![]() ![]() Recently, Hawkeye gained the ability to take screenshots and spread via USB in addition to its original functions of stealing email and web browser passwords and key logging. Hawkeye is an Info Stealer malware, designed primarily to steal users' credentials from infected Windows platforms and deliver them to a C-C server. Hawkeye, 0.34% of New Zealand cyber incident cases impacted Groooboor is a backdoor Trojan, which can download various malware to the user's computer as crypto miners, ransomware and other malicious software. Groooboor, 0.34% percentage of New Zealand cyber incident cases impacted By 2019 it included a C-C address update mechanism through public BitCoin lists, an integral browser stealer capability and a router exploiter. Known since 2011, Glupteba is a backdoor that gradually matured into a botnet. Glupteba, 0.34% of New Zealand cyber incident cases impacted The malware is designed to give malicious users remote control over an infected computer. GhOst, 0.34% of New Zealand cyber incident cases impactedī is a Backdoor type malicious program that targets the Windows platform. FormBook harvests credentials from various web browsers, collects screenshots, monitors and logs keystrokes, and can download and execute files according to orders from its C-C. It is marketed as MaaS in underground hacking forums for its strong evasion techniques and relatively low price. As a result, the attackers can gather sensitive information about the victim.įormbook, 0.34% of New Zealand cyber incident cases impactedįirst detected in 2016, FormBook is an InfoStealer targeting Windows OS. The screenshots are exfiltrated to EVILNUM's control and command server. Its main functionality is the ability to capture screenshots of the desktop and active windows of the user. The EVILNUM malware was first uncovered in 2017, and its toolkit was primarily used to infect carefully selected targets in the fintech sector. ![]() It quickly made headlines due to large-scale attacks, which included a massive DDoS attack that knocked the entire country of Liberia offline and a DDoS attack against the internet firm Dyn, which provides a significant portion of the US internet infrastructure.Įvilnum, 0.34% of New Zealand cyber incident cases impacted The Mirai botnet first appeared in September 2016. Its operators use the botnet to conduct massive Distributed Denial of Service (DDoS) attacks. ![]() Mirai is a well-known Internet-of-Things (IoT) malware that tracks vulnerable IoT devices, such as web cameras, modems and routers, and turns them into bots. Mirai, 0.34% of New Zealand cyber incident cases impacted Remcos distributes itself through malicious Microsoft Office documents attached to SPAM emails, and is designed to bypass Microsoft Windows' UAC security and execute malware with high-level privileges. Remcos is a RAT that first appeared in the wild in 2016. Remcos, 1.35% of New Zealand cyber incident cases impacted Once a machine is infected, the Trickbot gang, the threat actors behind this malware, utilise this wide array of modules not only to steal banking credentials from the target PC but also for lateral movement and reconnaissance on the targeted organisation itself prior to delivering a company-wide targeted ransomware attack. Trickbot sends information about the infected system and can also download and execute arbitrary modules from a large array of available modules: from a VNC module for remote control to an SMB module for spreading within a compromised network. Trickbot is a modular Botnet and Banking Trojan that targets the Windows platform, primarily delivered via spam campaigns or other malware families such as Emotet. Trickbot, 2.36% of New Zealand cyber incident cases impacted by this specific malware Most concerningly, Trickbot impacted a greater number of cases in New Zealand than Formbook in the previous month, where the latter impacted 1.36% of New Zealand cyber incident cases. In December, Trickbot claimed the top spot as most prevalent malware, impacting 2.36% of New Zealand cyber incidents, overtaking Formbook, which was first in November 2021. ![]() Top 10 Malware in New Zealand for December: Trickbot has claimed the top spot as most prevalent malware in New Zealand in December, according to Check Point Research.Ĭheck Point Research, the Threat Intelligence arm of Check Point Software, has published its latest Global Threat Index for December 2021, identifying the top 10 malware affecting New Zealanders in December 2021. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |