The Latest Check Point News
Product and Solution Information, Press Releases, Announcements
July’s Most Wanted Malware: Attacks Targeting IoT and Networking Vulnerabilities on the Rise | |
Posted: Wed Aug 15, 2018 09:31:03 AM | |
Cyber attacks targeting IoT and network router vulnerabilities doubled since May 2018, says Check Point’s latest Global Threat Index SAN CARLOS, CA — Wed, 15 Aug 2018 Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber-security solutions globally, has published its latest Global Threat Index for July 2018, revealing a significant increase in exploits targeting three major IoT vulnerabilities. These attacks, which are linked to the propagation of IoT malware such as Mirai, IoTroop/Reaper and VPNFilter, have more than doubled since May 2018. During July 2018, three IoT vulnerabilities entered the Top 10 most exploited list: MVPower DVR router Remote Code Execution at #5; D_Link DSL-2750B router Remote Command Execution at #7; and Dasan GPON router Authentication Bypass at #10. Together, 45% of organizations across the world were impacted by attacks targeting these vulnerabilities, compared with 35% in June 2018 and 21% in May. These vulnerabilities all enable attackers to execute malicious code and gain remote control of the target devices. “Known vulnerabilities offer cyber-criminals an easy, relatively frictionless entry point into corporate networks, enabling them to propagate a wide range of attacks,” Maya Horowitz, Threat Intelligence Group Manager at Check Point commented. “IoT vulnerabilities in particular are often ‘the path of least resistance’, as once one device is compromised, it can be straightforward to infiltrate further connected devices. As such, it is vital that organizations apply patches to known vulnerabilities as and when they are made available to ensure that networks remain secure.” “In order to protect from both known and unknown vulnerabilities, it is critical that enterprises employ a multi-layered cybersecurity strategy that protects against both established malware families cyber-attacks and brand new threats,” Horowitz added. Coinhive remained the most prevalent malware, with impact on 19% of organization worldwide. Cryptoloot and Dorkbot were ranked in second and third place respectively, each with a global impact of 7%. July’s 2018’s Top 3 ‘Most Wanted’ Malware: *The arrows relate to the change in rank compared to the previous month.
Lokibot, an Android banking Trojan and info-stealer, was the most popular malware used to attack organizations’ mobile estates followed by the Lokibot and Guerilla. July’s Top 3 ‘Most Wanted’ mobile malware:
Check Point researchers also analysed the most exploited cyber vulnerabilities. In first was CVE-2017-7269, with a global impact of 47%. In second place was CVE-2017-5638 with a global impact of 42%, closely followed by OpenSSL TLS DTLS Heartbeat Information Disclosure, impacting 41% of organizations around the world. July’s Top 3 ‘Most Exploited’ vulnerabilities:
Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, more than 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily. |