Security firm Check Point just released its list of the 10 Most Wanted Malware for May 2016. The Conficker worm grabbed the top spot, followed by banking Trojan Tinba and highly complex malware Sality. What’s more, the total number of active malware families spiked 15 percent last month with 2,300 unique global groups.

Here’s a look at the latest malware roundup.

Fickle Conficker?

As noted by eWEEK, the malware got its start in October 2008 when Microsoft revealed a flaw that opened the door to remotely compromise and infect Windows XP, 2000 and Server 2003. Within seven days a new worm was born, and by February 2009 the Conficker.C variant was tearing across vulnerable systems and avoiding antivirus programs.

Today the worm still accounts for 14 percent of all recognized attacks, even though support for all three original Windows targets has long since expired. Once infected, companies often disregard the worm as less pressing than other threats such as ransomware or banking Trojans.

According to SC Magazine, however, an infected system is vulnerable to both ongoing malware attacks and the theft of financial login credentials. Stopping Conficker and avoiding these threats demands antibot technologies and CPU-level sandboxing, according to Check Point’s intelligence group manager Maya Horowitz.

Tinba and Sality, meanwhile, are each on the hook for 9 percent of all malware infections worldwide. Taken together, the top 10 deliver 60 percent of all recognized attacks. It’s worth noting that they vary in vector and outcome: Seventh-place Hummingbird is Android malware capable of installing a persistent rootkit and fraudulent applications, and No. 9 is Virut, a botnet used for distributed denial-of-service (DDoS) attacks.

Breaking New Ground

While the top 10 include old threats, new vectors and a host of sophisticated attack avenues, there are a number of up-and-coming concerns that are also worth a look. Consider the Godless malware currently making the rounds on Android devices.

According to BetaNews, the threat affects almost any device running version 5.1 (Lollipop) or earlier, which translates to around 90 percent of all Android devices worldwide. Once infected, Godless exploits root vulnerabilities to remotely download apps in the background or collect and send personal data to command-and-control (C&C) servers.

Even more worrisome? The rooting process is designed to occur only when the screen is turned off. As noted by Today Online, cybercriminals are also using a mix of old and new tech to scam users: Victims receive a phone call purportedly from courier services or government agencies directing them to immediately download a specific app.

No surprise: The calls are fake, and the app is malware that allows attackers to grab personal information. It’s proof positive that social engineering still works wonders to exploit average users.

May was a big month for malicious actors, with historic code Conficker taking top spot in the malware rankings. Banking Trojans stay strong, while worms, mobile malware, exploit kits and botnets all make an appearance in the top 10. Up-and-comers such as stealthy Android rootkits and phishing phone attacks round out this high-powered malware lineup.

More from

What to know about new generative AI tools for criminals

3 min read - Large language model (LLM)-based generative AI chatbots like OpenAI’s ChatGPT took the world by storm this year. ChatGPT became mainstream by making the power of artificial intelligence accessible to millions.The move inspired other companies (which had been working on comparable AI in labs for years) to introduce their own public LLM services, and thousands of tools based on these LLMs have emerged.Unfortunately, malicious hackers moved quickly to exploit these new AI resources, using ChatGPT itself to polish and produce phishing…

The importance of Infrastructure as Code (IaC) when Securing cloud environments

4 min read - According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they must also become increasingly aware of the security risks and threats that come with it. It’s not enough anymore to simply have a set of…

Data never dies: The immortal battle of data privacy

4 min read - More than two hundred years ago, Benjamin Franklin said there is nothing certain but death and taxes. If Franklin were alive today, he would add one more certainty to his list: your digital profile. Between the data compiled and stored by employers, private businesses, government agencies and social media sites, the personal information of nearly every single individual is anywhere and everywhere. When someone dies, that data becomes the responsibility of the estate; but what happens to the privacy rights…

Vulnerability resolution enhanced by integrations

2 min read - Why speed is of the essence in today's cybersecurity landscape? How are you quickly achieving vulnerability resolution? Identifying vulnerabilities should be part of the daily process within an organization. It's an important piece of maintaining an organization’s security posture. However, the complicated nature of modern technologies — and the pace of change — often make vulnerability management a challenging task. In the past, many organizations had to support manual integration work to get different security systems to ‘talk’ to each…