Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Crypto-Mining Malicious Programs Observed as Most Prolific

 

One fresh report reveals how cyber-criminals are repeatedly abusing security flaws in un-patched servers for contaminating systems with crypto-mining malicious programs.

 

The report which Check Point Software Technologies has published tells that crypto-mining malicious programs are the maximum among the top 10 malware strains that are most wanted, with Coinhive being at rank no.1 having a worldwide access of 16%. One more crypto-mining malware Cryptoloot comes next on the index having a worldwide access of 14%, whilst a malvertising malware namely Roughted occupies the third position at 11%.

 

The security researchers examined malware databases obtained from multiple sensors in a network along with innumerable data points worldwide to find a tendency of cyber crooks abusing familiar security flaws despite patches existing down 6 months-and-more. Check Point's Top Ten Most Wanted Malware Index pertaining to April 2018 catalogs those crypto-mining malware, mobile malware as well as vulnerabilities, which are most dangerous.

 

The researcher team at Check Point writes that cyber-criminals globally are sharpening their skill on 2 particular security flaws - one each within Oracle WebLogic and Microsoft Windows Server with the purpose for mining crypto-currency. Infosecurity-magazine.com posted this, May 14, 2018.

The security investigators also examined cyber vulnerabilities that are most exploited. The first, CVE-2017-7269 have a worldwide effect of 46 percent; the second, CVE-2017-10271 impacts 40 percent of global organizations; the third, SQL injection affects 16 percent of worldwide organizations.

 

Manager of threat intelligence team Maya Horowitz at Check Point says that as crypto-mining malicious programs keep growing, cyber-criminals too keep making innovative methods so they can discover fresh tactics for exploiting victims' systems while churn more income. Currently, as they look towards hacking networks by abusing server flaws, it's very clear that organizations should uplift their securities, in particular patching mechanisms as crucial for making sure their networks stay secured, she adds.

 

As global organizations increasingly get attacked with the above kind of ways, product management director Robert Corradini at 5nine states the internal personnel should be educated to necessarily abide by best practices related to upkeep of systems i.e. deploying in them the most recent security patches, in particular mission-critical apps.

» SPAMfighter News - 5/22/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next