CHKP Check Point Software Technologies Ltd.

November 2019’s Most Wanted Malware: Researchers Warn of Fast-growing Mobile Threat While Emotet’s Impact Declines

November 2019’s Most Wanted Malware: Researchers Warn of Fast-growing Mobile Threat While Emotet’s Impact Declines

Check Point’s researchers report that the xHelper mobile trojan is spreading so fast, it has entered the overall top 10 malware list at #8 as well as being the biggest threat impacting mobiles

SAN CARLOS, Calif., Dec. 11, 2019 (GLOBE NEWSWIRE) -- Check Point Research, the Threat Intelligence arm of (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for November 2019. The research team reported that for the first time in over three years, a mobile trojan has entered the overall top malware listing as well as being the most prevalent mobile threat over the past month.

The mobile trojan is xHelper, which was first seen in the wild in March 2019. xHelper is a multi-purpose trojan targeting Android users that can download other malicious applications as well as display malicious advertisements.  It is also reported to be a persistent application, able to reinstall itself even if it is uninstalled by the victim. During the past six months the malware’s code has been constantly updated, helping it to evade mobile antivirus solutions and to keep on infecting new victims. As a result, it has entered the overall top 10 malware list at #8. 

November’s most wanted malware was the Emotet botnet, retaining the #1 position from October.  However, in November, it impacted 9% of organizations globally, down from 14% the previous month.

“Both Emotet and xHelper are versatile, multi-purpose malware that can be adapted to criminals’ needs, such as distributing ransomware, spreading spam campaigns or distributing malvertising to users’ devices.  This shows that criminals are trying multiple different illicit tactics to monetize their operations, rather than following a single trend like cryptomining which dominated the sector in 2018,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point. “As such, it’s essential that organizations deploy the latest generation anti-malware solutions on their networks as well as on employees’ mobile devices, to protect all enterprise endpoints. They should also educate employees about the dangers of opening email attachments, downloading resources or clicking on links that do not come from a trusted source or contact.”

November 2019’s Top 3 ‘Most Wanted’ Malware:

*The arrows relate to the change in rank compared to the previous month.

Emotet has maintained its position at the top of the malware list with a global impact of 9%. XMRig was the second most popular malware impacting 7% of organizations worldwide, followed by Trickbot, impacting 6% of organizations globally.

  1. Emotet – Emotet is an advanced, self-propagating and modular Trojan. Emotet was formerly a banking Trojan, and recently has been used as a distributor of other malware or malicious campaigns. It uses multiple methods for maintaining persistence and evasion techniques to avoid detection. In addition, it can be spread through phishing spam emails containing malicious attachments or links.



  2. ↔ XMRig - XMRig is an open-source CPU mining software used for the mining process of the Monero cryptocurrency which was first seen in-the-wild on May 2017.



  3. ↔ Trickbot - Trickbot is a dominant banking Trojan constantly being updated with new capabilities, features and distribution vectors. This enables Trickbot to be a flexible and customizable malware that can be distributed as part of multi purposed campaigns.

November’s Top 3 ‘Most Wanted’ Mobile Malware:

This month xHelper - a new entry to our top malware list – was the most prevalent mobile malware, followed by Guerilla and Lotoor.

  1. xHelper - A malicious Android application seen in the wild since March 2019, used for downloading other malicious apps and display advertisements. The application is capable of hiding itself from the user and mobile anti-virus programs, and reinstalls itself if the user uninstalls it.



  2. Guerrilla - An Android Trojan found embedded in multiple legitimate apps which is capable of downloading additional malicious payloads. Guerrilla generates fraudulent ad revenue for the app developers.



  3. Lotoor - Hack tool that exploits vulnerabilities on Android operating system in order to gain root privileges on compromised mobile devices.

November’s ‘Most Exploited’ vulnerabilities:

This month the three top exploited remained the same as in the previous month – SQL injection techniques continue to lead the list, impacting 39% of organizations globally, followed by the OpenSSL TLS DTLS Heartbeat Information Disclosure vulnerability and MVPower DVR Remote Code Execution - impacting 34% and 33% of organizations worldwide respectively.

  1. SQL Injection (several techniques) - Inserting an injection of SQL query in input from client to application, while exploiting a security vulnerability in an application's software.



  2. OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346) - An information disclosure vulnerability exists in OpenSSL. The vulnerability is due to an error when handling TLS/DTLS heartbeat packets. An attacker can leverage this vulnerability to disclose memory contents of a connected client or server.



  3. MVPower DVR Remote Code Execution - A remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request.

Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, more than 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily.

The complete list of the can be found on the Check Point Blog.  

Follow Check Point Research via:

Blog:

Twitter:

About Check Point Research

Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT:INVESTOR CONTACT:
Emilie Beneitez LefebvreKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies



EN
11/12/2019

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Check Point Software Unveils Quantum Firewall Software R82.10 to Secur...

Check Point Software Unveils Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise New software release introduces more than 20 capabilities that secure AI transformation, enforce Zero Trust and unify hybrid mesh network protection REDWOOD CITY, Calif., Dec. 04, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments and simplify Zero Trust across hybr...

 PRESS RELEASE

Check Point Software Announces Pricing of Upsized Private Offering of ...

Check Point Software Announces Pricing of Upsized Private Offering of $1.75 Billion of 0.00% Convertible Senior Notes due 2030 TEL AVIV, Israel, Dec. 03, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (Nasdaq: CHKP), a pioneer and global leader of cyber security solutions, today announced the pricing of $1.75 billion aggregate principal amount of 0.00% Convertible Senior Notes due 2030 (the “Notes”) in a private offering (the “Offering”) to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, as amended (the “Securities Act”). The aggrega...

 PRESS RELEASE

Check Point Software Technologies Named a Leader in Gartner Magic Quad...

Check Point Software Technologies Named a Leader in Gartner Magic Quadrant for Email Security We Believe this Reinforces our Excellence in Email Security with AI-Powered Solutions that Combat Advanced Threats REDWOOD CITY, Calif., Dec. 03, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, announces that it has been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security. Excelling across key areas such as core email protection, integrated email security, and outbound security, Check Point delivers AI-powered protect...

 PRESS RELEASE

Check Point Software Announces Proposed Private Offering of $1.5 Billi...

Check Point Software Announces Proposed Private Offering of $1.5 Billion of 0.00% Convertible Senior Notes due 2030 TEL AVIV, Israel, Dec. 02, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced its intention to offer, subject to market conditions and other factors, $1.5 billion aggregate principal amount of 0.00% Convertible Senior Notes due 2030 (the “Notes”) in a private offering (the “Offering”) to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, a...

 PRESS RELEASE

The AI Transformation Has Arrived. Now Comes the Hard Part: Securing I...

The AI Transformation Has Arrived. Now Comes the Hard Part: Securing It Discover how to build resilient, prevention-first AI security — from models and agents to cloud workloads and connectivity. Live on December 4 REDWOOD CITY, Calif., Dec. 02, 2025 (GLOBE NEWSWIRE) -- Artificial intelligence is transforming the enterprise at unprecedented speed. AI now underpins critical workloads, cloud operations, identity systems, code pipelines, and everyday collaboration tools. As these systems expand across hybrid cloud and edge environments, organizations face a new challenge: how to secure AI ...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch