June 2021’s Most Wanted Malware: Trickbot Remains on Top
Check Point Research has reported that Trickbot malware retains its status as the most prevalent malware for June 2021, marking the second consecutive month in this position. Trickbot, known for banking trojan functionalities, accounts for a global impact of 7% on organizations. The report highlights a significant increase in ransomware attacks, with weekly incidents rising by 93% over the past year. Additionally, the most exploited vulnerabilities include HTTP Headers Remote Code Execution, affecting 47% of organizations, and MVPower DVR Remote Code Execution impacting 45%.
- Trickbot ranked as the most prevalent malware, impacting 7% of organizations globally.
- CPR reported a 93% increase in ransomware attacks over the past year.
- CPR's ThreatCloud database inspects over 3 billion websites and 600 million files daily.
- The rise in ransomware attacks indicates a growing threat landscape for cybersecurity.
- Organizations remain vulnerable due to the prevalence of malware like Trickbot.
Check Point Research reports that Trickbot, often used in the initial stages of ransomware attacks, is the most prevalent malware for the second month running
SAN CARLOS, Calif., July 13, 2021 (GLOBE NEWSWIRE) -- Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for June 2021. Researchers report that Trickbot is still the most prevalent malware, having first taken the top spot in May.
Trickbot is a botnet and banking trojan that can steal financial details, account credentials, and personally identifiable information, as well as spread within a network and drop ransomware. Last month CPR reported that the average weekly number of ransomware attacks increased
Since the Emotet botnet was taken down in January, the Trickbot Trojan and botnet has gained popularity. It has also recently been linked to a new ransomware strain called ‘Diavol’. Trickbot is constantly being updated with new capabilities, features and distribution vectors, which enables it to be a flexible and customizable malware that can be distributed as part of multi-purpose campaigns.
“Well-known ransomware groups such as Ryuk and REvil first rely on various forms of malware for the initial stages of infection – a key one being this month’s top malware, Trickbot,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point. “Organizations need to remain acutely aware of the risks and ensure adequate solutions are in place. In addition to the botnet and banking trojan, Trickbot, this month’s list includes a big range of different malware types including botnets, infostealers, backdoors, RATs and mobile. It’s crucial for organizations to have the right technologies in place to deal with such a wide variety of threats. If they do, the majority of attacks, even the most advanced ones such as REvil, can be prevented without disrupting the normal business flow.”
CPR also revealed this month “HTTP Headers Remote Code Execution” is the most commonly exploited vulnerability, impacting
Top malware families
*The arrows relate to the change in rank compared to the previous month.
This month, Trickbot is the most popular malware with a global impact of
- ↔ Trickbot - Trickbot is a modular Botnet and Banking Trojan constantly being updated with new capabilities, features and distribution vectors. This enables Trickbot to be a flexible and customizable malware that can be distributed as part of multi-purpose campaigns.
- ↔ XMRig - XMRig is an open-source CPU mining software used for the mining process of the Monero cryptocurrency, and first seen in-the-wild in May 2017.
- ↔ Formbook - Formbook is an Infostealer that harvests credentials from various web browsers, collects screenshots, monitors and logs keystrokes, and can download and execute files according to its C&C orders.
Top exploited vulnerabilities
This month “HTTP Headers Remote Code Execution” is the most commonly exploited vulnerability, impacting
- ↑ HTTP Headers Remote Code Execution (CVE-2020-10826,CVE-2020-10827,CVE-2020-10828,CVE-2020-13756) – HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP header to run arbitrary code on the victim machine.
- ↑ MVPower DVR Remote Code Execution – A remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request.
- ↑ Dasan GPON Router Authentication Bypass (CVE-2018-10561) – An authentication bypass vulnerability exists in Dasan GPON routers. Successful exploitation of this vulnerability would allow remote attackers to obtain sensitive information and gain unauthorized access into the affected system.
Top mobile malwares
This month xHelper takes first place in the most prevalent mobile malware, followed by Hiddad and XLoader.
- xHelper - A malicious application seen in the wild since March 2019, used for downloading other malicious apps and display advertisement. The application is capable of hiding itself from the user, and can reinstall itself in the event that it was uninstalled.
- Hiddad - Hiddad is an Android malware which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS.
- XLoader - XLoader is an Android Spyware and Banking Trojan developed by the Yanbian Gang, a Chinese hacker group. This malware uses DNS spoofing to distribute infected Android apps, in order to collect personal and financial information.
Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 3 billion websites and 600 million files daily, and identifies more than 250 million malware activities every day.
The complete list of the top 10 malware families in June can be found on the Check Point Software blog.
Follow Check Point Research via:
Blog: https://research.checkpoint.com/
Twitter: https://twitter.com/_cpresearch
About Check Point Research
Check Point Research (CPR) provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point solutions are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point Infinity´s portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.
MEDIA CONTACT: | INVESTOR CONTACT: |
Laura Martinez Hidalgo | Kip E. Meintzer |
Check Point Software Technologies | Check Point Software Technologies |
press@checkpoint.com | ir@us.checkpoint.com |
FAQ
What is the current status of Trickbot malware as of July 2021?
How much have ransomware attacks increased according to Check Point Research?
What are the top vulnerabilities exploited in June 2021?