Getty Pictures
US and Australian cyber security authorities have jointly exposed the leading malware strains that focused organisations in 2021, with two of them in operation for lengthier than a 10 years.
The US’ CISA and Australia’s ACSC said the most pervasive strains bundled distant access trojans (RATs), banking trojans, details stealers, and ransomware.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
Qakbot and Ursnif are two of the top rated strains that have been in operation for the longest. Both authorities said this is due to the fact they have been underneath lively improvement, with operators constantly including new capabilities and approaches to evade detection.
Most strains in the list have been in operation for extended than 5 decades and their respective codebases progressed in excess of that time into different versions.
The most prolific of the bunch, the authorities claimed, were stealers of fiscal or personal facts, and ransomware.
The leading 11 malware strains of 2021
Malware pressure
Form of malware
Lively considering the fact that
Supply technique
Agent Tesla
Facts stealer, RAT
2014
Phishing (attachments)
AZORult
Information and facts stealer
2016
Phishing, exploit kits, contaminated web sites
Formbook
Information stealer
2016
Phishing (attachments)
Ursnif
Banking trojan
2007
Phishing (attachments)
LokiBot
Trojan, information and facts stealer
2015
Phishing (attachments)
MOUSEISLAND
Macro downloader
2019
Phishing (attachments)
NanoCore
RAT
2013
Phishing (attachments), cloud storage
Qakbot
Multi-use trojan
2007
Phishing (attachments, hyperlinks, embedded illustrations or photos)
Remcos
RAT
2016
Phishing (attachments)
Trickbot
Trojan
2016
Phishing (hyperlink)
GootLoader
Malware loader
2020
Compromised internet sites
Overview of 2021’s most pervasive malware strains
Agent Tesla
About given that 2014, the effective device can be utilized to steal info from email consumers, web browsers, and file transfer protocol (FTP) servers, as properly as capture screenshots and online video from a desktop ecosystem.
AZORult
An details stealer that can be identified accessible on underground hacking forums, AZORult is below frequent advancement, the authorities explained, and its abilities consist of stealing browser data, user qualifications, and cryptocurrency information and facts.
Formbook
Formbook is a malware pressure that is constantly improved, according to the most current threats revealed in the typical vulnerabilities and exposures (CVS) listing, aiming to infect devices that have been remaining unpatched to the most current threats.
It is capable of keylogging and capturing passwords, and has been made use of in a assortment of attacks in the earlier year these as these precisely focusing on corporate email inboxes.
Ursnif
The banking Trojan Ursnif has been all over given that 2007, tying with Qakbot as the longest-jogging malware strain on the list. It has evolved to undertake a persistence system, which means that it can are living on a process right after it has rebooted, and can also stay clear of sandboxes and digital devices, the authorities reported.
Lokibot
This Trojan is built to a variety of forms of steal delicate data, these as person credentials and individuals to access cryptocurrency wallets. In circulation due to the fact 2015, it experienced a notable variant in 2020 that disguised itself as a launcher for the well known video video game Fortnite.
MOUSEISLAND
This is just one that’s likely to fall off the record next year now Microsoft has blocked VBA macros by default, but the macro downloader has been prolific given that 2019 and is assumed to be employed in the original levels of some ransomware attacks.
NanoCore
The RAT NanoCore can allow for attackers to spy on victims as a result of webcams whilst also doubling as a stealer of passwords and e-mails. It can be a single of the oldest strains on the checklist commencing operation in 2013.
Qakbot
Qakbot was originally a banking Trojan, but due to the fact its 2007 inception, its capabilities have progressed to consist of information exfiltration and the capacity to deliver other malicious payloads. It is modular in character, permitting attackers to tailor its abilities to their needs.
Remcos
A lexical mix that’s limited for Distant Manage and Surveillance, Remcos is introduced as a authentic penetration screening instrument but has been abused by cyber attackers, significantly like Cobalt Strike and far more not too long ago Brute Ratel C4. It can steal private facts and login credentials, and was used greatly in COVID-19-themed phishing campaigns.
TrickBot
This Trojan is imagined to be operated and maintained by a innovative threat group, and has been used in the previous as the original exploit to deploy Conti and Ryuk ransomware. It has also been used towards health care organisations to steal info and disrupt solutions.
Gootloader
All around considering that 2020 and now a multi-payload malware system, Gootloader has developed in the latest decades from a uncomplicated malware loader, normally associated with GootKit malware. It typically gives attackers with the initial entry exploit, typically by way of search engine poisoning.
What mitigations can your business enterprise deploy?
The authorities advise examining and applying all the necessary mitigations to protect towards these malware strains – the kinds targeting organizations the most.
The complete record of directions can be discovered in the comprehensive joint advisory issued by CISA and ACSC this 7 days, but suggestions involve updating computer software in opposition to acknowledged vulnerabilities, imposing the use of multi-factor authentication (MFA) across the organisations, check use of distant desktop protocol and retain offline backups of knowledge.
Some elements of this posting are sourced from:
www.itpro.co.uk