🕵January’s Most Wanted Malware:

🕵January’s Most Wanted Malware:

Cryptomining Malware Continues to Cripple Enterprise CPU Power.

January 2018’s Top 3 ‘Most Wanted’ Malware:

*The arrows relate to the change in rank compared to the previous month.

↔Coinhive – Crypto-Miner designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user’s approval.

↑ Fireball – Browser-hijacker that can be turned into a full-functioning malware downloader.

↔ Rig ek – Rig delivers Exploits for Flash, Java, Silverlight and Internet Explorer

↔ Roughted – Large scale Malvertising used to deliver various malicious websites and payloads such as scams, adware, exploit kits and ransomware.

↑JSEcoin – JavaScript miner that can be embedded in websites.

↔ Globeimposter – Ransomware disguised as a variant of the Globe ransomware. Upon encryption, the ransomware appends the .crypt extension to each encrypted file.

↑ Andromeda – Modular bot used mainly as a backdoor to deliver additional malware on infected hosts.

↓ Cryptoloot – Crypto-Miner that uses the victim’s CPU or GPU power and existing resources for crypto mining – adding transactions to the blockchain and releasing new currency.

↓ Ramnit – Banking Trojan that steals banking credentials, FTP passwords, session cookies and personal data.

↑ Nivdort – Multipurpose bot used to collect passwords, modify system settings and download additional malware.

Check Point Blog

https://blog.checkpoint.com/2018/02/15/januarys-most-wanted-malware-cryptomining-malware-continues-to-cripple-enterprise-cpu-power/