checkAd

    February 2020’s Most Wanted Malware  145  0 Kommentare Increase in Exploits Spreading the Mirai Botnet to IoT Devices - Seite 3

    1.   xHelper- A malicious application seen in the wild since March 2019, used for downloading other malicious apps and display advertisement. The application is capable of hiding itself from the user and reinstall itself in case it was uninstalled.
    2.   Hiddad - Hiddad is an Android malware which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS.
    3.   Guerrilla- Guerrilla is an Android Trojan found embedded in multiple legitimate apps and is capable of downloading additional malicious payloads. Guerrilla generates fraudulent ad revenue for the app developers. 

    Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 2.5 billion websites and 500 million files daily, and identifies more than 250 million malware activities every day.

    The complete list of the top 10 malware families in February can be found on the Check Point Blog.  

    Follow Check Point Research via:
    Blog: https://research.checkpoint.com/
    Twitter: https://twitter.com/_cpresearch_

    About Check Point Research
    Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

    About Check Point Software Technologies Ltd.
    Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

    Seite 3 von 4



    globenewswire
    0 Follower
    Autor folgen

    Verfasst von globenewswire
    February 2020’s Most Wanted Malware Increase in Exploits Spreading the Mirai Botnet to IoT Devices - Seite 3 Check Point Research also reports that Emotet has been spreading via new SMS phishing CampaignSAN CARLOS, Calif., March 11, 2020 (GLOBE NEWSWIRE) - Check Point Research, the Threat Intelligence arm of Check Point Software Technologies Ltd. …