Ransomware families and volume of attacks continue to rise
Both the number of variants of ransomware and volume of malware attacks were on the rise in August, according to Check Point.
During August, the number of active ransomware families grew by 12 percent while the number of detected attempted ransomware attacks increased by 30 percent. Two-thirds of all recognized ransomware families climbed the rankings in August, most of them by at least 100 positions.
Check Point believes that the growth in ransomware is a symptom of the relative ease of broadly deploying ransomware once a variant is created, and also of the number of businesses simply paying ransoms to release critical data. This makes it a lucrative and attractive attack vector for cyber-criminals. For the fifth consecutive month HummingBad remained the most common malware used to attack mobile devices, but the number of detected incidents fell by more than 50 percent.
Conficker still most prominent
Check Point found that the number of unique and active malware families had remained similar to previous months, as the use of malware stayed consistently high. Overall, Conficker was the most prominent family accounting for 14 percent of recognized attacks; second placed JBossjmx accounted for 9 percent; and Sality was responsible for 9 percent, ranking in third place. In total, the top ten families were responsible for 57 percent of all recognized attacks.
1. Conficker – Worm that allows remote operations and malware download. The infected machine is controlled by a botnet, which contacts its Command & Control server to receive instructions.
2. JBossjmx – Worm that targets systems having a vulnerable version of JBoss Application Server installed. The malware creates a malicious JSP page on vulnerable systems that executes arbitrary commands. Moreover, another Backdoor is created that accepts commands from a remote IRC server.
3. Sality – Virus that allows remote operations and downloads of additional malware to infected systems by its operator. Its main goal is to persist in a system and provide means for remote control and installing further malware.
Mobile malware families
Mobile malware families continued to pose a significant threat to businesses mobile devices during August. The top three mobile families were:
1. HummingBad – Android malware that establishes a persistent rootkit on the device, installs fraudulent applications and enables additional malicious activity such as installing a key-logger, stealing credentials and bypassing encrypted email containers used by enterprises.
2. Ztorg – Trojan that uses root privileges to download and install applications on the mobile phone without the user’s knowledge.
3. Triada – Modular Backdoor for Android which grants super-user privileges to downloaded malware, as helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.
“Businesses face a catch-22 situation when it comes to dealing with ransomware. If they don’t pay the ransom they face losing critical data and valuable assets for good; if they do pay, they only encourage cyber-criminals to utilize ransomware as it becomes a lucrative attack vector. To nullify this, organizations need advanced threat prevention measures on networks, endpoints and mobile devices to stop malware at the pre-infection stage,” said Nathan Shuchami, Head of Threat Prevention at Check Point.
“The number of active malware families continues to remain high as cyber-criminals continue to target business’ critical assets,” Shuchami added. “This, together with the range of attack methods utilized by the different families, highlights the scale of the challenge organizations face in securing their network against exploitation by cybercriminals.”