Breaking News
Check Point reveals, Formbook Emerges as Leading Threat with Healthcare Sector Under Siege
2024-11-20Check Point Software Technologies Ltd. has released its Global Threat Index for October 2024. This month’s report highlights a concerning trend in the cyber security landscape: the rise of infostealers and the sophistication of attack methods employed by cyber criminals. In India, Healthcare remained the most impacted industry last month followed by Education/Research and Government/Military.
Last month researchers discovered an infection chain where fake CAPTCHA pages are being utilized to distribute Lumma Stealer malware, which has climbed to 4th place in the Monthly Top Malware rankings. This campaign is notable for its global reach, affecting multiple countries through two primary infection vectors: one involving cracked game download URLs and the other through phishing emails targeting GitHub users as an innovative new means of attack vector. The infection process misleads victims into executing a malicious script that has been copied to their clipboard, showcasing the increasing prevalence of infostealers as an effective means for cyber criminals to exfiltrate credentials and sensitive data from compromised systems.
Maya Horowitz, VP of Research at Check Point Software, commented on the current threat landscape, stating, "The rise of sophisticated infostealers underscores a growing reality. Cyber criminals are evolving their methods and leveraging innovative attack vectors. Organizations must go beyond traditional defenses, adopting proactive and adaptive security measures that anticipate emerging threats to counter these persistent challenges effectively."
Last month researchers discovered an infection chain where fake CAPTCHA pages are being utilized to distribute Lumma Stealer malware, which has climbed to 4th place in the Monthly Top Malware rankings. This campaign is notable for its global reach, affecting multiple countries through two primary infection vectors: one involving cracked game download URLs and the other through phishing emails targeting GitHub users as an innovative new means of attack vector. The infection process misleads victims into executing a malicious script that has been copied to their clipboard, showcasing the increasing prevalence of infostealers as an effective means for cyber criminals to exfiltrate credentials and sensitive data from compromised systems.
Maya Horowitz, VP of Research at Check Point Software, commented on the current threat landscape, stating, "The rise of sophisticated infostealers underscores a growing reality. Cyber criminals are evolving their methods and leveraging innovative attack vectors. Organizations must go beyond traditional defenses, adopting proactive and adaptive security measures that anticipate emerging threats to counter these persistent challenges effectively."
In the mobile malware sphere, the new version of Necro has emerged as a significant threat, ranking 2nd among mobile malwares. According to the report, Necro has infected various popular applications, including game mods available on Google Play, with a cumulative audience of over 11 million Android devices. The malware employs obfuscation techniques to evade detection and utilizes steganography, which is the practice of concealing information within another message or physical object to avoid detection, to conceal its payloads.Once activated, it can display ads in invisible windows, interact with them, and even subscribe victims to paid services, highlighting the evolving tactics used by attackers to monetize their operations.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.