tagline: Confidence in the Connected World
CIS Logo
HomeResourcesBlog postTop 10 Malware July 2017

Top 10 Malware July 2017

The Top 10 Malware made up approximately 46% of new malware infections reported by the MS-ISAC in July, a decrease of two percentage points from June, and the third monthly decline after peaking at 56% of new malware notifications in April 2017. This coincided with a 33% decrease in the number of Top 10 Malware notifications sent in July 2017 compared to June 2017. Every month the MS-ISAC maps the Top 10 Malware to common infection vectors. This is done by using open source observations and reports on each malware type. The MS-ISAC observed the largest decrease in malspam in July, due to a continued reduction in Kovter activity. The remaining infection vectors also declined consistent with the overall reduction in malware activity.

The Top 10 Malware made up approximately 46% of new malware infections reported by the MS-ISAC in July, a decrease of two percentage points from June, and the third monthly decline after peaking at 56% of new malware notifications in April 2017. This coincided with a 33% decrease in the number of Top 10 Malware notifications sent in July 2017 compared to June 2017. Every month the MS-ISAC maps the Top 10 Malware to common infection vectors. This is done by using open source observations and reports on each malware type. The MS-ISAC observed the largest decrease in malspam in July, due to a continued reduction in Kovter activity. The remaining infection vectors also declined consistent with the overall reduction in malware activity.

JulyVectorAmount

 

The MS-ISAC Top 10 Malware refers to the top 10 new actionable event notifications of non-generic malware signatures sent out by the MS-ISAC Security Operations Center (SOC).

Dropped – Malware dropped by other malware already on the system or by an exploit kit.

Malvertising – Malware introduced through a malicious advertisement.

Malspam – Unsolicited emails, which either direct users to download malware from malicious web sites or trick the user into opening malware through an attachment.

Multiple – Refers to malware that currently favors at least two vectors.

 

  1. Kovter is a Trojan, which has been observed acting as click fraud malware or a ransomware downloader. It is disseminated via malspam email attachments containing malicious office macros. Kovter is fileless malware that evades detection by hiding in registry keys. Some reports indicate that Kovter infections have received updated instructions from command and control infrastructure to serve as a remote access backdoor.
  2. ZeuS/Zbot is a modular banking Trojan which uses keystroke logging to compromise victim credentials when the user visits a banking website. Since the release of the ZeuS/Zbot source code in 2011, many other malware variants have adopted parts of it’s codebase, which means that events classified as ZeuS/Zbot may actually be other malware using parts of the ZeuS/Zbot code.
  3. Emotet is a malware banking variant that uses malicious macros with either malicious embedded links or attachments. Emotet is in the same family of malware as Dridex and was regionally isolated in Europe around Germany. In early-April 2017, a campaign targeted the United Kingdom (UK) before surfacing in the United States in mid-April 2017. Emotet is disseminated via malspam campaigns. A recent evolution in functionality adds spreader modules to Emotet. This builds on a recent trend of adding propagation tools and techniques to ransomware that crimeware is adopting.
  4. Hancitor is downloader malware disseminated via phishing emails containing a malicious macro attachment and is known to obfuscate itself using PowerShell commands.
  5. DNSChanger is malware that was very prolific in the late 2000s and early 2010s, before being dismantled by a FBI takedown. A new variant was identified in December 2017, which reportedly acts as an exploit kit targeting routers. Once infected, the routers’ DNS records are modified to point to a malicious server. DNSChanger is disseminated via malvertising and uses steganography to obfuscate its initial actions.
  6. Ponmocup is a downloader associated with one of the largest and longest running botnets, active since 2006. Ponmocup is usually disseminated through an infected webpage as a malvertisement.
  7. Tinba, also known as Tiny Banker, is a banking Trojan, known for its small file size. Tinba uses web injection to collect victim information from login pages and web forms, and is primarily disseminated via spam containing a weaponized PowerPoint file.
  8. Ursnif and its variant Dreambot, are banking Trojans, known for weaponizing Word documents. Ursnif uses web injection to collect victim information from login pages and web forms. Ursnif is currently being delivered via malspam.
  9. Pony, also known as Fareit, is a downloader Trojan, known for its association with the Hancitor downloader and being delivered via malspam campaigns. In most campaigns Pony is downloaded by Hancitor and then used to download another follow-up malware. Recently, Pony was observed downloading either DELoader or Vawtrak.
  10. Cerber is an evasive ransomware that is capable of encrypting files in offline mode and is known for fully renaming files and appending them with a random extension. There are currently six versions of Cerber disseminated via spam campaigns and it has been reported by Trend Micro as evolving specifically to evade detection by machine learning algorithms. Currently v1 is the only version of Cerber for which a decryptor tool is available.