sb-au logo
Story image

Hancitor climbs its way to the top of 'world's most wanted' malware families

14 Mar 2017

The Hancitor/Chanitor malware has rapidly climbed to be one of the top five ‘world’s most wanted’ malware families for the first time, according to Check Point’s February Global Threat Impact Index.

Hancitor, also known as Chanitor, installs malicious payloads including ransomware and banking trojans on devices through a macro-enabled Office document.

Those documents are housed in phishing emails disguised to look like ‘important’ messages like voicemails, invoices or faxes.

“The rapid growth in the use of some malware variants grew during February, highlighting the challenges faced by IT departments worldwide. It is imperative organizations are sufficiently equipped to deal with the ever-increasing number of threats by adopting advanced security systems across their entire business network,” explains Nathan Shuchami, Check Point’s VP of emerging products.

The Global Threat Impact Index also named Kelihos, HackerDefender and Cryptowall as the top three malware.

Kelihos is a botnet used in bitcoin theft. It is responsible for 12% of attacks on organisations across the globe. It has evolved from what Check Point calls a ‘pump and dump’ spam campaign into a botnet for hire. It is now one of the most prominent spam distributors in the world with more than 300,000 infected machines capable of sending 200,000 emails per day.

HackerDefender, a user-mode rootkit for Windows, hit 5% or organisations. It is able to hide files, processes and registry keys. It can also use a backdoor and port redirector that can obscure its actions from traditional detection.

Cryptowall hit 4.5% of organisations. It started life as a Cryptolocker doppelganger, but then surpassed its use. Cryptowall is now one of the most prominent ransomwares to date. It uses AES encryption for conducting command and control communications over the Tor network. It is distributed through exploit kids, malvertising and phishing.

Hiddad, Hummingbird and Triada took out the top spots in mobile malware.

Hiddad is an Android malware that repackages genuine apps then launches them on a third party store. It shows ads and it is also able to access security details on the OS so attackers can get sensitive user data.

Hummingbad is an Android malware that installs a persistent rootkit on the device, installs fake applications and could also be used to install keyloggers, steal credentials or bypass encrypted email containers used by enterprises.

Triada is a modular backdoor for Android. It grants super user privileges to download malware and become embedded in system processes. It can also spoof URLs loaded in the browser.

“Overall, the top 3 malware families revealed that hackers were using a wide range of attack vectors and tactics to target businesses. These threats impact all steps of the infection chain, including spam emails which are spread by botnets, and contain downloaders that eventually place ransomware or a Trojan on the victim’s machine,” Check Point concludes.

Story image
VPNs and zero trust security don't mix - Zscaler report
93% of organisations surveyed have deployed some kind of VPN, yet 94% know that VPNs are a popular target for cybercriminals.More
Story image
CyberCX and AustCyber launch platform to boost Aus cybersecurity industry
"Australia has some of the best cyber talent in the world, but we need to expand the supply of talent coming through the pipeline if we are to have a vibrant and globally competitive economy."More
Story image
Creating a strong culture of security within organisations
CISOs worldwide are inherently aware of how significant investment in cybersecurity strategies and technologies can bolster an organisation’s protection against cyberattacks. However, many overlook the importance of culture when it comes to cybersecurity.More
Story image
2021 global salary guide: Cybersecurity, data analytics professionals in high demand
"Technology has been one of the most successful sectors throughout 2020 and that looks set to continue for the foreseeable future.”More
Story image
Ingram Micro advances dedicated security practice with new hire
Lazarus has strong advice for all resellers. He says, “If you’re not talking security as part of every customer engagement, you're not having the right conversation.”More
Story image
Palo Alto Networks turns attention to supporting remote workforces
"We’re working with more organisations to pivot their security architecture and move towards a cloud-delivered security model that can safely connect any user, to any application, from anywhere.”More