Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

Press Releases

June 22, 2017 |

Fireball and WannaCry Impact More Than 1 in 4 Organizations Globally, According to Check Point’s Latest Threat Index

All of the top three malware families that impacted networks globally in May were previously unseen attacks, says Check Point

Check Point†Software Technologies Ltd. has revealed that more than one in four organizations globally was affected by the Fireball or WannaCry attacks during May, in the company’s latest Global Threat Impact Index.

Two of top three malware†families that impacted networks globally were zero-day, previously unseen attacks.††Fireball†impacted one in five organizations worldwide, with second-placed RoughTed impacting 16% and third-placed WannaCry affecting nearly 8% of organizations globally. †These two malware variants, Fireball and WannaCry, rapidly spread worldwide throughout the month of May.

The most prevalent malware highlight the wide range of attack vectors and targets cyber-criminals are utilizing, impacting all stages of the infection chain. †Fireball takes over target browsers and turns them into zombies, which it can then use for a wide range of actions including dropping additional malware or stealing valuable credentials. By contrast, RoughTed is a large-scale malvertising campaign, and WannaCry takes advantage of a Windows SMB exploit called EternalBlue in order to propagate within and between networks. WannaCry was particularly high profile, bringing down a myriad of networks worldwide.

In addition to the top three, there were also other new variants seen within the top ten of the index including Jaff (8th), another form of ransomware, demonstrating how profitable this particular attack vector is proving for malicious parties.

May 2017’s Top 3 ‘Most Wanted’ Malware:

1.††Fireball†– Browser hijacker that can be turned into a full-functioning malware downloader. It is capable of executing any code on the victim machines, resulting in a wide range of actions from stealing credentials to dropping additional malware.
2.††RoughTed†– Large-scale malvertising used to deliver various malicious websites and payloads such as scams, adware, exploit kits and ransomware. It can be used to attack any type of platform and operating system and utilizes ad-blocker bypassing and fingerprinting in order to make sure it delivers the most relevant attack.
3.††WannaCry –†Ransomware that was spread in a large-scale attack in May 2017 utilizing a Windows SMB exploit called EternalBlue in order to propagate within and between networks.

In mobile malware, Hummingbad returned to the top of the list and was closely followed by Hiddad and Triada:

Top 3 ‘Most Wanted’ mobile malware:
1. †Hummingbad†– Android malware that establishes a persistent rootkit on the device, installs fraudulent applications, and with slight modifications could enable additional malicious activity such as installing a key-logger, stealing credentials and bypassing encrypted email containers used by enterprises.
2.††Hiddad†– Android malware which repackages legitimate apps and then released them to a third-party store. Its main function is displaying ads, however, it is also able to gain access to key security details built into the OS, allowing an attacker to obtain sensitive user data.
3.††Triada†– Modular Backdoor for Android which grants superuser privileges to downloaded malware, as helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.

“To see so many brand-new malware families among the world’s most prevalent cyberattacks this month underlines just how innovative cybercriminals can be, and shows how dangerous it is for organizations to become complacent,” commented Maya Horowitz, Threat Intelligence, Group Manager at Check Point. “Organizations need to remember that the financial impact from cyber- attacks goes way beyond the initial incident. Restoring key services and repairing reputational damage can be a very long and expensive process.† As such, organizations in every industry sector need a multi-layered approach to their cybersecurity. †Our SandBlast Zero-Day Protection and Mobile Threat Prevention, for example, protect against the widest range of continually evolving attack types, and also protect against zero-day malware variants.”

Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, more than 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily.

* The complete list of the top 10 malware families in May can be found on the Check Point Blog.

Check Point’s Threat Prevention Resources are available here.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.


Editor’s Choice

Broadcom-VMware Shakeout: How the Channel Has Been Affected By the Big Industry Acquisition

April 11, 2024 |

Industry experts weigh in on the “messy breakup” that MSPs were left with after Broadcom’s acquisition of VMWare.

Selling Cybersecurity: How MSPs Can Become Crucial Partners in Managing Risk

March 27, 2024 | David Powell

MSPs should try to bring an end customer into the cybersecurity fold. Here are some ways to help drive that.

3 Questions with Ingram Micro’s Sanjib Sahoo on Integrating AI into Managed Services

March 25, 2024 |

Ingram Micro’s EVP and chief digital officer shares some insights on how MSPs can effectively integrate artificial intelligence into their business operations.


Related News

Growing the MSP

Explore ChannelPro

Events

Reach Our Audience