Monday, January 20, 2025
-6.4 C
New York

The 3 most dangerous malware and vulnerabilities of 2021 so far are:

The Check Point Research has released its latest Global Threat Index for April 2021. According to the researchers, Agent Tesla made its debut on the list, ranking number two, while the well-known Dridex Trojan remained the most prevalent malware.

Dridex, a Trojan targeting Windows systems, went viral this past month with its QuickBooks Malspam campaign: phishing emails attempted to dupe users with fake payment notifications and invoices. The email request the download of a malicious Microsoft Excel attachment that could infect the system with Dridex.

This malware often plays a part in the initial act of a ransomware attack, where hackers are encrypting an organization's data before demanding money.

These hackers are increasingly using two-stage blackmail techniques, where they steal sensitive data from an organization and threaten to make the stolen data public unless the ransom is paid.

For the first time, Agent Tesla has made it to number two on the malware list: it is an enhanced RAT (Remote Access Trojan) that has been active since 2014, stealing keystroke logging data and passwords. This month has seen an increase in the number of Agent Tesla campaigns spreading malicious spam.
The content of the email asks for a file downloaded, which can result in the system infection with Agent Tesla.

Check Point Research has also pointed out that “Web Server Exposed Git Repository Information Disclosure” is the most commonly exploited vulnerability. Followed by “HTTP Headers Remote Code Execution (CVE-2020-13756)”, and the third is “MVPower DVR Remote Code Execution.”

The top three malicious programs are:

1 DRIDEX
The Dridex banking Trojan is a program targeted to computers running Windows operating systems downloaded as an attachment to spam emails. Dridex contacts a remote server to send information about the infected system and download and run additional modules for remote management.

2 AGENT TESLA
Agent Tesla: an enhanced Remote Access Trojan that steals keystroke data and information. It monitors and collects input to the victim's keyboard and system clipboard, captures screenshots, and extracts personal data from various software installed on the victim's computer (such as Google Chrome, Mozilla Firefox, and Microsoft Outlook email client).

3 TRICKBOT
Trickbot is a modular banking and botnet malware. This is a highly flexible malware that can be distributed as part of a multi-target campaign.

And the top three vulnerabilities are:

1- Web Server Exposed Git Repository Information Disclosure – A reported data leakage vulnerability in the Git Repository that could expose information about a user account.

2 – HTTP Headers Remote Code Execution– the client and server use HTTP headers to transmit additional information via HTTP requests. A remote attacker could exploit a vulnerable HTTP header and execute arbitrary code on the victim machine.

3 – MVPower DVR Remote Code Execution – Vulnerability allows remote code execution on an MVPower DVR device. Hackers could exploit this vulnerability to execute arbitrary code on the compromised router via a crafty request.

You can find the complete list of malware families on the Check Point Blog.

Hot this week

Beware of Fake GitHub Stars

GitHub stars are a quick way to gauge open-source...

Facebook Marketplace Data Leak: 200K Exposed – Act Now

In alarming news, the personal information of approximately 200,000...

IObit Malware Fighter 11 Pro Review: Is It Enough?

  IObit Malware Fighter 11 Pro: Robust Malware Protection, But...

State-Sponsored Weaponization of ChatGPT: AI Turns Cyber Warfare Threat

Artificial intelligence (AI) is rapidly changing the world. We...

Is Your Face at Risk? “Gold Pickaxe” Malware Threatens Your Identity

  The Dangerous New Hack That Could Hijack Your Identity A...

Topics

Beware of Fake GitHub Stars

GitHub stars are a quick way to gauge open-source...

Facebook Marketplace Data Leak: 200K Exposed – Act Now

In alarming news, the personal information of approximately 200,000...

IObit Malware Fighter 11 Pro Review: Is It Enough?

  IObit Malware Fighter 11 Pro: Robust Malware Protection, But...

State-Sponsored Weaponization of ChatGPT: AI Turns Cyber Warfare Threat

Artificial intelligence (AI) is rapidly changing the world. We...

Is Your Face at Risk? “Gold Pickaxe” Malware Threatens Your Identity

  The Dangerous New Hack That Could Hijack Your Identity A...

Krasue Alert: Linux Systems Under Stealth Attack

Linux, synonymous with security and reliability in operating systems,...

Best Free Password Managers 2024: Secure Your Digital Life

As we move into 2024, the reliance on traditional...

Secure Your WordPress: Spot & Stop Fake Alerts!

WordPress is synonymous with website creation, powering a substantial...
spot_img

Related Articles

Popular Categories

spot_imgspot_img