Hancitor climbs its way to the top of 'world's most wanted' malware families
FYI, this story is more than a year old
The Hancitor/Chanitor malware has rapidly climbed to be one of the top five ‘world’s most wanted’ malware families for the first time, according to Check Point’s February Global Threat Impact Index.
Hancitor, also known as Chanitor, installs malicious payloads including ransomware and banking trojans on devices through a macro-enabled Office document.
Those documents are housed in phishing emails disguised to look like ‘important’ messages like voicemails, invoices or faxes.
“The rapid growth in the use of some malware variants grew during February, highlighting the challenges faced by IT departments worldwide. It is imperative organizations are sufficiently equipped to deal with the ever-increasing number of threats by adopting advanced security systems across their entire business network,” explains Nathan Shuchami, Check Point’s VP of emerging products.
The Global Threat Impact Index also named Kelihos, HackerDefender and Cryptowall as the top three malware.
Kelihos is a botnet used in bitcoin theft. It is responsible for 12% of attacks on organisations across the globe. It has evolved from what Check Point calls a ‘pump and dump’ spam campaign into a botnet for hire. It is now one of the most prominent spam distributors in the world with more than 300,000 infected machines capable of sending 200,000 emails per day.
HackerDefender, a user-mode rootkit for Windows, hit 5% or organisations. It is able to hide files, processes and registry keys. It can also use a backdoor and port redirector that can obscure its actions from traditional detection.
Cryptowall hit 4.5% of organisations. It started life as a Cryptolocker doppelganger, but then surpassed its use. Cryptowall is now one of the most prominent ransomwares to date. It uses AES encryption for conducting command and control communications over the Tor network. It is distributed through exploit kids, malvertising and phishing.
Hiddad, Hummingbird and Triada took out the top spots in mobile malware.
Hiddad is an Android malware that repackages genuine apps then launches them on a third party store. It shows ads and it is also able to access security details on the OS so attackers can get sensitive user data.
Hummingbad is an Android malware that installs a persistent rootkit on the device, installs fake applications and could also be used to install keyloggers, steal credentials or bypass encrypted email containers used by enterprises.
Triada is a modular backdoor for Android. It grants super user privileges to download malware and become embedded in system processes. It can also spoof URLs loaded in the browser.
“Overall, the top 3 malware families revealed that hackers were using a wide range of attack vectors and tactics to target businesses. These threats impact all steps of the infection chain, including spam emails which are spread by botnets, and contain downloaders that eventually place ransomware or a Trojan on the victim’s machine,” Check Point concludes.