Out of all recognised malware incidents globally, the percentage of ransomware attacks increased from 5.5% to 10.5% between July and December 2016 according to Check Point Software Technologies’ H2 2016 Global Threat Intelligence Trends report.
The report highlights the key tactics cyber-criminals are using to attack businesses, and gives a detailed overview of the cyber-threat landscape in the top malware categories: ransomware, banking and mobile. It is based on threat intelligence data drawn from Check Point’s ThreatCloud World Cyber Threat Map between July and December 2016.
Check Point researchers detected a number of key trends during the period:
· The Monopoly in the Ransomware Market – thousands of new ransomware variants were observed in 2016, and in recent months we witnessed a change in the ransomware landscape as it became more and more centralised, with a few significant malware families dominating the market and hitting organisations of all sizes.
· DDoS Attacks via IoT Devices – in August 2016, the infamous Mirai Botnet was discovered – a first of its kind- the Internet-of-Things (IoT) Botnet, which attacks vulnerable Internet-enabled digital such as video recorders (DVR) and surveillance cameras (CCTV). It turns them into bots, using the compromised devices to launch multiple high-volume Distributed Denial of Service (DDoS) attacks. It is now clear that vulnerable IoT devices are in use in almost every home, and massive DDoS attacks that are based on such will persist.
Top malware during H2 2016:
1. Conficker (14.5%) – Worm that allows remote operations and malware download. The infected machine is controlled by a botnet, which contacts its Command & Control server to receive instructions.
2. Sality (6.1%) – Virus that allows remote operations and downloads of additional malware to infected systems by its operator. Its main goal is to persist in a system and provide means for remote control and installing further malware.
3. Cutwail (4.6%) – Botnet mostly involved in sending spam e-mails, as well as some DDOS attacks. Once installed, the bots connect directly to the command and control server, and receive instructions about the emails they should send. After they are done with their task, the bots report back to the spammer exact statistics regarding their operation.
4. JBossjmx (4.5%) – Worm that targets systems having a vulnerable version of JBoss Application Server installed. The malware creates a malicious JSP page on vulnerable systems that executes arbitrary commands. Moreover, another Backdoor is created that accepts commands from a remote IRC server.
5. Locky (4.3%) – Ransomware, which started its distribution in February 2016, and spreads mainly via spam emails containing a downloader disguised as a Word or Zip file attachment, which then downloads and installs the malware that encrypts the user files.
Top ransomware during H2 2016:
The percentage of ransomware attacks out of all recognised attacks globally almost doubled in the second half of 2016, from 5.5% to 10.5%. The most common variants detected were:
1. Locky 41% – The third most common ransomware in H1, which increased dramatically in the second half of the year.
2. Cryptowall 27% – Ransomware that started as a Cryptolocker doppelgänger, but eventually surpassed it. After the takedown of Cryptolocker, Cryptowall became one of the most prominent ransomwares to date. Cryptowall is known for its use of AES encryption and for conducting its C&C communications over the Tor anonymous network. It is widely distributed via exploit kits, malvertising and phishing campaigns.
3. Cerber 23% – the world’s biggest ransomware-as-a-service scheme. Cerber is a franchise scheme, with its developer recruiting affiliates who spread the malware for a cut of the profits.
Top Mobile Malware during H2 2016:
1. Hummingbad 60% – Android malware first revealed by Check Point research team that establishes a persistent rootkit on the device, installs fraudulent applications and with slight modifications could enable additional malicious activity such as installing a key-logger, stealing credentials and bypassing encrypted email containers used by enterprises.
2. Triada 9% – Modular Backdoor for Android which grants superuser privileges to downloaded malware, and helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.
3. Ztorg 7% – Trojan that uses root privileges to download and install applications on the mobile phone without the user’s knowledge.
Top banking malware:
1. Zeus 33% – Trojan that targets Windows platforms and often used to steal banking information by man-in-the-browser keystroke logging and form grabbing.
2. Tinba 21% – Banking Trojan that steals the victim’s credentials using web-injects, activated as the users try to login to their bank website.
3. Ramnit 16% – Banking Trojan that steals banking credentials, FTP passwords, session cookies and personal data.
Doros Hadjizenonos, Country Manager of Check Point South Africa commented: “The report demonstrates the nature of today’s cyber environment, with ransomware attacks growing rapidly. This is simply because they work, and generate significant revenues for attackers. Organisations are struggling to effectively counteract the threat: many don’t have the right defenses in place, and may not have educated their staff on how to recognize the signs of a potential ransomware attack in incoming emails.”
“Additionally our data demonstrates that a small number of families are responsible for the majority of attacks, while thousands of other malware families are rarely seen,” continued Hajizenonos. “Most cyber threats are global and cross-regional, yet the APAC region, stands out as its Top Malware Families chart includes 5 families which do not appear in the other regional charts.”
The statistics in this report are based on data drawn from the ThreatCloud World Cyber Threat Map. Check Point’s ThreatCloud is the largest collaborative network to fight cybercrime, delivering the most up-to-date threat data and cyberattack trends from a global network of threat sensors. The ThreatCloud database identifies millions of malware types daily, and contains more than 250 million addresses analysed for bot discovery, as well as over 11 million malware signatures and 5.5 million infected websites.
