• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
decade old malware strains top annual list of most pervasive business

Decade-old malware strains top annual list of most pervasive business exploits

You are here: Home / General Cyber Security News / Decade-old malware strains top annual list of most pervasive business exploits
August 5, 2022

Getty Pictures

US and Australian cyber security authorities have jointly exposed the leading malware strains that focused organisations in 2021, with two of them in operation for lengthier than a 10 years.

The US’ CISA and Australia’s ACSC said the most pervasive strains bundled distant access trojans (RATs), banking trojans, details stealers, and ransomware.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Qakbot and Ursnif are two of the top rated strains that have been in operation for the longest. Both authorities said this is due to the fact they have been underneath lively improvement, with operators constantly including new capabilities and approaches to evade detection.

Most strains in the list have been in operation for extended than 5 decades and their respective codebases progressed in excess of that time into different versions.

The most prolific of the bunch, the authorities claimed, were stealers of fiscal or personal facts, and ransomware.

The leading 11 malware strains of 2021

Malware pressure

Form of malware

Lively considering the fact that

Supply technique

Agent Tesla

Facts stealer, RAT

2014

Phishing (attachments)

AZORult

Information and facts stealer

2016

Phishing, exploit kits, contaminated web sites

Formbook

Information stealer

2016

Phishing (attachments)

Ursnif

Banking trojan

2007

Phishing (attachments)

LokiBot

Trojan, information and facts stealer

2015

Phishing (attachments)

MOUSEISLAND

Macro downloader

2019

Phishing (attachments)

NanoCore

RAT

2013

Phishing (attachments), cloud storage

Qakbot

Multi-use trojan

2007

Phishing (attachments, hyperlinks, embedded illustrations or photos)

Remcos

RAT

2016

Phishing (attachments)

Trickbot

Trojan

2016

Phishing (hyperlink)

GootLoader

Malware loader

2020

Compromised internet sites

Overview of 2021’s most pervasive malware strains

Agent Tesla

About given that 2014, the effective device can be utilized to steal info from email consumers, web browsers, and file transfer protocol (FTP) servers, as properly as capture screenshots and online video from a desktop ecosystem. 

AZORult

An details stealer that can be identified accessible on underground hacking forums, AZORult is below frequent advancement, the authorities explained, and its abilities consist of stealing browser data, user qualifications, and cryptocurrency information and facts.

Formbook

Formbook is a malware pressure that is constantly improved, according to the most current threats revealed in the typical vulnerabilities and exposures (CVS) listing, aiming to infect devices that have been remaining unpatched to the most current threats.

It is capable of keylogging and capturing passwords, and has been made use of in a assortment of attacks in the earlier year these as these precisely focusing on corporate email inboxes.

Ursnif

The banking Trojan Ursnif has been all over given that 2007, tying with Qakbot as the longest-jogging malware strain on the list. It has evolved to undertake a persistence system, which means that it can are living on a process right after it has rebooted, and can also stay clear of sandboxes and digital devices, the authorities reported.

Lokibot

This Trojan is built to a variety of forms of steal delicate data, these as person credentials and individuals to access cryptocurrency wallets. In circulation due to the fact 2015, it experienced a notable variant in 2020 that disguised itself as a launcher for the well known video video game Fortnite.

MOUSEISLAND

This is just one that’s likely to fall off the record next year now Microsoft has blocked VBA macros by default, but the macro downloader has been prolific given that 2019 and is assumed to be employed in the original levels of some ransomware attacks.

NanoCore

The RAT NanoCore can allow for attackers to spy on victims as a result of webcams whilst also doubling as a stealer of passwords and e-mails. It can be a single of the oldest strains on the checklist commencing operation in 2013.

Qakbot

Qakbot was originally a banking Trojan, but due to the fact its 2007 inception, its capabilities have progressed to consist of information exfiltration and the capacity to deliver other malicious payloads. It is modular in character, permitting attackers to tailor its abilities to their needs.

Remcos

A lexical mix that’s limited for Distant Manage and Surveillance, Remcos is introduced as a authentic penetration screening instrument but has been abused by cyber attackers, significantly like Cobalt Strike and far more not too long ago Brute Ratel C4. It can steal private facts and login credentials, and was used greatly in COVID-19-themed phishing campaigns.

TrickBot

This Trojan is imagined to be operated and maintained by a innovative threat group, and has been used in the previous as the original exploit to deploy Conti and Ryuk ransomware. It has also been used towards health care organisations to steal info and disrupt solutions.

Gootloader

All around considering that 2020 and now a multi-payload malware system, Gootloader has developed in the latest decades from a uncomplicated malware loader, normally associated with GootKit malware. It typically gives attackers with the initial entry exploit, typically by way of search engine poisoning.

What mitigations can your business enterprise deploy?

The authorities advise examining and applying all the necessary mitigations to protect towards these malware strains – the kinds targeting organizations the most.

The complete record of directions can be discovered in the comprehensive joint advisory issued by CISA and ACSC this 7 days, but suggestions involve updating computer software in opposition to acknowledged vulnerabilities, imposing the use of multi-factor authentication (MFA) across the organisations, check use of distant desktop protocol and retain offline backups of knowledge.


Some elements of this posting are sourced from:
www.itpro.co.uk

Previous Post: «cyber attacks rain on taiwan during pelosi visit Cyber attacks rain on Taiwan during Pelosi visit
Next Post: Over 60% of Organizations Expose SSH to the Internet Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
  • Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
  • New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
  • Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability
  • MongoDB CISO: Don’t be afraid to simplify important issues for executives
  • Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam
  • Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
  • Lazarus blamed for 3CX attack as byte-to-byte code match discovered
  • New Cylance Ransomware strain emerges, experts speculate about its notorious members
  • 3CX Supply Chain Attack — Here’s What We Know So Far

Copyright © TheCyberSecurity.News, All Rights Reserved.