- ¿¿¿ Conficker - Worm that allows remote operations and malware download. The infected machine is controlled by a botnet, which contacts its Command & Control server to receive instructions.
- ¿ Locky - Ransomware, which started its distribution in February 2016, and spreads mainly through spam emails containing a downloader disguised as a Word or Zip file attachment, which then downloads and installs the malware that encrypts the user files.
- ¿ Zeus - Trojan that targets Windows platforms and is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing.
- ¿ HummingBad - Android malware that establishes a persistent rootkit on the device, installs fraudulent applications and enables additional malicious activity such as installing a key-logger, stealing credentials and bypassing encrypted email containers used by enterprises.
- ¿ Triada - Modular Backdoor for Android, which grants super-user privileges to downloaded malware, as helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.
- ¿ XcodeGhost - A compromised version of the iOS developer platform, Xcode. This unofficial version of Xcode was altered so that it injects malicious code into any app that was developed and compiled using it. The injected code sends app information to a Command & Control server, allowing the infected app to read the device clipboard.
"To protect themselves, organizations must take a comprehensive approach and have advanced threat prevention measures on networks, endpoints and mobile devices to stop malware at the pre-infection stage, such as Check Point's SandBlast™ Zero-Day Protection and Mobile Threat Prevention solutions, to ensure that they are adequately safeguarded from the latest threats," added Shuchami.Check Point's threat index is based on threat intelligence drawn from its ThreatCloud World Cyber Threat Map, which tracks how and where cyberattacks are taking place worldwide in real time. The Threat Map is powered by Check Point's ThreatCloud TM intelligence, the largest collaborative network to fight cybercrime, which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, over 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily. Check Point's Threat Prevention Resources are available at: http://www.checkpoint.com/threat-prevention-resources/index.html Follow Check Point via:Twitter: http://www.twitter.com/checkpointswFacebook: https://www.facebook.com/checkpointsoftwareBlog: http://blog.checkpoint.comYouTube: http://www.youtube.com/user/CPGlobalLinkedIn: https://www.linkedin.com/company/check-point-software-technologies
INVESTOR CONTACT: Kip E. MeintzerCheck Point Software Technologiesfirstname.lastname@example.orgMEDIA CONTACT:Emilie Beneitez LefebvreCheck Point Software TechnologiesTel: +44 (0) 7785 381 email@example.com