Ad Image

Check Point Releases Global Threat Report: September 2018’s Top Ten Most Wanted Malware Report

Guess Data Breach Indicates Theft After Ransomware Attack

Check Point Releases Global Threat Report: September 2018’s Top Ten Most Wanted Malware Report

Endpoint protection platform solution provider Check Point Software today released their latest Global Threat Index: September 2018’s Top Ten Most Wanted Malware report. The most significant finding: a nearly 400% increase in crypto-mining attacks on iPhones. Most of this increase occurred in the last few weeks of September.  

Download Link to Gartner 2018 Magic Quadrant for Endpoint Protection Platforms

Crypto-mining malware has become the number one digital threat facing enterprises today, having supplanted ransomware. The reasons for this transition are obvious: ransomware is metaphorically loud, blatant, and only offering minimal success rates. Crypto-mining, on the other hand, can dwell on an enterprise network for months without inviting suspicion, offering concrete profits to hackers.

Check Point’s researchers found in the September 2018’s Top Ten Most Wanted Malware that the crypto-mining malware Coinhive is the most dominant form of the digital threat, impacting 19% of enterprises worldwide. Four of the top ten listed threats were crypto-mining malware.

An increase on iPhones may not appear to be an enterprise concern. However, businesses are still contending with the rise and evolution of bring-your-own-device (BYOD) culture. Every new endpoint introduced to your network constitutes new potential threats that could cost your company thousands in exploited processing power and electrical power.

The Check Point September 2018’s Top Ten Most Wanted Malware found Lokibot, Lotoor, and Triada were the three most popular malware used to attack enterprise’ mobile estates. Many of the most common non-crypto-jacking malware involved Trojans in some way.

You can read the full Check Point September 2018’s Top Ten Most Wanted Malware here.  

Other Resources: 

Key Findings – The Gartner Unified Threat Management 2018 Magic Quadrant

You Need to Hire More Female Cybersecurity Professionals

In Focus: The Desperate Shortage of Women in Cyber Security

Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms (EPP): What’s Changed?

4 Tips For Endpoint Security Solutions (That Everyone Forgets)

Comparing the Top Endpoint Security Vendors — Solutions Review

Answering the Top 4 Enterprise Endpoint Security Questions

What Can We Expect for the Future of Endpoint Security?

Six Endpoint Security Vendors to Watch in 2018

The 25 Best Endpoint Security Platforms and Tools of 2018

Key Findings from the Webroot Threat Report: Mid-Year Update

Download Link to Endpoint Security Buyer's Guide

 

Share This

Related Posts