SHARE

top-malware-listShort Bytes: Check Point has released the list of the most dangerous malware that are most prevalent in the world. This list was topped by Conficker, a worm that spreads from system to system and downloads malware. For the first time, ransomware found a place in the top 3. In the mobile arena, for the sixth consecutive month, HummingBad remained the most wanted malware.

The Check Point Research Team has released its latest list of the top 10 most wanted malware. The team has indicated that ransomware attacks have continued to rise in the recent months. Also, for the first time since they launched the Threat Index, ransomware has found a place in the top three.

According to September’s data, Locky ransomware, which originated in February 2016, was the 3rd most dangerous malware, accounting for 6 percent of all recognized malware attacks all around the world. Talking about the total share of ransomware attacks, it grew by 13 percent.

There was also a rise in the number of active malware families, with 3 new names entering the top 10. These families were Chanitor , Blackhole exploit kit, and Nivdort bot.top-malware-list

In the mobile malware category, Check Point found that for the sixth consecutive month HummingBad, followed by Triada and Ztorg, remained the most common malware used to attack mobile devices.

Top 10 Most Dangerous Malware

  1. Conficker: Worm that enabled remote operations and malware download
  2. Sality: Virus that allows remote operations and downloads additional malware
  3. Locky: Spreads mainly via spam emails with disguised downloader
  4. Cutwail: Botnet used to send spams and take part in DDoS attacks
  5. Zeus: Trojan used to steal banking information
  6. Chanitor: Installs malicious payloads on infected machines
  7. Tinba: Banking trojan
  8. Cryptowall: Ransomware that uses AES encryption and conducts C&C communication over TOR
  9. Blackhole: Exploit kit that uses browser and plugin security flaws
  10. Nivdort: Bot that’s used to steal passwords and modify settings

Did you find this article helpful? Don’t forget to drop your feedback in the comments section below.

Also Read: “10 Immutable Laws of Security” That Every Geek Must Know

SHARE
Adarsh Verma
Fossbytes co-founder and an aspiring entrepreneur who keeps a close eye on open source, tech giants, and security. Get in touch with him by sending an email — [email protected]

FOSSBYTES DEALS