CHKP Check Point Software Technologies Ltd.

January 2019’s Most Wanted Malware: A Significant New Threat Speaks Up

January 2019’s Most Wanted Malware: A Significant New Threat Speaks Up

Check Point’s researchers detect growth of ‘SpeakUp’ – a new Linux backdoor which is spreading the XMRig crypto-mining malware

SAN CARLOS, Calif., Feb. 13, 2019 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a leading provider of cyber-security solutions globally, has published its latest Global Threat Index for January 2019. The index reveals a new backdoor Trojan affecting Linux servers, which is distributing the XMRig crypto-miner. The new malware, dubbed , is capable of delivering any payload and executing it on compromised machines.

The new Trojan currently evades all security vendors’ anti-virus software. It has been propagated through a series of exploitations based on commands it receives from its control center, including the 8th most popular exploited vulnerability, “Command Injection over HTTP”. Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware. 

In January, the top 4 most prevalent malware variants were cryptominers. Coinhive remains the top malware, impacting 12% of organizations worldwide. XMRig was once again the second most prevalent malware with a global impact of 8%, followed by Cryptoloot miner with an impact of 6% of organizations globally. While there are four cryptominers in January’s index, half of all malware forms in the top ten can be used to download further malware to infected machines.

Maya Horowitz, Threat Intelligence Group Manager at Check Point commented: “While January saw little change in the malware forms aimed at enterprises worldwide, we are beginning to see new ways to distribute malware. Threats like these are a stark warning of bigger threats to come. Backdoors like Speakup can evade detection and then distribute further, potentially more dangerous malware to compromised machines. Since Linux is used extensively in enterprise servers, we expect Speakup will be a threat that will grow in scale and severity throughout the year.”

January 2019’s Top 3 ‘Most Wanted’ Malware:

*The arrows relate to the change in rank compared to the previous month.

  1. ↔ Coinhive - Crypto Miner designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user's knowledge or approval the profits with the user. The implanted JavaScript uses a great deal of the computational resources of end users’ machines to mine coins, and may crash the system.
  2. XMRig- Open-source CPU mining software used for the mining process of the Monero cryptocurrency, and first seen in-the-wild on May 2017.     
  3. Cryptoloot - Crypto-Miner that uses the victim’s CPU or GPU power and existing resources for crypto mining - adding transactions to the blockchain and releasing new currency. It is a competitor to Coinhive, trying to pull the rug under it by asking a smaller percentage of revenue from websites.

Hiddad, the modular backdoor for Android which grants privileges to downloaded malware, has replaced Triada at first place in the top mobile malware list. Lotoor follows in second place, while Triada has fallen to third place.

January’s Top 3 ‘Most Wanted’ Mobile Malware:

  1. Hiddad - Modular Backdoor for Android which grants super user privileges to downloaded malware, as helps it to get embedded into system processes.

  2. Lotoor- Hack tool that exploits vulnerabilities on Android operating system in order to gain root privileges on compromised mobile devices.

  3. Triada - Modular Backdoor for Android which grants super user privileges to downloaded malware, as helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.

Check Point researchers also analyzed the most exploited cyber vulnerabilities. CVE-2017-7269 remained in first place with a global impact of 47%. Following closely behind, Web Server Exposed Git Repository Information Disclosure was in second place and OpenSSL TLS DTLS Heartbeat Information Disclosure followed in third, impacting 46% and 45% of organizations around the world respectively.

January’s Top 3 ‘Most Exploited’ vulnerabilities:

  1. ↔ Microsoft IIS WebDAV ScStoragePathFromUrl Buffer Overflow (CVE-2017-7269) - By sending a crafted request over a network to Microsoft Windows Server 2003 R2 through Microsoft Internet Information Services 6.0, a remote attacker could execute arbitrary code or cause a denial of service conditions on the target server. That is mainly due to a buffer overflow vulnerability resulted by improper validation of a long header in HTTP request. 
  2. ↑ Web Server Exposed Git Repository Information Disclosure- An information disclosure vulnerability has been reported in Git Repository. Successful exploitation of this vulnerability could allow an unintentional disclosure of account information.
  3. ↓ OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346) - An information disclosure vulnerability exists in OpenSSL. The vulnerability is due to an error when handling TLS/DTLS heartbeat packets. An attacker can leverage this vulnerability to disclose memory contents of a connected client or server.

Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, more than 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily.

* The complete list of the top 10 malware families in June can be found on the Check Point Blog:  

Check Point’s Threat Prevention Resources are available at: 

Follow Check Point via:

Twitter: 

Facebook: 

Blog:

YouTube: 

LinkedIn:

About Check Point Research

Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

INVESTOR CONTACT:

Kip E. Meintzer

Check Point Software Technologies

+1.650.628.2040

 

MEDIA CONTACT:

Emilie Beneitez Lefebvre

Check Point Software Technologies

Tel: +44 (0) 7785 381 302

 

EN
13/02/2019

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd: 3 directors

Three Directors at Check Point Software Technologies Ltd sold 544 shares at 171.480USD. The significance rating of the trade was 53/100. Is that information sufficient for you to make an investment decision? This report gives details of those trades and adds context and analysis to them such that you can judge whether these trading decisions are ones worth following. Included in the report is a detailed share price chart which plots discretionary trades by all the company's directors over the ...

 PRESS RELEASE

Check Point Software Earns Leader & Fast Mover Position in GigaOm Rada...

Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security Analyst firm highlights Check Point’s prevention-first architecture, strong ecosystem integrations, unified cloud security platform, and continued pace of innovation REDWOOD CITY, Calif., Feb. 17, 2026 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it has been named a Leader and Fast Mover in the GigaOm Radar for Cloud Network Security 2025, marking the company’s third consecutive year in the top position. GigaOm recogniz...

Anish Jog ... (+4)
  • Anish Jog
  • Daniel Ives
  • Sam Brandeis
  • Steven Wahrhaftig

Good Results With a Key Few Quarters Ahead; Positive Mojo-PT to $210

A Closer Look at FY4Q25 (December) ResultsRevenueTotal revenue of $744.9 million (up 6% y/y) was in-line with the company’s guidance range of $700.0 million and $764.0 million and below the Street’s $746.3 million estimate primarily driven by demand for the company's emerging product portfolio whil

 PRESS RELEASE

Check Point Software Reports Fourth Quarter and 2025 Full Year Results

Check Point Software Reports Fourth Quarter and 2025 Full Year Results TEL AVIV, Israel, Feb. 12, 2026 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), today announced its financial results for the fourth quarter and full year ended December 31, 2025. Fourth Quarter 2025 Highlights         Calculated Billings* reached $1,039 million, an 8 percent increase year over yearRemaining Performance Obligation (RPO)**: $2,728 million, an 8 percent increase year over yearTotal Revenues: $745 million, a 6 percent increase year over yearSecurity Subscription Revenues: $325 million, an 11 percent increase ye...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch