CHKP Check Point Software Technologies Ltd.

May 2020’s Most Wanted Malware: Ursnif Banking Trojan Ranks On Top 10 Malware List for First Time, Over Doubling Its Impact On Organizations

May 2020’s Most Wanted Malware: Ursnif Banking Trojan Ranks On Top 10 Malware List for First Time, Over Doubling Its Impact On Organizations

Check Point’s researchers find sharp increase in attacks using the long-running Ursnif banking trojan capable of stealing email and banking credentials

SAN CARLOS, Calif., June 15, 2020 (GLOBE NEWSWIRE) -- Check Point Research, the Threat Intelligence arm of (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for May 2020.  Researchers found several malicious spam campaigns distributing the Ursnif banking trojan, which caused it to jump up 19 places to 5th in the Top Malware list, doubling its impact on organizations worldwide.

The Ursnif banking trojan targets Windows PCs and is capable of stealing vital financial information, email credentials and other sensitive data. The malware is delivered in malicious spam campaigns via Word or Excel attachments. The new wave of Ursnif trojan attacks – which saw it enter the Top Malware index’s top 10 for the first time – coincides with reports about the demise of one of its popular variants, Dreambot. Dreambot was first spotted in 2014 and is based on Ursnif’s leaked source code. As reported since March 2020, Dreambot’s backend server has gone down, and no new Dreambot samples have been seen in the wild.

Meanwhile, the well-known banking trojan Dridex, which entered the malware top 10 for the first time in March, continued to have a significant impact throughout May, remaining in 1st place for the second month running.The most prevalent mobile malware families also completely changed in May, with Android malware that generates fraudulent revenue from clicking on mobile adverts dominating the mobile index – showing how criminals are trying to monetize attacks against mobile devices.“With the Dridex, Agent Tesla and Ursnif banking trojans all ranking in the malware top 5 in May , it is clear cyber criminals are focusing on using malware that enables them to monetize their victim’s data and credentials,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point.  “While COVID-19-related attacks have fallen, we have seen a 16% increase in overall cyber-attacks in May compared to March and April, so organizations must remain vigilant by using certain tools and techniques, especially with the mass shift to remote working, which attackers are taking advantage of.”

Top malware families

*The arrows relate to the change in rank compared to the previous month.

This month Dridex remains in 1st place, impacting 4% of organizations globally, followed by Agent Tesla and XMRig, both impacting 3% of organizations worldwide.

  1. Dridex - Dridex is a Trojan that targets the Windows platform and is reportedly downloaded via a spam email attachment. Dridex contacts a remote server and sends information about the infected system. It can also download and execute arbitrary modules received from the remote server.



  2. ↑ Agent Tesla - Agent Tesla is an advanced RAT functioning as a keylogger and information stealer, which capable of monitoring and collecting the victim's keyboard input, system clipboard, taking screenshots, and exfiltrating credentials belonging to of a variety of software installed on a victim's machine (including Google Chrome, Mozilla Firefox and Microsoft Outlook email client). 



  3. XMRig - XMRig is open-source CPU mining software used for the mining process of the Monero cryptocurrency, and first seen in-the-wild on May 2017.

Top exploited vulnerabilities

This month “MVPower DVR Remote Code Execution” is still holding 1st place as the most common exploited vulnerability, impacting 45% of organizations globally. The second most popular exploited vulnerability is “OpenSSL TLS DTLS Heartbeat Information Disclosure”, closely followed by “Web Server Exposed Git Repository Information Disclosure” impacting 40% and 39% of organizations respectively.

  1. MVPower DVR Remote Code Execution - A remote code execution vulnerability that exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request.



  2. OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346) - An information disclosure vulnerability which exists in OpenSSL. The vulnerability is due to an error when handling TLS/DTLS heartbeat packets. An attacker can leverage this vulnerability to disclose memory contents of a connected client or server.



  3. Web Server Exposed Git Repository Information Disclosure - An information disclosure vulnerability has been reported in Git Repository. Successful exploitation of this vulnerability could allow an unintentional disclosure of account information.

Top malware families - Mobile

This month, the top three malware families completely changed, with PreAmo in 1st place as the most prevalent Mobile malware, followed by Necro and Hiddad.

  1. PreAmo - PreAmo is an Android Malware imitates the user by clicking on banners retrieved from three ad agencies: Presage, Admob, and Mopub.

     
  2. Necro - Necro is an Android Trojan Dropper. It can download other malware, showing intrusive ads and stealing money by charging paid subscriptions.

     
  3. Hiddad - Hiddad is an Android malware which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS.

Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 2.5 billion websites and 500 million files daily, and identifies more than 250 million malware activities every day.

The complete list of the top 10 malware families in May can be found on the .

Follow Check Point Research via:

Blog:

Twitter:

About Check Point Research

Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT:INVESTOR CONTACT:   
Emilie Beneitez LefebvreKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies
EN
15/06/2020

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exp...

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report Report finds 65% of organizations suffered a cloud-security incident in the past year — yet only 6% remediated it within an hour REDWOOD CITY, Calif., June 05, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread i...

 PRESS RELEASE

Check Point Software Technologies Recognized as a Best Company to Work...

Check Point Software Technologies Recognized as a Best Company to Work For by U.S. News & World Report REDWOOD CITY, Calif., June 02, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that U.S. News & World Report has named the company among its . In addition, Check Point was also recognized as a Best Company to Work For in the IT industry. This recognition highlights Check Point’s commitment to fostering a culture of innovation, inclusion, and continuous growth across its global workforce. The U.S. News rankings evaluate c...

 PRESS RELEASE

Check Point Accelerates Threat Detection and Response with AI-Powered ...

Check Point Accelerates Threat Detection and Response with AI-Powered Security Management for the Modern Enterprise Next-generation Smart-1 Management Appliances boost efficiency delivering 2X expansion in managed gateways and AI-powered tools for automation, policy insights, and orchestration REDWOOD CITY, Calif., May 28, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the launch of its next generation Smart-1 Management Appliances, delivering 2X increase in managed gateways and up to 70% higher log rate, with AI-powere...

 PRESS RELEASE

AI-Powered Defense at the Edge: Check Point Launches New Branch Office...

AI-Powered Defense at the Edge: Check Point Launches New Branch Office Security Gateways with 4x Faster Threat Prevention Performance Optimized for SD-WAN, New Quantum Force Branch Office Firewalls deliver protections against growing attacks on branch offices and superior end user experience REDWOOD CITY, Calif., May 28, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced major advancements to its family of All Quantum Force Security Gateways for the data center and perimeter are receiving a 15%-25% performance boost in thr...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch