June 27, 2016 By Douglas Bonderud 2 min read

Security firm Check Point just released its list of the 10 Most Wanted Malware for May 2016. The Conficker worm grabbed the top spot, followed by banking Trojan Tinba and highly complex malware Sality. What’s more, the total number of active malware families spiked 15 percent last month with 2,300 unique global groups.

Here’s a look at the latest malware roundup.

Fickle Conficker?

As noted by eWEEK, the malware got its start in October 2008 when Microsoft revealed a flaw that opened the door to remotely compromise and infect Windows XP, 2000 and Server 2003. Within seven days a new worm was born, and by February 2009 the Conficker.C variant was tearing across vulnerable systems and avoiding antivirus programs.

Today the worm still accounts for 14 percent of all recognized attacks, even though support for all three original Windows targets has long since expired. Once infected, companies often disregard the worm as less pressing than other threats such as ransomware or banking Trojans.

According to SC Magazine, however, an infected system is vulnerable to both ongoing malware attacks and the theft of financial login credentials. Stopping Conficker and avoiding these threats demands antibot technologies and CPU-level sandboxing, according to Check Point’s intelligence group manager Maya Horowitz.

Tinba and Sality, meanwhile, are each on the hook for 9 percent of all malware infections worldwide. Taken together, the top 10 deliver 60 percent of all recognized attacks. It’s worth noting that they vary in vector and outcome: Seventh-place Hummingbird is Android malware capable of installing a persistent rootkit and fraudulent applications, and No. 9 is Virut, a botnet used for distributed denial-of-service (DDoS) attacks.

Breaking New Ground

While the top 10 include old threats, new vectors and a host of sophisticated attack avenues, there are a number of up-and-coming concerns that are also worth a look. Consider the Godless malware currently making the rounds on Android devices.

According to BetaNews, the threat affects almost any device running version 5.1 (Lollipop) or earlier, which translates to around 90 percent of all Android devices worldwide. Once infected, Godless exploits root vulnerabilities to remotely download apps in the background or collect and send personal data to command-and-control (C&C) servers.

Even more worrisome? The rooting process is designed to occur only when the screen is turned off. As noted by Today Online, cybercriminals are also using a mix of old and new tech to scam users: Victims receive a phone call purportedly from courier services or government agencies directing them to immediately download a specific app.

No surprise: The calls are fake, and the app is malware that allows attackers to grab personal information. It’s proof positive that social engineering still works wonders to exploit average users.

May was a big month for malicious actors, with historic code Conficker taking top spot in the malware rankings. Banking Trojans stay strong, while worms, mobile malware, exploit kits and botnets all make an appearance in the top 10. Up-and-comers such as stealthy Android rootkits and phishing phone attacks round out this high-powered malware lineup.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today