible cyber attack. Check Point recognized the some of the top families responsible for over half of the detected attacks. Here is a list of the most harmful and active malware malware operating so far this year.
Conficker – A worm that allows remote operations and malware to be download. The infected machine is then controlled by a botnet, which contacts its Command & Control server to receive instructions.
Sality – A virus that allows remote operations and downloads of additional malware to infected systems by its operator. Its main goal is to persist in a system and provide means for remote control and installing further malware.
Zeroaccess – A worm that targets Windows platforms, allowing remote operations and malware download. It utilizes a peer-to-peer (P2P) protocol to download or update additional malware components from remote peers.
The top three mobile malware:
HummingBad – An Android malware that establishes a persistent rootkit on the device, installs fraudulent applications, and with slight modifications could enable additional malicious activity, such as installing a key-logger, stealing credentials and bypassing encrypted email containers used by enterprises.
Iop – An Android malware that installs applications and displays excessive advertising by using root access on the mobile device. The amount of ads and installed apps makes it difficult for the user to continue using the device as usual.
XcodeGhost –A compromised version of the iOS developer platform, Xcode. This unofficial version of Xcode was altered so it injects malicious code into any app that was developed and compiled using it. The injected code sends app info to a C&C server, allowing the infected app to read the device clipboard.
Such persistent and high levels of malware and cyber attacks serve as a reminder to businesses and institutions to upgrade their technology defenses and plan ahead in case of security breaches.
Which do you think were the most important? What would you add?
We’d love to hear your feedback and thoughts in the comments below.
Written by DFGR Research Team – www.dfgr-ltd.com