Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Iot Attacks gets Doubled in the Last Two Months - Check Point

 

As per the monthly report of Check Point, around half of the global organizations, in the previous month, were hit by malware that was targeting the IoT vulnerabilities. The monthly report further stated that IoT and networking attacks have more than doubled since the month of May.

 

Top 10 lists of Most Exploited Vulnerabilities; Most Wanted Mobile Malware; and Most Wanted Malware is being published every month by Check Point. Data from ThreatCloud database of Check Point was the basis of these reports. The database analyzes over 250 Million (Mn) addresses for the bot discovery, over 5.5 Mn websites that were infected, and over 11 Mn malware signatures. It further identifies many malware varieties daily.

 

Three IoT vulnerabilities have entered in the Top 10 maximum exploited list during July 2018: MVPower DVR router Remote Code Execution at #5; D_Link DSL-2750B router Remote Command Execution at #7; and Dasan GPON router Authentication Bypass at #10. Together, 45% of the organizations all over the world got impacted by the attacks that were targeting these vulnerabilities in July 2018, as compared to 35% in the month of June and 21 percent in the month of May. These vulnerabilities allow the attackers to perform the malicious code along with gaining remote access of targeted devices, as posted on August 15, 2018, in marketwatch.com.

 

Group Manager of Threat Intelligence at Check Point, Maya Horowitz, said in one of the blog post regarding the report that "IoT vulnerabilities in particular are often 'the path of least resistance,' as once one device is compromised it can be straightforward to infiltrate further connected devices."

 

Horowitz added that for getting protected from both identified as well as unidentified vulnerabilities, it is important for the enterprises to employ a cybersecurity strategy that is multi-layered - means it protects against both the brand new threats as well as the cyber-attacks of established malware families.

 

Coinhive remained as the malware that is most prevalent, having impacted 19% organization all over the world. It is followed by Cryptoloot and Dorkbot, ranked second and third respectively, each having a worldwide impact of 7%. For mitigating these and various other security vulnerabilities, one important way - as evident by a recent Spectre-like Intel chip flaws that were disclosed this week is patching the systems and ensuring that the software is updated. Horowitz also said that "it is vital that organizations apply patches to known vulnerabilities as and when they are made available to ensure that networks remain secure."

» SPAMfighter News - 8/22/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next