Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has published its Global Threat Index for April 2023. Last month, researchers uncovered a substantial Qbot malspam campaign distributed through malicious PDF files attached to emails seen in multiple languages. Meanwhile, Internet-of-Things (IoT) malware Mirai made the list for the first time in a year after exploiting a new vulnerability in TP-Link routers, and Healthcare moved up to become the second most exploited industry.
The Qbot campaign seen last month involves a new delivery method in which targets are sent an email with an attachment that contains protected PDF files. Once these are downloaded, the Qbot malware is installed on the device. Researchers found instances of the malspam being sent in multiple different languages, which means organizations can be targeted worldwide.
Last month also saw the return of Mirai, one of the most popular IoT malwares. Researchers discovered it was exploiting a new zero-day vulnerability CVE-2023-1380 to attack TP-Link routers and add them to its botnet, which has been used to facilitate some of the most disruptive distributed DDoS attacks on record. This latest campaign follows an extensive report published by Check Point Research (CPR) on the prevalence of IOT attacks.
There was also a change in impacted industries, with healthcare overtaking government as the second most exploited sector in April. Attacks on healthcare institutions have been well documented and some countries continue to face constant assaults. For example, cybercriminal group Medusa recently launched attacks on cancer facilities in Australia. The industry remains a lucrative target for hackers as it gives them potential access to confidential patient data and payment information. It could have implications for pharmaceutical companies as it could lead to leaks regarding clinical trials or new medical drugs and devices.
“Cybercriminals are constantly working on new methods to bypass restrictions and these campaigns are further proof of how malware adapts to survive. With Qbot on the offensive again, it acts as another reminder of the importance of having comprehensive cybersecurity in place, and due diligence when it comes to trusting the origins and intent of an email.” said Maya Horowitz, VP Research at Check Point Software.
CPR also revealed that “Web Servers Malicious URL Directory Traversal” was the most exploited vulnerability, impacting 48% of organizations globally, followed by “Apache Log4j Remote Code Execution” with 44% and “HTTP Headers Remote Code Execution” with a global impact of 43%.
*The arrows relate to the change in rank compared to the previous month.
AgentTesla was the most prevalent malware last month with an impact of more than 10% on worldwide organizations respectively, followed by Qbot and Formbook with a 4% global impact.
Last month, Education/Research remained the most attacked industry globally, followed by Healthcare and Government/Military.
Last month, “Web Servers Malicious URL Directory Traversal” was the most exploited vulnerability, impacting 48% of organizations globally, followed by “Apache Log4j Remote Code Execution” with 44% and “HTTP Headers Remote Code Execution” with a global impact of 43%.
Last month, Ahmyth moved to the top spot as the most prevalent mobile malware, followed by Anubis and Hiddad.
Check Point’s Global Threat Impact Index and its ThreatCloud AI Map is powered by Check Point’s ThreatCloud AI intelligence. ThreatCloud AI provides real-time threat intelligence derived from hundreds of millions of sensors worldwide, over networks, endpoints and mobiles. The intelligence is enriched with AI-based engines and exclusive research data from Check Point Research, the intelligence and research Arm of Check Point Software Technologies.
The complete list of the top ten malware families in April can be found on the Check Point blog.
Follow Check Point Research via:
Blog: https://research.checkpoint.com/
Twitter: https://twitter.com/_cpresearch_
About Check Point Research
Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud AI to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other threats. Infinity comprises four core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.