By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: Check Point Detects Ransomware Spike on Healthcare Facilities Around the World
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > Check Point Detects Ransomware Spike on Healthcare Facilities Around the World
checkpoint-threatit
News

Check Point Detects Ransomware Spike on Healthcare Facilities Around the World

Last updated: 2022/08/05 at 11:54 PM
Security Parrot Editorial Team Published November 22, 2020
Share
checkpoint-threatit
SHARE

Trickbot and Emotet Trojans, Leading the Global Threat Index, Used to Spread Ransomware

The Check Point Research team published the Global Threat Index report with the most active threats in October 2020. Researchers report that the Trojans Trickbot and Emotet continue to top the top malware rankings in October. They have caused a sharp increase in the number of ransomware attacks on hospitals and medical facilities around the world.

Healthcare became the top target for ransomware in the United States in October, according to Check Point , with attacks increasing 71% since September 2020. Similarly, ransomware attacks on healthcare organizations and hospitals in October increased by 36% in Europe, the Middle East and Africa and 33% in Asia-Pacific.

Attackers also frequently attacked Russian medical organizations. For six months, the number of attacks on Russian medical organizations accounted for 3% of all attacks on medical organizations around the world.

In September, researchers also reported that the Russian-speaking group OldGremlin was associated with at least nine ransomware attacks this year on medical laboratories, banks, manufacturers and software developers in Russia. A large Russian medical company affected by hackers paid a ransom of $ 50,000 in cryptocurrency.

The world’s most active malware in October 2020:

Emotet remains the most prevalent malware in October, affecting 12% of organizations worldwide. He was followed by Trickbot and Hiddad , which attacked 4% of organizations each.

  1. Emotet is an advanced self-propagating modular Trojan. Emotet was once a common banking Trojan and has recently been used to further spread malware and campaigns. The new functionality allows you to send phishing emails containing malicious attachments or links.
  2. Trickbot is one of the dominant banking Trojans, which is constantly being supplemented with new capabilities, functions and distribution vectors. It is flexible and customizable malware that can be distributed through multi-targeting campaigns.
  3. Hiddad – A modular backdoor for Android that grants root privileges to downloaded malware and helps inject it into system processes. It can access key security details built into the OS, allowing it to retrieve sensitive user data.

The most common vulnerabilities in October 2020:

  1. Remote code execution MVPower DVR. A remote code execution vulnerability exists in MVPower DVR devices. An attacker could exploit this vulnerability to execute arbitrary code on an affected router using a specially crafted request.
  2. Dasan GPON Router Authentication Bypass (CVE-2018-10561) is an authentication bypass vulnerability that exists in Dasan GPON routers. Successful exploitation of this vulnerability could allow remote attackers to gain confidential information and gain unauthorized access to an affected system.
  3. Remote Code Execution in HTTP Headers ( CVE -2020-13756) – HTTP headers allow the client and server to pass additional information using an HTTP request. An attacker could use a vulnerable HTTP header to run arbitrary code on the victim’s device.

The most active mobile threats in October 2020:

This month, Hiddad became the most popular malware for mobile devices. It is followed by xHelper and Lotoor.

  1. Hiddad – A modular backdoor for Android that grants root privileges to downloaded malware and helps inject it into system processes. It can access key security details built into the OS, allowing it to retrieve sensitive user data.
  2. xHelper is a malicious Android application that has been active since March 2019 and is used to download other malicious applications and display ads. The application is capable of hiding from user and mobile antivirus programs and reinstalling if the user uninstalls it.
  3. Lotoor – the program uses vulnerabilities in the Android operating system to gain privileged root access on jailbroken mobile devices.

Weekly Updates For Our Loyal Readers!

TAGGED: emotet, Hiddad, Lotoor, Trickbot, xHelper
Security Parrot Editorial Team November 22, 2020
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?