Top 10 Malware March 2019

In March 2019 total notifications only experienced a 2% decrease over the previous month despite a 21% reduction in malware activity. A 13% increase in non-malware notifications offset the decrease in malware notifications. The increase in non-malware activity is attributed to a rise in outdated IE Flash and ColdFusion exploitation attempts. The proportion of Top 10 Malware to Total Malware activity is consistent from the previous month. Top 10 Malware activity accounted for 57% of Total Malware notifications in March, a 1% increase from February.

In March 2019, malspam was the primary initiation vector for malware in the Top 10 malware list. Both the dropped and network initiation vectors decreased in activity, while malware distributed via multiple vectors increased. The increase in the multiple vector is attributed to CoinMiner activity, which is either delivered via malspam or dropped by other malware. After February, the malvertisement vector returned to its previous levels of non-activity, as no malware using this vector made it to the Top 10 list.

The MS-ISAC Top 10 Malware refers to the top 10 new actionable event notifications of non-generic malware signatures sent out by the MS-ISAC Security Operations Center (SOC).

Dropped – Malware delivered by other malware already on the system, an exploit kit, infected third-party software, or manually by a cyber threat actor.

Multiple – Refers to malware that currently favors at least two vectors.

Malspam – Unsolicited emails, which either direct users to download malware from malicious websites or trick the user into opening malware through an attachment.

Network – Malware introduced through the abuse of legitimate network protocols or tools, such as SMB or remote PowerShell.

Malvertisement – Malware introduced through malicious advertisements. Shlayer, a MacOS trojan, is the first malware since March 2018 to rely on this vector within the Top 10 Malware list.

  1. WannaCry is a ransomware cryptoworm that uses the EternalBlue exploit to spread via SMB protocol. WannaCry has a “killswitch” domain, which stops the encryption process.
  2. Kovter is a fileless click fraud malware and a downloader that evades detection by hiding in registry keys. Reporting indicates that Kovter can have backdoor capabilities and uses hooks within certain APIs for persistence.Gh0st
  3. Gh0st is a RAT used to control infected endpoints. Gh0st is dropped by other malware to create a backdoor into a device that allows an attacker to fully control the infected device.
  4. NanoCore is a RAT spread via malspam as a malicious Excel XLS spreadsheet. As a RAT, NanoCore can accept commands to download and execute files, visit websites, and add registry keys for persistence.
  5. CoinMiner is a cryptocurrency miner that uses Windows Management Instrumentation (WMI) and EternalBlue to spread across a network. CoinMiner uses the WMI Standard Event Consumer scripting to execute scripts for persistence. CoinMiner spreads through malspam or is dropped by other malware.
  6. ZeuS is a modular banking trojan which uses keystroke logging to compromise victim credentials when the user visits a banking website. Since the release of the ZeuS source code in 2011, many other malware variants have adopted parts of it’s codebase, which means that events classified as ZeuS may actually be other malware using parts of the ZeuS code.
  7. Trickbot is a modular banking trojan that is known to be dropped by Emotet as well as spread via malspam campaigns. Trickbot is also known to download the IcedID banking Trojan.
  8. Qakbot is financial malware designed to target governments and businesses for financial fraud and known for its wormability on a network. Qakbot installs a keylogger to steal user credentials. It monitors network traffic, specifically traffic to online banking websites and can piggyback on a user’s active banking session by intercepting authentication tokens. It is currently being dropped by Emotet.
  9. Dridex is a banking trojan that uses malicious macros in Microsoft Office with either malicious embedded links or attachments. Dridex is disseminated via malspam campaigns.
  10. Emotet is a modular infostealer that downloads or drops banking trojans. It can be delivered through either malicious download links or attachments, such as PDF or macro-enabled Word documents. Emotet also incorporates spreader modules in order to propagate throughout a network. In December 2018, Emotet was observed using a new module that exfiltrates email content.

Leave a Reply

Your email address will not be published. Required fields are marked *