Story image

Hancitor climbs its way to the top of 'world's most wanted' malware families

14 Mar 17

The Hancitor/Chanitor malware has rapidly climbed to be one of the top five ‘world’s most wanted’ malware families for the first time, according to Check Point’s February Global Threat Impact Index.

Hancitor, also known as Chanitor, installs malicious payloads including ransomware and banking trojans on devices through a macro-enabled Office document.

Those documents are housed in phishing emails disguised to look like ‘important’ messages like voicemails, invoices or faxes.

“The rapid growth in the use of some malware variants grew during February, highlighting the challenges faced by IT departments worldwide. It is imperative organizations are sufficiently equipped to deal with the ever-increasing number of threats by adopting advanced security systems across their entire business network,” explains Nathan Shuchami, Check Point’s VP of emerging products.

The Global Threat Impact Index also named Kelihos, HackerDefender and Cryptowall as the top three malware.

Kelihos is a botnet used in bitcoin theft. It is responsible for 12% of attacks on organisations across the globe. It has evolved from what Check Point calls a ‘pump and dump’ spam campaign into a botnet for hire. It is now one of the most prominent spam distributors in the world with more than 300,000 infected machines capable of sending 200,000 emails per day.

HackerDefender, a user-mode rootkit for Windows, hit 5% or organisations. It is able to hide files, processes and registry keys. It can also use a backdoor and port redirector that can obscure its actions from traditional detection.

Cryptowall hit 4.5% of organisations. It started life as a Cryptolocker doppelganger, but then surpassed its use. Cryptowall is now one of the most prominent ransomwares to date. It uses AES encryption for conducting command and control communications over the Tor network. It is distributed through exploit kids, malvertising and phishing.

Hiddad, Hummingbird and Triada took out the top spots in mobile malware.

Hiddad is an Android malware that repackages genuine apps then launches them on a third party store. It shows ads and it is also able to access security details on the OS so attackers can get sensitive user data.

Hummingbad is an Android malware that installs a persistent rootkit on the device, installs fake applications and could also be used to install keyloggers, steal credentials or bypass encrypted email containers used by enterprises.

Triada is a modular backdoor for Android. It grants super user privileges to download malware and become embedded in system processes. It can also spoof URLs loaded in the browser.

“Overall, the top 3 malware families revealed that hackers were using a wide range of attack vectors and tactics to target businesses. These threats impact all steps of the infection chain, including spam emails which are spread by botnets, and contain downloaders that eventually place ransomware or a Trojan on the victim’s machine,” Check Point concludes.

How blockchain will impact NZ’s economy
Distributed ledgers and blockchain are anticipated to provide a positive uplift to New Zealand’s economy.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.
Human value must be put back in marketing - report
“Digital is now so widely adopted that its novelty has worn off. In their attempt to declutter, people are being more selective about which products and services they incorporate into their daily lives."
Wine firm uses AR to tell its story right on the bottle
A Central Otago wine company is using augmented reality (AR) and a ‘digital first’ strategy to change the way it builds its brand and engages with customers.
DigiCert conquers Google's distrust of Symantec certs
“This could have been an extremely disruptive event to online commerce," comments DigiCert CEO John Merrill. 
Protecting organisations against internal fraud
Most companies tend to take a basic approach that focuses on numbers and compliance, without much room for grey areas or negotiation.
Telesmart to deliver Cloud Calling for Microsoft Teams
The integration will allow Telesmart’s Cloud Calling for Microsoft Teams to natively enable external voice connectivity from within Teams collaborative workflow environment.
Jade Software & Ambit take chatbots to next level of AI
“Conversation Agents present a huge opportunity to increase customer and employee engagement in a cost-effective manner."