CHKP Check Point Software Technologies Ltd.

January 2023’s Most Wanted Malware: Infostealer Vidar Makes a Return while Earth Bogle njRAT Malware Campaign Strikes

January 2023’s Most Wanted Malware: Infostealer Vidar Makes a Return while Earth Bogle njRAT Malware Campaign Strikes

Check Point Research reports that infostealer Vidar made its return to the top ten list in January, reaching seventh place, while major campaign dubbed Earth Bogle delivered njRAT malware to targets across the Middle East and North Africa

SAN CARLOS, Calif., Feb. 13, 2023 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has published its Global Threat Index for January 2023. Last month saw infostealer Vidar return to the top ten list in seventh place after an increase in instances of brandjacking, and the launch of a major njRAT malware phishing campaign in the Middle East and North Africa.

In January, infostealer Vidar was seen spreading through fake domains claiming to be associated with remote desktop software company AnyDesk. The malware used URL jacking for various popular applications to redirect people to a single IP address claiming to be the official AnyDesk website. Once downloaded, the malware masqueraded as a legitimate installer to steal sensitive information such as login credentials, passwords, cryptocurrency wallet data and banking details.

Researchers also identified a major campaign dubbed Earth Bogle delivering the njRAT malware to targets across the Middle East and North Africa. The attackers used phishing emails containing geopolitical themes, enticing users to open malicious attachments. Once downloaded and opened, the Trojan can infect devices, allowing attackers to conduct numerous intrusive activities to steal sensitive information. njRAT came in at number ten on the top malware list, having dropped off after September 2022.

“Once again, we’re seeing malware groups use trusted brands to spread viruses, with the aim of stealing personal identifiable information. I cannot stress enough how important it is that people pay attention to the links they are clicking on to ensure they are legitimate URLs. Look out for the security padlock, which indicates an up-to-date SSL certificate, and watch for any hidden typos that might suggest the website is malicious,” said Maya Horowitz, VP Research at Check Point Software.

CPR also revealed that “Web Server Exposed Git Repository Information Disclosure” remained the most exploited vulnerability last month, impacting 46% of organizations globally, followed by “HTTP Headers Remote Code Execution” with 42% of organizations worldwide. “MVPower DVR Remote Code Execution” came in third with a global impact of 39%.



Top Malware Families

*The arrows relate to the change in rank compared to the previous month.



Qbot and LokiBot were the most prevalent malware last month with an impact of more than 6% on worldwide organizations respectively, followed by AgentTesla with a global impact of 5%.

  1. ↑ Qbot – Qbot AKA Qakbot is a banking Trojan that first appeared in 2008. It was designed to steal a user’s banking credentials and keystrokes. Often distributed via spam email, Qbot employs several anti-VM, anti-debugging, and anti-sandbox techniques to hinder analysis and evade detection.



  2. ↑ LokiBot – LokiBot is a commodity infostealer with versions for both the Windows and Android OS that first identified in February 2016. It harvests credentials from a variety of applications, web browsers, email clients, IT administration tools such as PuTTY and more. LokiBot is sold on hacking forums, and it is believed that its source code was leaked, thus allowing numerous variants to appear. Since late 2017, some Android versions of LokiBot include ransomware functionality in addition to their info stealing capabilities.



  3. ↑ AgentTesla - AgentTesla is an advanced RAT functioning as a keylogger and information stealer, which is capable of monitoring and collecting the victim’s keyboard input, system keyboard, taking screenshots, and exfiltrating credentials to a variety of software installed on a victim’s machine (including Google Chrome, Mozilla Firefox and the Microsoft Outlook email client).

Top Attacked Industries Globally



Last month, Education/Research remained the most attacked industry globally, followed by Government/Military and then Healthcare.

  1. Education/Research
  2. Government/Military
  3. Healthcare

Top Exploited Vulnerabilities



Last month, “Web Server Exposed Git Repository Information Disclosure” was the most exploited vulnerability, impacting 46% of organizations globally, followed by “HTTP Headers Remote Code Execution” with 42% of organizations worldwide. “MVPower DVR Remote Code Execution” came in third with a global impact of 39%.

