Cybersecurity Insiders brings to you a list of World’s 7 most dreaded malware which is as follows-
Coinhive- This happens to be a malware which happens to perform online mining of Monero Cryptocurrency. And distributors of this malware are often found targeting data centers of SMBs operating across the globe. Coinhive is often found infecting machines where users visit web pages of moderate to high web traffic. And in reality, the crypto mining malware not only utilized great computational resources but also lead to the crash of the system.
XMRig- This is another open source mining software that is diligently used to mine Monero digital currency. It was first discovered in May 2017 and from that its propagation is reported to be ever increasing.
CryptoLoot- It’s another crypto mining malware which reportedly uses the GPU and CPU power of the infected machine. It’s devised in such a way that it adds transactions to the blockchain and hence gets the reward with the release of the new currency. Mostly, such malware is being used by cyber attack campaigns launched from North Korea, China, and Russia.
Emotet- It’s actually a banking Trojan which helps hackers distributors propagate other malware or malicious tools. Since its detection is almost impossible by noted anti-malware solutions prevailing in the market, the demand for such malware is high in the dark market. Emotet can also be spread on the web through phishing attacks where victims fall prey to malicious web links and malicious spam links hidden in the email.
HIDDAD- This is basically a mobile malware which spreads across Android phones. Its main objective is to hit its target with irrelevant ads and occasionally after infecting a device for a fortnight, this adware is also reported to gain access to key security details built into the OS, allowing hackers to gain sensitive user data from the device which includes photos, videos, contacts, text messages, and email ID along with the device mobile and IMEI number.
LOTOOR- This is a mobile malware which is often caught exploring the vulnerabilities on the Android OS in order to gain root access on compromised mobile devices.
Triada can be treated as a backdoor agent for Android devices where it grants access to remote hackers to pass on malware to the infected device without the knowledge of the user. It is also reported to be seen spoofing URLs loaded in the browser.