2019 Cyber Attack Trends Report
2019 Cyber Attack Trends Report
2019 Cyber Attack Trends Report
TABLE OF CONTENTS
Introduction.................................................................................................. 3
Ongoing Trends............................................................................................ 8
INTRODUCTION
The first half of 2019 demonstrated that no environment is immune to cyber attacks.
We have witnessed threat actors developing new tool sets and techniques, targeting
corporate assets stored on cloud infrastructure, individuals’ mobile devices, trusted
third-party suppliers’ application and even popular mail platforms.
One of the dominating ongoing trends in 2019 is targeted ransomware attacks. This
year collaborations between threat actors allowed even more destructive attacks that
paralyzed numerous organizations worldwide. What ends with a ransomware attack
usually starts with a more silent sequence of bot infections.
Still highly visible, cryptominers are on the decline this year – only 21% of organizations
worldwide were affected by cryptominers’ attacks in comparison to 42% during its
peak in 2018. This was the outcome after shutting down the ‘CoinHive’ drive-by
mining service.
Software supply chain attacks attracted public and government attention. In such
attacks threat actors inject malicious code into components of legitimate applications,
victimizing a large number of unsuspecting users. The accumulation of several cases
since the beginning of the year led the American government to devote special attention
to this evolving threat and will soon publish official recommendations on ways to
minimize the impact of such attacks.
To provide organizations with the best level of protection, security experts should be
attuned to the ever-changing landscape and the latest threats and attack methods.
With data drawn from Check Point’s ThreatCloud World Cyber Threat Map between
January and June 2019, combined with primary research performed by the company’s
cyber security experts , the following report holds a comprehensive overview of the
trends observed in the various categories of cryptominers, ransomware, botnet, banking
Trojans, data breaches, and mobile threats.
SOFTWARE SUPPLY CHAIN ATTACKS ON THE RISE | 4
Software supply chain attacks can be divided into two main categories. The first includes targeted attacks
aiming to compromise well-defined targets, scanning their suppliers list in search of the weakest link
through which they could enter. The ShadowHammer attack on ASUS is a recent example. Attackers implanted
malicious code into the ASUS Live Update utility, allowing them to later install backdoors on millions of remote
computers. Interestingly, the malicious implant included a hardcoded list of several hundred network adapters’
MAC addresses which means second stage backdoors could be surgically delivered to predefined targets.
In the second category, software supply chains are used to compromise as many victims as possible by locating
a weak link with a large distribution radius. One such example is the attack on PrismWeb, an e-commerce
platform, in which attackers injected a skimming script into the shared JavaScript libraries used by online
stores, affecting more than 200 online university campus stores in North America. Many of such MageCart style
attacks utilize similar supply chain attack vectors.
The sharp increase in supply chain attacks has brought the US Department of Homeland Security (DHS) to
establish the Information and Communications Technology Supply Chain Risk Management Task Force which
started its work earlier this year. In addition, on May 15, the White House issued an executive order, declaring
foreign supply chain threats as a national emergency and empowering the Secretary of Commerce to prohibit
transactions – later leading to a ban of the technology giant Huawei.
The mobile arena is also prone to supply chain attacks. Operation Sheep, as reviewed by Check Point Research,
exposed the SWAnalytics infected SDK. Non-suspecting mobile apps developers used this SDK and thus
unknowingly assisted in distributing malicious contact-harvesting malware to more than 100 million end-users.
From the hacker’s point of view this method has at least two distinct advantages – they rely on the good
reputation of third-party vendors and multiply their circulation manifold by using the original vendor’s
distribution mechanism.
The supply chain attack vector has been a growing trend for a while but the reaction of US and international
authorities testify to both its magnitude and severity. This type of attack vector is more than just a dangerous
technique; it strikes at the basic trust on which supplier-customer relations are based.
