June 27, 2016 By Douglas Bonderud 2 min read

Security firm Check Point just released its list of the 10 Most Wanted Malware for May 2016. The Conficker worm grabbed the top spot, followed by banking Trojan Tinba and highly complex malware Sality. What’s more, the total number of active malware families spiked 15 percent last month with 2,300 unique global groups.

Here’s a look at the latest malware roundup.

Fickle Conficker?

As noted by eWEEK, the malware got its start in October 2008 when Microsoft revealed a flaw that opened the door to remotely compromise and infect Windows XP, 2000 and Server 2003. Within seven days a new worm was born, and by February 2009 the Conficker.C variant was tearing across vulnerable systems and avoiding antivirus programs.

Today the worm still accounts for 14 percent of all recognized attacks, even though support for all three original Windows targets has long since expired. Once infected, companies often disregard the worm as less pressing than other threats such as ransomware or banking Trojans.

According to SC Magazine, however, an infected system is vulnerable to both ongoing malware attacks and the theft of financial login credentials. Stopping Conficker and avoiding these threats demands antibot technologies and CPU-level sandboxing, according to Check Point’s intelligence group manager Maya Horowitz.

Tinba and Sality, meanwhile, are each on the hook for 9 percent of all malware infections worldwide. Taken together, the top 10 deliver 60 percent of all recognized attacks. It’s worth noting that they vary in vector and outcome: Seventh-place Hummingbird is Android malware capable of installing a persistent rootkit and fraudulent applications, and No. 9 is Virut, a botnet used for distributed denial-of-service (DDoS) attacks.

Breaking New Ground

While the top 10 include old threats, new vectors and a host of sophisticated attack avenues, there are a number of up-and-coming concerns that are also worth a look. Consider the Godless malware currently making the rounds on Android devices.

According to BetaNews, the threat affects almost any device running version 5.1 (Lollipop) or earlier, which translates to around 90 percent of all Android devices worldwide. Once infected, Godless exploits root vulnerabilities to remotely download apps in the background or collect and send personal data to command-and-control (C&C) servers.

Even more worrisome? The rooting process is designed to occur only when the screen is turned off. As noted by Today Online, cybercriminals are also using a mix of old and new tech to scam users: Victims receive a phone call purportedly from courier services or government agencies directing them to immediately download a specific app.

No surprise: The calls are fake, and the app is malware that allows attackers to grab personal information. It’s proof positive that social engineering still works wonders to exploit average users.

May was a big month for malicious actors, with historic code Conficker taking top spot in the malware rankings. Banking Trojans stay strong, while worms, mobile malware, exploit kits and botnets all make an appearance in the top 10. Up-and-comers such as stealthy Android rootkits and phishing phone attacks round out this high-powered malware lineup.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today