Articles Check Point Detects Ransomware Spike on Healthcare Facilities Around...

Check Point Detects Ransomware Spike on Healthcare Facilities Around the World


Trickbot and Emotet Trojans, Leading the Global Threat Index, Used to Spread Ransomware

The Check Point Research team published the Global Threat Index report with the most active threats in October 2020. Researchers report that the Trojans Trickbot and Emotet continue to top the top malware rankings in October. They have caused a sharp increase in the number of ransomware attacks on hospitals and medical facilities around the world.

Healthcare became the top target for ransomware in the United States in October, according to Check Point , with attacks increasing 71% since September 2020. Similarly, ransomware attacks on healthcare organizations and hospitals in October increased by 36% in Europe, the Middle East and Africa and 33% in Asia-Pacific.

Attackers also frequently attacked Russian medical organizations. For six months, the number of attacks on Russian medical organizations accounted for 3% of all attacks on medical organizations around the world.

In September, researchers also reported that the Russian-speaking group OldGremlin was associated with at least nine ransomware attacks this year on medical laboratories, banks, manufacturers and software developers in Russia. A large Russian medical company affected by hackers paid a ransom of $ 50,000 in cryptocurrency.

The world’s most active malware in October 2020:

Emotet remains the most prevalent malware in October, affecting 12% of organizations worldwide. He was followed by Trickbot and Hiddad , which attacked 4% of organizations each.

  1. Emotet is an advanced self-propagating modular Trojan. Emotet was once a common banking Trojan and has recently been used to further spread malware and campaigns. The new functionality allows you to send phishing emails containing malicious attachments or links.
  2. Trickbot is one of the dominant banking Trojans, which is constantly being supplemented with new capabilities, functions and distribution vectors. It is flexible and customizable malware that can be distributed through multi-targeting campaigns.
  3. Hiddad – A modular backdoor for Android that grants root privileges to downloaded malware and helps inject it into system processes. It can access key security details built into the OS, allowing it to retrieve sensitive user data.

The most common vulnerabilities in October 2020:

  1. Remote code execution MVPower DVR. A remote code execution vulnerability exists in MVPower DVR devices. An attacker could exploit this vulnerability to execute arbitrary code on an affected router using a specially crafted request.
  2. Dasan GPON Router Authentication Bypass (CVE-2018-10561) is an authentication bypass vulnerability that exists in Dasan GPON routers. Successful exploitation of this vulnerability could allow remote attackers to gain confidential information and gain unauthorized access to an affected system.
  3. Remote Code Execution in HTTP Headers ( CVE -2020-13756) – HTTP headers allow the client and server to pass additional information using an HTTP request. An attacker could use a vulnerable HTTP header to run arbitrary code on the victim’s device.

The most active mobile threats in October 2020:

This month, Hiddad became the most popular malware for mobile devices. It is followed by xHelper and Lotoor.

  1. Hiddad – A modular backdoor for Android that grants root privileges to downloaded malware and helps inject it into system processes. It can access key security details built into the OS, allowing it to retrieve sensitive user data.
  2. xHelper is a malicious Android application that has been active since March 2019 and is used to download other malicious applications and display ads. The application is capable of hiding from user and mobile antivirus programs and reinstalling if the user uninstalls it.
  3. Lotoor – the program uses vulnerabilities in the Android operating system to gain privileged root access on jailbroken mobile devices.

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

Why Is It Important To Have Intrusion Detection And Prevention ?

This article describes why detection and prevention of burglaries...

The risk is real: attacks on OT infrastructure

Previously, many believed that attacks on an isolated OT...

Gitpaste-12: Linux bot armed with a dozen exploits

Researchers at Juniper Networks have discovered a Linux scripting...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It...

Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !

Network vulnerability assessment analyzes a variety of network issues,...

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity,...

You might also likeRELATED
Recommended to you