EMAIL SCAMS GEAR UP | 5
With this shift, Check Point researchers witnessed a surge in the volume of Sextortion scams and business
email compromise (BEC), which fraudulently trick victims into making a payment through blackmail or by
convincingly impersonating others, respectively. Both scams adopt these elements and do not necessarily
contain any malicious attachments or links, which makes them even harder to detect.
Email scammers have started to employ various evasion techniques designed to bypass security solutions
and anti-spam filters. The various evasions we detected included encoded emails, images of the message
embedded in the email body, as well as complex underlying code that mixes plain text letters with HTML
character entities. Social engineering techniques, as well as varying and personalizing the content of the
emails, are additional methods allowing the scammers to fly safely under the radar of anti-spam filters and
reach their target’s inbox.
Determined to convince victims of their credibility, this year saw the Sextortion scammers doing everything
possible to make their victims worried enough to pay up and avoid the publication of the alleged sexual
materials. This mainly includes providing the victim’s personal credentials as evidence, which were usually
leaked in previous data breaches or purchased in underground forums. Other tactics, mainly common in BEC
attacks, are domain and display-name spoofing as well as sending the emails from valid high-reputation
entities such as compromised Microsoft Office 365 or Gmail accounts. In April, one sextortion campaign went
as far as pretending to be from the CIA and warned victims they were suspected of distributing and storing
child pornography, while demanding $10,000 in Bitcoin.
In a world where email scams have become a business in which professional cyber criminals are hired to run
email campaigns, it is also safe to say that this industry is definitely here to stay. Spammers will continue
to improve their capabilities and techniques to ensure their scams’ profitability, just as security vendors will
continue to improve their products to protect against such threats.
ATTACKS AGAINST CLOUD ENVIRONMENTS | 6
Following the 2018 trend, practices such as misconfiguration and poor management of cloud resources
remained the most prominent threat to the cloud ecosystem in 2019 and, as a result, subjected cloud assets
to a wide array of attacks. This year, misconfiguring cloud environments was one of the main causes for a vast
number of data theft incidents experienced by organizations worldwide.
In April, more than half a billion records of Facebook’s users were exposed by a third party on unprotected
Amazon cloud servers. Misconfigured Box.com accounts leaked terabytes of extremely sensitive data from
many companies, and in another case sensitive financial information of 80 million Americans hosted on a
Microsoft cloud server was exposed online.
Besides information theft, threat actors intentionally abuse the different cloud technologies for their computing
power. So far this year, cloud cryptomining campaigns stepped up, upgraded their technique set and were
capable of evading basic cloud security products, abusing hundreds of vulnerable exposed Docker hosts and
even shutting down competitors’ cryptomining campaigns operating in the cloud.
In addition, in 2019 Check Point researchers witnessed an increase in the number of exploitations against
public cloud infrastructures. A vulnerability in SoftNAS Cloud platform discovered in March may have allowed
attackers to bypass authentication and gain access to a company’s web-based admin interface and then
run arbitrary commands. Furthermore, a new type of attack vector, dubbed Cloudborne, demonstrated that
hardware re-provisioned to new customers could retain backdoors that can be used to attack future users of
the compromised system.
With the number of enterprises that migrate their storage and computing infrastructure to the cloud
environment increasing, best security practices must be followed and proper solutions implemented in order
to prevent the next massive data breach.
THE EVOLVING MOBILE LANDSCAPE | 7
As one of the most popular malware types, banking malware has successfully infiltrated the mobile cyber
arena with a sharp rise of more than 50% compared to 2018. In correlation to the growing use of banks’ mobile
applications, malware capable of stealing payment data, credentials and funds from victims’ bank accounts
have been pushed from the general threat landscape and became a very common mobile threat too.
The methodology used to distribute banking malware has also been borrowed from the general threat
landscape – malware builders available for purchase in underground forums. In this way the builders of mobile
bankers, such as Asacub and Anubis, can allow the creation of new versions of these malware, ready for massive
distribution, by anyone willing to pay.
