Tag Archives: check-point

Banking Trojan attacks increase, large scale Ramnit campaign impacts organizations worldwide

Check Point revealed a significant increase in attacks using the Ramnit banking trojan. Ramnit has doubled its global impact over the past few months, driven by a large scale campaign that has been converting victim’s machines into malicious proxy servers. Ramnit “black” botnet geography During August 2018, Ramnit became the most prevalent banking Trojan in an upward trend in the use of banking Trojans that has more than doubled since June 2018. “This is the … More ? The post Banking Trojan attacks increase, large scale Ramnit campaign impacts organizations worldwide appeared first on Help Net Security .

More:
Banking Trojan attacks increase, large scale Ramnit campaign impacts organizations worldwide

Return of Necurs botnet brings new ransomware threat

The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check Point. Researchers found that hackers were using Necurs, considered to be the largest spam botnet in the world, to distribute the relatively new Scarab ransomware that was first seen in June 2017. The Necurs botnet started mass distribution of Scarab during the Thanksgiving holiday, sending over … More ?

Link:
Return of Necurs botnet brings new ransomware threat

SQL Sequel: Sequel Slammer worm resurfaces after more than a decade

SQL Slammer, a fast-moving worm that generated a wave of distributed denial of service (DDoS) attacks in 2013, mysteriously resumed high levels of activity in late 2016 after more than a decade of dormancy. According to a company blog post Thursday, Check Point Software Technologies detected a “massive” surge in SQL Slammer attacks between Nov. 28 and Dec. 4, 2016. “What we’ve been seeing is not the actual worm, but its attempts to reach more servers,” said Maya Horowitz, group manager, threat Intelligence at Check Point, in an email interview with SC Media. “Therefore we cannot know for sure if any changes have been [made to] the worm or the vulnerabilities it exploits.” When it first surfaced in 2003, the worm managed to infect tens of thousands of servers and routers in a matter of minutes by exploiting a buffer overflow vulnerability (CVE-2002-0649) in Microsoft SQL Server 2000 or Microsoft SQL Server Data Engine 2000 – both of which are no longer supported. These infected, exploited machines would then bombard ransom IP addresses with an enormous stream of malicious packets that would infect other vulnerable systems, while simultaneously overloading Internet-based network devices with traffic. Microsoft patched this vulnerability in Jan. 2003 and over the years has issued multiple new versions of the affected products. This makes these latest attacks ever stranger, because unless the worm has evolved in some way, it is hard to imagine that users remain susceptible to this threat. “One theory to why it’s attempting to make a comeback is that cybercriminals are seeking easy ways to cause DoS and slow down the entire Internet, just like with the recent Mirai botnet,” said Horowitz. “And reusing old malware is the easiest way.” Source:https://www.scmagazine.com/sql-sequel-sequel-slammer-worm-resurfaces-after-more-than-a-decade/article/636156/

Read More:
SQL Sequel: Sequel Slammer worm resurfaces after more than a decade