Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Crypto-currency miners continue to be most virulent e-threat

A newly-conducted threat analysis of global malware reveals that crypto-currency miners workable through Web-browsers are threats that have maximum prevalence even in the fifteenth month in continuum. With prices dropping, however, these threats are gradually fading because their profitability is falling.

A recent malware report by Check Point a security research company states that Coinhive still happens to be the most virulent e-threat. Different samples of crypto-miners comprise 50% of the ten malware strains that are most wanted. These generally emerge as JavaScript miners active on the Web and which utilize the CPU of infected machines every time the users visit a website.

Check Point researchers have further detected many campaigns widely spreading the 'GandCrab' ransom software, which chiefly struck in Germany, Japan, Australia and Canada,. The GandCrab campaigns occurred during January-February 2019, and Check Point found one fresh edition of the malware during one of those attacks.

Threat Intelligence and Research Director Maya Horowitz from Check Point says as observed during January, cyber-attackers are still leveraging fresh techniques for spreading malware, while developing fresh as well as more perilous versions of existing malicious programs. The latest edition of GandCrab yet again shows that despite certain malware families being there as among the most prevalent malicious programs stretching over many months, while apparently remain static, they really keep evolving and get modified for avoiding detection. So Check Point researchers, in order to successfully counteract them, continuously trace their group DNA, thus indicating to organizations the necessity for them to maintain fully updated security solutions, Ms. Horowitz elaborates. www.helpnetsecurity.com posted this, March 12, 2019.

GandCrab v5.2, which is the latest edition, has the majority of characteristics prevailing within the earlier edition, however has a different encryption technique which makes ineffective the decryption key pertaining to the earlier editions.

Understandably, security of mobile devices reflects an increased measure compared to computers, still they aren't totally invulnerable. The 3 mobile malicious programs of top order are all created for Android phones. The two strains Triada and Lotoor have the capability for acquiring admin rights on a mobile phone enabling them to inject ads, steal passwords, or monitor the user.

ยป SPAMfighter News - 3/14/2019

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page