Another interesting element observed so far this year and inspired by the general threat landscape, is the
dawn of the evasions era for the mobile arena. From a delayed execution to avoid sandboxes, through using
transparent icons with empty application labels, to encrypting the malicious payload – it is quite evident that
cyber criminals have boosted their skill sets and creativity for mobile attacks, determined to evade detection
while keeping their malware persistent and effective.
This year, two fake applications were discovered on Google Play capable of monitoring devices’ motion sensors
to evade security emulators. Furthermore, in March, a new Android Trojan dubbed Gustuff was introduced to
be capable of targeting customers of leading international banks and features various evasion techniques,
including turning off Google Protect, the built-in anti-malware protection on Android.
So after probing the mobile field, threat actors are stepping up their efforts and as a result we can expect to
see mobile attacks rise in the months and years ahead.
ONGOING TRENDS | 8
ONGOING TRENDS
In addition to the above major trends, there are three other cyber trends of 2018 that are still very relevant
in 2019.
• The targeted ransomware approach which gained popularity during 2018 has proven effective in 2019; not
a week goes by without some kind of tailored destructive ransomware attack hitting the headlines. One
such prominent attack vector utilizes Emotet’s vast distribution and victim base to select lucrative targets.
Emotet is used to spread TrickBot within the compromised corporate network which, in turn, deploys
Ryuk or other ransomware as the final payload. From countless local government entities through a cloud
hosting provider, industrial corporations and airports, this year every organization is a potential target to the
catastrophe of targeted ransomware, led by Ryuk and LockerGoga.
• The infamous cryptominers remained a prevalent malware type in the first half of 2019’s threat landscape.
This is despite the shutdown of the notorious drive-by mining service ‘CoinHive’ this March, which led
to a decrease in the popularity of cryptominers among threat actors. As a result, and in order to remain
prevalent in 2019, threat actors have been adopting a new approach regarding cryptominers, aiming at more
rewarding targets than consumer PC’s and designing more robust operations. Among the new victims one
can find corporations, factories, powerful servers and even cloud resources. And if that was not enough, we
have even seen them integrating cryptominers as part of a DDoS botnet for side-profits.
• DNS Attacks target one of the most important mechanisms that govern the internet – the Domain Name
System (DNS). The DNS is in charge of resolving domain names into their corresponding IP addresses and it
is a crucial part of the internet’s trust chain. Such attacks target DNS providers, name registrars, and local
DNS servers belonging to the targeted organization and are based on the manipulation of DNS records.
DNS takeovers can compromise the whole network and enable multiple attack vectors: control of email
communications, redirection of victims to a phishing site, and more. One of the biggest advantages DNS
attacks provide is the option to issue legitimate looking certificates by Certificate Authorities which rely on
DNS to verify that you are the legitimate holder of the domain in question.
The growing popularity of DNS attacks pushed the Department of Homeland Security and the Internet
Corporation for Assigned Names and Numbers (ICANN) to issue official warnings of a significant risk to
this key component of the Internet infrastructure. Large incidents involving DNS attacks include attacks on
government and internet and telecommunications infrastructure, as depicted in the recent DNSpionage and
SeaTurtle campaigns.