  1. ↔ Web Server Exposed Git Repository Information Disclosure - An information disclosure vulnerability has been reported in Git Repository. Successful exploitation of this vulnerability could allow an unintentional disclosure of account information.



  2. ↑ HTTP Headers Remote Code Execution (CVE-2020-10826,CVE-2020-10827,CVE-2020-10828,CVE-2020-13756) - HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine.



  3. ↑ MVPower DVR Remote Code Execution - A remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request.

Top Mobile Malwares



Last month, Anubis remained the most prevalent mobile malware, followed by Hiddad and AhMyth.

  1. Anubis – Anubis is a banking Trojan malware designed for Android mobile phones. Since it was initially detected, it has gained additional functions including Remote Access Trojan (RAT) functionality, keylogger, audio recording capabilities and various ransomware features. It has been detected on hundreds of different applications available in the Google Store.



  2. Hiddad - Hiddad is an Android malware which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS.



  3. AhMyth – AhMyth is a Remote Access Trojan (RAT) discovered in 2017. It is distributed through Android apps that can be found on app stores and various websites. When a user installs one of these infected apps, the malware can collect sensitive information from the device and perform actions such as keylogging, taking screenshots, sending SMS messages, and activating the camera, which usually used to steal sensitive information.

Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s intelligence. ThreatCloud provides real-time threat intelligence derived from hundreds of millions of sensors worldwide, over networks, endpoints and mobiles. The intelligence is enriched with AI-based engines and exclusive research data from Check Point Research, the intelligence and research Arm of Check Point Software Technologies.

The complete list of the top ten malware families in January can be found on the Check Point blog.  

Follow Check Point Research via:

Blog:

Twitter:

About Check Point Research

Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cybersecurity solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyberattacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises four core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.



MEDIA CONTACT:      INVESTOR CONTACT:
Emilie Beneitez Lefebvre     Kip E. Meintzer
Check Point Software Technologies     Check Point Software Technologies
     

 



EN
13/02/2023

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exp...

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report Report finds 65% of organizations suffered a cloud-security incident in the past year — yet only 6% remediated it within an hour REDWOOD CITY, Calif., June 05, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread i...

 PRESS RELEASE

Check Point Software Technologies Recognized as a Best Company to Work...

Check Point Software Technologies Recognized as a Best Company to Work For by U.S. News & World Report REDWOOD CITY, Calif., June 02, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that U.S. News & World Report has named the company among its . In addition, Check Point was also recognized as a Best Company to Work For in the IT industry. This recognition highlights Check Point’s commitment to fostering a culture of innovation, inclusion, and continuous growth across its global workforce. The U.S. News rankings evaluate c...

 PRESS RELEASE

Check Point Accelerates Threat Detection and Response with AI-Powered ...

Check Point Accelerates Threat Detection and Response with AI-Powered Security Management for the Modern Enterprise Next-generation Smart-1 Management Appliances boost efficiency delivering 2X expansion in managed gateways and AI-powered tools for automation, policy insights, and orchestration REDWOOD CITY, Calif., May 28, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the launch of its next generation Smart-1 Management Appliances, delivering 2X increase in managed gateways and up to 70% higher log rate, with AI-powere...

 PRESS RELEASE

AI-Powered Defense at the Edge: Check Point Launches New Branch Office...

AI-Powered Defense at the Edge: Check Point Launches New Branch Office Security Gateways with 4x Faster Threat Prevention Performance Optimized for SD-WAN, New Quantum Force Branch Office Firewalls deliver protections against growing attacks on branch offices and superior end user experience REDWOOD CITY, Calif., May 28, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced major advancements to its family of All Quantum Force Security Gateways for the data center and perimeter are receiving a 15%-25% performance boost in thr...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch