🕵January’s Most Wanted Malware:
Cryptomining Malware Continues to Cripple Enterprise CPU Power.
January 2018’s Top 3 ‘Most Wanted’ Malware:
*The arrows relate to the change in rank compared to the previous month.
↔Coinhive – Crypto-Miner designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user’s approval.
↑ Fireball – Browser-hijacker that can be turned into a full-functioning malware downloader.
↔ Rig ek – Rig delivers Exploits for Flash, Java, Silverlight and Internet Explorer
↔ Roughted – Large scale Malvertising used to deliver various malicious websites and payloads such as scams, adware, exploit kits and ransomware.
↑JSEcoin – JavaScript miner that can be embedded in websites.
↔ Globeimposter – Ransomware disguised as a variant of the Globe ransomware. Upon encryption, the ransomware appends the .crypt extension to each encrypted file.
↑ Andromeda – Modular bot used mainly as a backdoor to deliver additional malware on infected hosts.
↓ Cryptoloot – Crypto-Miner that uses the victim’s CPU or GPU power and existing resources for crypto mining – adding transactions to the blockchain and releasing new currency.
↓ Ramnit – Banking Trojan that steals banking credentials, FTP passwords, session cookies and personal data.
↑ Nivdort – Multipurpose bot used to collect passwords, modify system settings and download additional malware.
Check Point Blog