CYBER ATTACK CATEGORIES BY REGION | 9
10% Other
3% docx 21%
exe
29% 8%
xlsx
Other
Top Top
Malicious Malicious
File Types File Types
– HTTP 53% 11% – SMTP
exe pdf
2% xls 19%
2% js doc
3% msi
5% 12%
doc rtf
6% 16%
pdf js
EMAIL WEB
100
80
40% 42%
60
72%
40
60% 58%
28%
20
7.2% 7.2%
6.3% 6.2%
5.7%
4.0%
CryptoLoot
Coinhive
Emotet
AgentTesla
LokiBot
GandCrab
Dorkbot
Ramnit
Figure 1: Most Prevalent Malware Globally: Percentage of corporate networks impacted by each malware family
Americas
11.2%
10.0% 10.0%
9.3%
7.2%
Emotet
CryptoLoot
Coinhive
4.6% 4.5%
JSEcoin
3.8% 3.6%
XMRig
3.2%
GandCrab
TrickBot
AgentTesla
LokiBot
Dorkbot
6.3% 6.0%
5.3% 4.9%
4.3% 4.0%
CryptoLoot
3.3% 3.0%
Coinhive
JSEcoin
2.6% 2.4%
XMRig
Emotet
LokiBot
GandCrab
Hawikeye
Agent
Tesla
Ramnit
Figure 3: Most Prevalent Malware in the EMEA
10.2%
8.3%
7.4% 7.2%
5.8% 5.6%
XMRig
4.2% 4.2%
Coinhive
4.0% 4.0%
CryptoLoot
Dorkbot
JSEcoin
Ramnit
AgentTesla
Hawkeye
LokiBot
Emotet
GandCrab, the infamous Ransomware-as-a-Service, has entered our top global charts after being highly active in
the first half of 2019. Exploiting a recently patched critical Oracle WebLogic Server vulnerability, as well as aiming at
multiple targets including Managed Service Providers (MSPs), Manufacturing Firm and Windows servers running MySQL
databases, are only few of this year’s GandCrab victims. However, despite the meteoric success, in May the ransomware’s
authors announced the service’s shutdown and prompted their affiliates to terminate their ongoing operations and stop
distributing GandCrab.
GLOBAL MALWARE STATISTICS | 13
22% 23%
CryptoLoot
CryptoLoot
20% 22%
XMRig JSEcoin
Figure 5: Top Cryptomining Malware Globally Figure 6: Top Cryptomining Malware in the Americas
EMEA APAC
6% Other 13%
1% DarkGate Others
24%
6% 4% XMRig
AuthedMine 24% WannaMine
CryptoLoot
6% Top
Top NRSMiner APAC
19% EMEA Crypto Mining
XMRig Crypto Mining Malware
Malware
14%
JSEcoin
21%
Coinhive
24%
Coinhive
20% 18%
JSEcoin CryptoLoot
Figure 7: Top Cryptomining Malware in EMEA Figure 81: Top Cryptomining Malware in APAC
EMEA APAC
19%
25% 28% Other
Other Ramnit
Top Top 38%
EMEA 5% APAC Ramnit
Zeus
Banking Banking
4% Malware 5% Malware
Zeus Bancos
6% 6%
Tinba Tinba
6% 17%
Dridex TrickBot 8%
Ursnif
14% 19%
Ursnif TrickBot
Figure 11: Most Prevalent Banking Malware in EMEA Figure 12: Most Prevalent Banking Malware in APAC
Ursnif, which is also known as “Gozi ISFB,” has climbed its way to the top of the Banking Trojans list. The leak of its source
code in underground forums has made Ursnif one of the most popular Banking Trojans, which evolves and integrates new
features and capabilities. This year, Ursnif variants have constantly hit the headlines; distributers adopted new techniques
to avoid detection, targeted entities in Japan and Italy, massively distributed it alongside GandCrab ransomware and
added new modules of stealing not only financial information but also email user accounts, content of inboxes and
cryptocurrencies wallets, as well as user credentials for local webmail, cloud storage, and e-commerce sites.