Data journalism takes top prize in revamped awards
The entries to the 2018 Vodacom Journalist of the Year Awards were extraordinarily varied and of an excellent standard, with new categories introduced which are based on content as opposed to platforms. This year, the judges decided that two entries were equally worthy of the coveted Vodacom Journalist of the Year Award.
The first co-winning entry, in the new Data Journalism category, is a set of stories by Alastair Otter and Laura Grant of Media Hack which showed how Data Journalism is shaping the future. The second co-winning entrant is Bongani Fuzile of the Daily Dispatch for his articles in the investigative category on how migrant workers were being ripped off by pension deductions (full citations below).
Convenor of the judging panel Ryland Fisher says: “This year we modernised the 12 categories that journalists could enter their work in and the change was embraced by entrants. In a turbulent time for media, the 2018 entries once again proved that there are excellent South African journalists delivering praiseworthy work, and we commend them for finding new and innovative ways to cover the news.”
Takalani Netshitenzhe, Chief Officer for Corporate Affairs at the Vodacom Group, says: “Vodacom is proud of its 17-year association with these prestigious awards, which make an important contribution to our society through the recognition of journalistic excellence. I’d like to congratulate all of tonight’s winners and, as always, I’d like to pay tribute to our hardworking judges. Ryland Fisher, Mathatha Tsedu, Arthur Goldstuck, Collin Nxumalo, Elna Rossouw, Patricia McCracken, Megan Rusi, Mary Papayya, Albe Grobbelaar and Obed Zilwa: thank you for making these awards a continued success.”
Veteran journalist and media stalwart Ms Amina Frense is the winner of the 2018 Vodacom Journalist of the Year Lifetime Achiever Award. She has spent decades in mainstream media both locally and internationally. She is a former Managing Editor: News and Current Affairs at the SA Broadcasting Corporation. She has worked in many countries abroad as a producer and a foreign correspondent, has written two books and is also a founding member of SANEF where she still serves as a council member (full citation below).
The overall winners share the R100 000 main prize. National winners in the various categories are as follows, with each winner taking home R10 000:
The entries in this category were of an exceptionally high standard. One entrant stood out and became the unanimous winner. This journalist showed an exceptional skill for story-telling and for finding unexpected angles and unknown facts. For his stories about Musangwe’s fight for recognition, Age cheating in SA football, and Hansie Cronje revisited, the winner is Ronald Masinda, and the team of Gift Kganyago, Nceba Ntlanganiso and Charles Lombard from eSAT TV.
Cons exploit Telegram ICO
Kaspersky Lab researchers have uncovered dozens of highly convincing fake websites claiming to be investment sites for an initial coin offering (ICO) by the Telegram messaging service. Many of these websites appear to belong to the same group. In one case alone, tens of thousands of US dollars’ worth of cryptocurrency were stolen from victims believing they were investing in ‘Grams’, Telegram’s rumoured new currency. Telegram has not officially confirmed an ICO and has warned people about fraudulent investor sites.
In late 2017, stories started to circulate that the Telegram messaging service was launching an initial coin offering (ICO) to finance a blockchain platform based on its TON (Telegram Open Network) technology. Unverified technical documentation was posted online, but there appears to have been no confirmation from Telegram itself. The resulting confusion seems to have allowed fraudsters to capitalise on investor interest by creating fake sites and stealing vast sums of money.
Kaspersky Lab researchers have discovered dozens of such sites, possibly belonging to the same group, claiming to sell tokens for ‘Grams’ and inviting investors to pay with cryptocurrencies including Bitcoin, Ethereum, lice litecoin, dash and Bitcoin dash. A record of transactions on one site revealed that the scammers were able to steal at least $35,000 US dollars’ worth of Ethereum from investors.
The researchers found that some of the websites were so convincing that even after Telegram and others began to issue warnings, they were still able to recruit potential investors. Most use a secure connection, require registration and generate a unique online wallet for each new victim, making it harder to track the money.
Judging by the content of the fake websites, it appears they may have common ownership. For example, several have the exactly the same ‘Our Team’ section.
“ICOs are a fairly risky investment and many people don’t yet fully understand how they work, so it is not surprising that high quality fake websites, with seemingly reassuring features such as a secure connection and registration are successful at luring people in. People wishing to invest in an ICO would do well to check with the company behind it and make sure they know exactly who they are giving their money to, or they may never see it again,” said Nadezhda Demidova, Lead Web-Content Analyst, Kaspersky Lab.
Kaspersky Lab offers the following advice for users considering investing in an ICO:
- Check for warning signs: for example, some of the fake Telegram ICO websites had the same wrong image next to the name of Telegram’s Chief Product Officer.
- Do your homework: always check with the brand’s official site to verify the legitimacy of the investment site and, if necessary contact the company’s ICO teams before investing any money or currency.
- Use reliable security solutions such as Kaspersky Internet Security and Kaspersky Internet Security for Android, which will warn you if you try to visit fake internet pages.