Trojans as Malware on The Rise - Emotet Is Back
The recently discovered malware agent Tesla is currently the Most Wanted
Malware! He specializes in the theft of passwords, the reading of
keystrokes and other espionage activities. Now it has become a widespread
threat. This is, among other things, the result of the Global Threat Index
for September 2019, which was published by Check Point Research, the threat
intelligence department of Check Point® Software Technologies Ltd. has
been published.
Note: Remove Trojan, Emotet, Malware with Free Antivirus Software
The Trojan Emotet Is Back
Also, the
Emotet Trojan has returned from its hiatus and is spreading several spam
campaigns. Numerous attacks came to light in Germany, including the Berlin
Court of Justice, hospitals and a jeweller. Some of the spam campaigns
contained emails containing a link to download an infected Word
file; others even contained the fraudulent document themselves. When
opening the file, victims are prompted to start the macro functions in the
document, which then automatically install the Emotet malware.
Maya Horowitz is Director Threat Intelligence & Research Products at
Check Point. - Photo: Check Point
“It is not known why the Emotet botnet was discontinued for three
months, but we can assume that the inventors brought the features and
capabilities up to the state of the art. It is therefore all the more
important that companies warn their employees about the risks of phishing
e-mails, opening unknown e-mail attachments or clicking dubious links that do
not come from a trustworthy source or contact person. You should
especially use the latest generation of anti-malware solutions that can
automatically filter and check suspicious content from e-mails before they
reach the user, ”explains Maya Horowitz, Director Threat Intelligence &
Research Products at Check Point.
The Top 3 Most Wanted Malware in September:
In September, the RAT AgentTesla took over the lead with 19 per cent. The Trojan Emotet followed in second and third place with 13 per cent and the InfoStealer Lokibot with 4 per cent. Emotet has maintained
its rank compared to the previous month - despite the three-month break.
Top 3 Most Wanted Mobile Malware in September:
This month, Lotoor was once again the most widely used malware against
mobile devices, followed by AndroidBauts and Haddad. Locator exploits
vulnerabilities in the Android operating system to gain root rights on these
mobile devices.
Top 3 Exploited Vulnerabilities in September:
This month, the
MVPower DVR Remote Code Execution vulnerability tops the list of the most
exploited vulnerabilities with a global prevalence of 37 per cent. The
vulnerability arises when executing remote code in MVPower DVR devices. An
attacker can exploit this vulnerability remotely to execute arbitrary
code in the affected router via an elaborated request. The Linux System Files
Information Disclosure vulnerability follows in second place, closely followed
by the Web Server Exposed Git Repository Information Disclosure, which affects
35 per cent of companies worldwide.

Advanced Internet Security Solutions: The Most Wanted Malware >>>>> Download Now
ReplyDelete>>>>> Download Full
Advanced Internet Security Solutions: The Most Wanted Malware >>>>> Download LINK
>>>>> Download Now
Advanced Internet Security Solutions: The Most Wanted Malware >>>>> Download Full
>>>>> Download LINK YT