GLOBAL MALWARE STATISTICS | 15
20%
25% Other
Other 29%
Emotet
Top 2% Top 38%
Global DanaBot Americas Emotet
2% Botnet 5% Botnet
DanaBot Lorem ipsum Malware Mirai Lorem ipsum Malware
5%
Mirai 8%
Necurs
10% 18%
Dorkbot
Necurs 12%
11% Dorkbot 15%
TrickBot TrickBot
Figure 13: Most Prevalent Botnet Malware Globally Figure 14: Most Prevalent Botnet Malware in the Americas
EMEA APAC
Figure 15: Most Prevalent Botnet Malware in EMEA Figure 16: Most Prevalent Botnet Malware in APAC
Global Americas
14%
Lotoor
30%
40% Triada
Top
Other Top 42% 13%
Global Other Americas Triada
Mobile Mobile
Malware Malware
12%
Hiddad
11%
Lotoor
5% Piom 11%
7% 8%
7% AndroidBauts Hiddad Lezok AndroidBauts
Figure 17: Top Mobile Malware Globally Figure 18: Top Mobile Malware in the Americas
EMEA APAC
26%
Other 30%
Other
Top 38% Top 45%
EMEA Triada APAC Triada
Mobile Mobile
Malware Malware
6%
Piom 3%
Hiddad
4%
8% Piom
AndroidBauts 7%
10% 12% AndroidBauts
11%
Hiddad Lotoor Lotoor
Figure 19: Top Mobile Malware in EMEA Figure 20: Top Mobile Malware in APAC
Americas
• January: Over 770 million email addresses and 21 million unique passwords were exposed in a popular
hacking forum after being hosted in the cloud service MEGA, and became the single largest collection
of breached personal credentials in history, named “Collection #1”. Later this year, Collection #1 was
discovered as a minor slice of a bigger one terabyte data leak, split into seven parts and distributed
through data-trading.
• February: 620 million account details were stolen from 16 hacked websites and offered for sale on
the popular Dark Web marketplace, Dream Market. Later on, the same threat actor under the alias
“gnosticplayers”, published another trove of 127 million accounts for sale from eight more hacked websites.
• March: The world’s largest email validation company, Verifications.io, fell victim to a major data breach due
to an unprotected MongoDB database, exposing online data from over 800 million emails. The leaked emails
contained sensitive information including personally identifiable information (PII).
• April: More than half a billion records of Facebook’s users were found exposed on unprotected Amazon
cloud servers. The exposed data sets were collected and not securely stored online by third-party Facebook
app developers.
• April: Eight unsecured databases containing scraped data and email addresses of nearly 60 million LinkedIn
users were found online. A LinkedIn investigation yielded that the exposed databases belonged to a third-
party company that aggregated data from multiple sources, including LinkedIn.
• May: A Russian hacking group offered for sale access to networks of anti-virus vendors and the source code
of their software. The group, called Fxmsp, claimed to breach the networks of McAfee, Symantec and Trend
Micro, and steal 30 terabytes of data that they are offering for sale.
• June: American Medical Collection Agency (AMCA) suffered a major data breach exposing personal and
payment information of almost 20 million patients after attackers infiltrated their web payment portal. The
information included names, date of birth, address, phone, date of service, provider, balance information, and
credit card or bank account. AMCA has filed for bankruptcy as the breach has led to both financial and legal
consequences for the organization.
MAJOR CYBER BREACHES (H1 2019) | 18
• January: Airbus, the world’s second-largest manufacturers of commercial airplanes, was subject to a data
breach exposing personal data of some of its employees as unauthorized attackers breached its “Commercial
Aircraft business” information system.
• February: The South African state-owned energy supplier “Eskom” experienced two security breaches.
An unsecured database containing customer information was exposed to the internet and a corporate
computer was infected with the AZORult information-stealing Trojan after an employee downloaded a
cracked Sims 4 game.
• April: The Georgia Institute of Technology suffered a data breach that exposed the personal information
of 1.3 million current and former faculty members, students, staff and student applicants. By exploiting a
vulnerability in its web app, an unauthorized entity gained access to the university’s central database.
Asia-Pacific (APAC)
• January: A massive online database was revealed to contain sensitive and personal records of more than 202
million Chinese citizens. The data is believed to have been collected from job seekers’ resumes from various
Chinese websites using a scraping tool called “data-import”.
• February: Indian state-owned LPG Gas Company had online personal and sensitive data belonging
to 7 million customers and distributors leaked following vulnerabilities in their iOS applications. The
compromised information included names, addresses and personal identity numbers (Aadhaar numbers), as
well as distributors’ bank details such as bank name, account number, IFSC code, and more.
