Check Point Research reports that Trickbot is the most prevalent malware while remote access trojan, njRAT, has entered the index for the first time.
October 8, 2021 — Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for September 2021. Researchers report that Trickbot has returned to the top of the list having fallen into second place in August following a three-month long reign.
The remote access trojan, njRAT, has entered the top ten for the first time, taking the place of Phorpiex which is no longer active. Trickbot is a banking trojan that can steal financial details, account credentials, and personally identifiable information, as well as spread within a network and drop ransomware. Since the Emotet takedown in January, the Trickbot trojan has gained popularity. It is constantly being updated with new capabilities, features and distribution vectors which enables it to be a flexible and customizable malware that can be distributed as part of multi-purpose campaigns.
“In the same month that Trickbot once again became the most prevalent malware, it was reported that one of Trickbot’s gang members was actually arrested as a result of a US investigation,” said Maya Horowitz, VP Research at Check Point Software. “In addition to other charges that have been filed this year in the fight against the trojan, we are hopeful that the gang’s dominance will soon be undermined. But, as always, there is still a long way to go. This week our researchers reported there are 40% more attacks weekly on organizations in 2021 compared to 2020 globally yet most of these, if not all, could have been prevented. Organizations mustn’t delay in adopting a prevention-first approach to cybersecurity.”
CPR also revealed this month that “Web Server Exposed Git Repository Information Disclosure” is the most commonly exploited vulnerability, impacting 44% of organizations globally, followed by “Command Injection Over HTTP” which affects 43% of organizations worldwide. “HTTP Headers Remote Code Execution” takes third place in the top exploited vulnerabilities list, with a global impact of 43% as well.
Top malware families
*The arrows relate to the change in rank compared to the previous month.
This month, Trickbot is the most popular malware impacting 4% of organizations globally, followed by Formbook and XMRig, each impacting 3% of organizations worldwide.
- ↑ Trickbot – Trickbot is a modular Botnet and Banking Trojan constantly being updated with new capabilities, features and distribution vectors. This enables Trickbot to be a flexible and customizable malware that can be distributed as part of multi-purpose campaigns.
- ↓ Formbook – Formbook is an infostealer that harvests credentials from various web browsers, collects screenshots, monitors and logs keystrokes, and can download and execute files according to its C&C orders.
- ↑ XMRig – XMRig is an open-source CPU mining software used for the mining process of the Monero cryptocurrency, and was first seen in-the-wild in May 2017.
Top exploited vulnerabilities
This month “Web Server Exposed Git Repository Information Disclosure” is the most commonly exploited vulnerability, impacting 44% of organizations globally, followed by “Command Injection Over HTTP” which affects 43% of organizations worldwide. “HTTP Headers Remote Code Execution” takes third place in the top exploited vulnerabilities list, with a global impact of 43% as well.
- ↔Web Server Exposed Git Repository Information Disclosure – An information disclosure vulnerability has been reported in Git Repository. Successful exploitation of this vulnerability could allow an unintentional disclosure of account information.
- ↑Command Injection Over HTTP – A command injection over HTTP vulnerability has been reported. A remote attacker can exploit this issue by sending a specially crafted request to the victim. Successful exploitation would allow an attacker to execute arbitrary code on the target machine.
- ↓ HTTP Headers Remote Code Execution (CVE-2020-10826,CVE-2020-10827,CVE-2020-10828,CVE-2020-13756) – HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine.
Top Mobile Malwares
This month xHelper remains in first place in the most prevalent Mobile malwares, followed by AlienBot and FluBot.
- xHelper – Amalicious application seen in the wild since March 2019, used for downloading other malicious apps and display advertisements. The application is capable of hiding itself from the user and can even reinstall itself in the event that it was uninstalled.
- AlienBot– AlienBot malware family is a Malware-as-a-Service (MaaS) for Android devices that allows a remote attacker, as a first step, to inject malicious code into legitimate financial applications. The attacker obtains access to victims’ accounts, and eventually completely controls their device.
- FluBot – FluBot is an Android botnet malware distributed via phishing SMS messages, most often impersonating logistics delivery brands. Once the user clicks the link inside the message, FluBot is installed and gets access to all sensitive information on the phone.
Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence. ThreatCloud provides real-time threat intelligence derived from hundreds of millions of sensors worldwide, over networks, endpoints and mobiles. The intelligence is enriched with AI-based engines and exclusive research data from Check Point Research, The Intelligence & Research Arm of Check Point Software Technologies.
The complete list of the top 10 malware families in September can be found on the Check Point blog.