mineração Crypto tem provado ser uma das maiores ameaças de 2017, com a tendência a continuar a sê-lo em 2018. impacto dos mineiros criptomoeda em máquinas de usuários é bastante destrutiva.
Researchers found out that miners such as the Coinhive Monero miner can use up to 65% of CPU. além do que, além do mais, new statistics recently revealed that 2,531 de topo 3 milhões de sites estão executando o minerador Coinhive, o que equivale a 1 no 1,000 sites.
Crypto miners are not the only threat out there. Malware campaigns such as RoughTed and ransomware such as Locky continue to be prevalent. Dito, Check Point researchers have gathered intelligence on the top 10 malware threats invading users worldwide from September up to now.
RoughTed é uma campanha de publicidade maliciosa de grande escala que viu um pico em março deste ano, mas tem sido ativo por pelo menos mais de um ano. Ambos os sistemas operacionais Windows e Mac são direcionados, bem como iOS e Android. The operation is quite rare in its comprehensiveness, ter usado uma variedade de abordagens maliciosos de explorar kits para scams online, como golpes de apoio falso tecnologia, atualizações falsas, extensões do navegador desonestos, e assim por diante.
2. Locky Ransomware
Locky ransomware has been around since February 2016, and during this period several iterations appending different extensions have appeared. The ransomware mainly spreads via spam emails which contain a downloader disguised as a Word or Zip attachment. The ransomware’s latest iteration is the so-called .asasin file virus, which appends the .Asasin extension to all encrypted files.
Seamless is a Traffic Distribution System (TDS), which operates by silently redirecting the victim to a malicious web page, leading to infection by an exploit kit. Successful infection will allow the attacker to download additional malware from the target, Check Point researchers said.
Mais especificamente, the Seamless campaign, which has been active since February 2017 Ou mais cedo, has been using the Ramnit Trojan as a payload. Contudo, in many cases the Ramnit payloads would be set to download additional malware on infected machines.
Despite its lengthy life-span, this infamous worm continues to infect computers. The worm enables cybercriminals to operate remotely to download malware. Infected machines are controlled by a botnet.
5. Zeus Trojan
o Zeus Trojan is still spread on a large scale via the RIG Exploit Kit. That new version is dubbed “Chthonic” and it first emerged a couple of years ago, quando atingiu 150 bancos de todo o mundo. This activity is still ongoing.
The famous banking Trojan designed to steal banking credentials, FTP passwords, session cookies and personal details is still active in the wild.
According to Check Point researchers, Firewall has been developed by a Chinese digital marketing company Rafotech.
It has been designed to hijack the victim’s browser and replacing his search engine with a fake one, and setting its own homepage. In addition to this typical browser hijacking behavior, Fireball is also capable of downloading other malware, bypassing anti-malware detection and using command-and-control techniques.
Pushdo is a Trojan that infects a system and then downloads the Cutwail spam module on infected systems. The latter can be leveraged to download third party malware.
Andromeda is a modular botnet often deployed as a backdoor to distribute additional malware. It can also be modified to create various types of botnets.
Keep in mind that the malware pieces listed above are currently active in the wild meaning that, to avoid infections, strong anti-malware protection is needed on every system.
digitalizador SpyHunter só irá detectar a ameaça. Se você quiser a ameaça de ser removido automaticamente, você precisa comprar a versão completa da ferramenta anti-malware.Saiba Mais Sobre SpyHunter Anti-Malware Ferramenta / Como desinstalar o SpyHunter