• April: Personal data of 100 million users of the Indian search service JustDial was exposed after an
unprotected database was found online. The leaked data was collected in real-time from every customer
who accessed the service via its website, mobile app, or even by calling, and included usernames, email
addresses, mobile numbers, addresses, occupation and even photos.
• April: A misconfigured Elasticsearch DB on the Tommy Hilfiger Japan website led to the exposure of
hundreds of thousands of customers’ personal information; full names, addresses, phone numbers, email
addresses, date of birth, and transaction information were accessible in unencrypted plaintext format.
• June: FMC Consulting, a Chinese headhunting company, was responsible for a major data leak of millions
of records due to a misconfigured and publicly accessible ElasticSearch. The leaked information included
resumes and company records, as well as customers’ and employees’ PII data and internal emails.
HIGH PROFILE GLOBAL VULNERABILITIES | 19
• BlueKeep Microsoft RDP (Remote Desktop Protocol) Vulnerability (CVE-2019-0708) – Exploiting Remote
Desktop Protocol (RDP) is already an established, popular attack vector which could allow cyber criminals to
access targeted machines and even install a backdoor for further malicious activities. The recently patched
critical, wormable, Windows RDP vulnerability, dubbed BlueKeep, took the cyber security community by
storm as it is capable of spreading automatically on unprotected networks, potentially leading to a Wannacry-
scale attack. Shortly after Microsoft released its patch, actors started scanning the internet for vulnerable
devices revealing that over 1 million machines are vulnerable to it. However, there are as yet no known cases
of the flaw being exploited by threat actors as part of an attack in the wild.
• Oracle WebLogic Server Vulnerabilities (CVE-2017-10271, CVE-2019-2725) – The various critical remote
code execution vulnerabilities that reside in Oracle WebLogic Servers allow an unauthorized attacker to
remotely execute arbitrary code and affect numerous applications and web enterprise portals using the
servers. This year alone cyber criminals have exploited Oracle WebLogic Server vulnerabilities, including a
newly discovered one patched this April, to deliver Sodinokibi ransomware, Satan ransomware and install
Monero Cryptomining malware.
• DoS Vulnerabilities in Linux and FreeBSD – TCP SACK Panic (CVE-2019-11477, CVE-2019-11478,
CVE-2019-5599, CVE-2019-11479) – A critical set of vulnerabilities was unveiled in 2019 that affected
FreeBSD and Linux operating systems. The three flaws were found in the Linux kernel’s handling of TCP
networking. Successful exploitation of one of the vulnerabilities is capable of remotely crashing servers and
disrupting communications. The most severe
0.2% 2019 vulnerability could allow a remote attacker to
11% 2018 trigger a kernel panic in systems running the
21%
Older affected software and, as a result, impact the
system’s availability.
Cyber
Attacks
6% Over 26% Interestingly, according to Check Point global
2013 2017
Time attack sensors, throughout the first half of
2019, 90% of the attacks observed leveraged
14% vulnerabilities registered in 2017 and earlier and
2014 over 20% of attacks used vulnerabilities that are
11% at least seven years old.
11% 2016
2015
Figure 20: Percentage of attacks leveraging vulnerabilities found since 2012 and earlier
APPENDIX – MALWARE FAMILY DESCRIPTIONS | 20
.• Dorkbot – IRC-based Worm designed to allow remote • Hawkeye – Hawkeye is an info stealer malware, designed
code execution by its operator, as well as the download primarily to steal users’ credentials from infected
of additional malware to the infected system, with the Windows platforms and deliver them to a C&C server.
primary motivation being to steal sensitive information In past years, Hawkeye has gained the ability to take
and launch denial-of-service attacks. screenshots, spread via USB and more in addition to its
• Dridex – Dridex is a Trojan that targets the Windows original functions of email and web browser password
platform. This malware is reportedly downloaded by stealing and keylogging. Hawkeye is often sold as a MaaS
an attachment found in spam emails. This malware (Malware-as-a-Service).
identifies itself with a remote server by sending out • Hiddad – Android malware that repackages legitimate
information about the infected system. Furthermore, it apps, and then releases them to a third-party store. Its
can download and execute arbitrary modules received main function is displaying ads. However, it is also able to
from the remote server. gain access to key security details built into the OS.
• Emotet – Emotet is an advanced, self-propagating and • HiddenMiner – A strain of Android cryptominer that
modular Trojan. Emotet was once employed as a banking was spotted in April 2018. The HiddenMiner is delivered
Trojan, and recently was used as a distributer to other through a fake Google Play update app, exhausting the
malware or malicious campaigns. It uses multiple devices’ resources in mining Monero.
methods for maintaining persistence and evasion • IcedID– IcedID is a banking Trojan which first emerged
techniques to avoid detection. In addition, it can also in September 2017, and usually uses other well-known
be spread through phishing spam emails containing banking Trojans to empower its spread potential,
malicious attachments or links. including Emotet, Ursnif and TrickBot. IcedID steals
• Gandcrab – GandCrab is a RaaS malware (Ransomware- user financial data via both redirection attacks (installs
as-a-Service). First discovered in January 2018, it local proxy to redirect users to fake-clone sites) and web
operated an “affiliates” program, with those joining injection attacks (injects browser process to present fake
paying 30%-40% of the ransom revenue to GandCrab and content overlaid on top of the original page).
in return getting a full-featured web panel and technical • JSEcoin – Web-based cryptominer designed to perform
support. Estimates are that it affected over 1.5 million online mining of Monero cryptocurrency when a
Windows users before retiring and halting its activities user visits a web page without the user’s approval.
in mid-2019. Decryption tools exist for all GandCrab The implanted JavaScript uses great computational
versions. resources of the end users’ machines to mine coins, thus
.• Guerilla – Guerrilla is an Android Trojan found impacting the performance of the system.
embedded in multiple legitimate apps and is capable of • Lezok – Lezok is an Android Trojan capable of
downloading additional malicious payloads. Guerrilla downloading additional malware to victim’s computer
generates fraudulent ad revenue for the app developers. without user’s consent, as well as generating pop-up
• Gustuff – Gustuff is an Android banking Trojan advertisements when the user is surfing the Internet.
introduced in 2019, and capable of targeting customers • LockerGoga – LockerGoga ransomware was first seen
of over 100 leading international banks, users of in the wild towards the end of January 2018, while
cryptocurrency services, and popular ecommerce targeting heavy industry companies. It appears that the
websites and marketplaces. In addition, Gustuff can threat actors behind the attack invest time and efforts in
also phish credentials for various other Android payment choosing the victims and are working to launch the attack
and messaging apps, such as PayPal, Western Union, in perfect timing and against critical assets. The attack
eBay, Walmart, Skype and others. Gustuff employs usually involves encryption of Active Directory server
various evasion techniques including using the Android and endpoints, in order to leave no alternative other than
Accessibility Service mechanism to bypass security paying the ransom. Using a combination of AES-256 and
measures used by banks to protect against older RSA makes the encryption very solid. However, a poor
generations of mobile Trojans. code design makes the encryption process very slow.
APPENDIX – MALWARE FAMILY DESCRIPTIONS | 22
• LokiBot – LokiBot is an info stealer with versions for • Ramnit – Ramnit is a banking Trojan which incorporates
both Windows and Android OS. It harvests credentials lateral movement capabilities. Ramnit steals web
from a variety of applications, web browsers, email session information, giving worm operators the ability
clients, IT administration tools such as PuTTY and more. to steal account credentials for all services used by the
LokiBot has been sold on hacking forums and believed victim, including bank accounts, corporate, and social
to have had its source code leaked, allowing for a range networks accounts.
of variants to appear. It was first identified in February • Retadup – Retadup is a Trojan that targets Windows
2016. Since late 2017 some Android versions of LokiBot platform. It is reported that this malware is used for
include ransomware functionality in addition to their targeted attacks and some variants of the malware
infostealing capabilities. comes with Keylogger, screen capture and password
• Lotoor – Lotoor is a hack tool that exploits stealing capabilities. The malware is used to mine
vulnerabilities on Android operating systems in order to cryptocurrency on the infected system. It communicates
gain root privileges on compromised mobile devices. with its remote control server and accept commands to
• MageCart – MageCart is a type of attack in which execute on the infected system.
malicious JavaScript code is injected into e-commerce • Ryuk – A ransomware used in targeted and well-planned
websites and third-party suppliers of such systems in attacks against several organizations worldwide. The
order to steal payment details. ransomware’s technical capabilities are relatively low,
• Mirai – Mirai is a famous Internet-of-Things (IoT) and include a basic dropper and a straightforward
malware that tracks vulnerable IoT devices, such as encryption scheme. Nevertheless, the ransomware
web cameras, modems and routers, and turns them was able to cause severe damage to the attacked
into bots. The botnet is used by its operators to conduct organizations, and led them to pay extremely high
massive Distributed Denial of Service (DDoS). Mirai ransom payments of up to 320,000 USD in Bitcoin. Unlike
botnet first surfaced on September 2016 and quickly common ransomware, systematically distributed via
made headlines due to some large-scale attacks. massive spam campaigns and exploit kits, Ryuk is used
Among them were a massive DDoS attack used to exclusively for tailored attacks. Its encryption scheme
knock the entire country of Liberia offline, and a DDoS is intentionally built for small-scale operations, such
attack against the Internet infrastructure firm Dyn, that only crucial assets and resources are infected in
which provides a significant portion of the United States each targeted network with its infection and distribution
internet’s backbone. carried out manually by the attackers. The malware
encrypts files stored on PCs, storage servers and
• Necurs – Necurs is a one of the largest spam botnets data centers.
currently active in the wild, and it is estimated that in
2016 it consisted of some 6 million bots. The botnet • Satan – Satan is a Ransomware-as-a-Service (RaaS)
is used to distribute many malware variants, mostly which first emerged in January 2017. Its developers offer
banking Trojans and ransomware. a user-friendly web portal with customization options,
allowing anyone who buys it to create custom versions
• Panda – Panda is a Zeus variant that was first observed of Satan ransomware and distribute it to victims. New
in the wild at the beginning of 2016, and is distributed versions of Satan were observed using the EternalBlue
via Exploit Kits. Since its initial appearance, Panda has exploit to spread across compromised environments,
targeted financial services in Europe and North America. as well as performing lateral movement using other
Before the Olympic Games of 2016, it also ran a special exploits.
campaign against Brazilian banks.
• Sodinokibi – Sodinokibi is a Ransomware-as-a-Service
• Piom – Piom is an Adware which monitors the which operates an “affiliates” program which was first
user’s browsing behaviour and delivers unwanted spotted in the wild in 2019. Sodinokibi encrypts data in
advertisements based on the users web activities. the user’s directory and deletes shadow copy backups
• Qbot – Qbot is a backdoor belonging to the Qakbot in order to make data recovery more difficult. Moreover,
family. It is capable of dropping and downloading other Sodinokibi affiliates use various tactics to spread it
malware. It also establishes a connection with a remote through spam and server exploits, as well as hacking
HTTP server without user consent and may steal into managed service providers (MSP) backends, and
important user information. through malvertising campaigns redirected to the RIG
exploit kit.
APPENDIX – MALWARE FAMILY DESCRIPTIONS | 23
Worldwide Headquarters
5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 |
Email: info@checkpoint.com
U.S. Headquarters
959 Skyway Road, Suite 300, San Carlos, CA 94070
Tel: 800-429-439 | 650-628-2000 | Fax: 650-654-4233
checkpoint.com