{"id":18932,"date":"2015-11-27T16:55:14","date_gmt":"2015-11-27T16:55:14","guid":{"rendered":"http:\/\/www.businesscloudnews.com\/?p=240242"},"modified":"2015-11-27T16:55:14","modified_gmt":"2015-11-27T16:55:14","slug":"conficker-is-commonest-criminal-in-the-cloud-says-threatcloud-report","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/conficker-is-commonest-criminal-in-the-cloud-says-threatcloud-report\/","title":{"rendered":"Conficker is commonest criminal in the cloud says ThreatCloud report"},"content":{"rendered":"<p><a href=\"http:\/\/www.businesscloudnews.com\/files\/2013\/08\/Secure-cloud.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-152712\" src=\"http:\/\/www.businesscloudnews.com\/files\/2013\/08\/Secure-cloud-300x225.jpg\" alt=\"Secure cloud\" width=\"300\" height=\"225\" \/><\/a>Three families of malware account for 40% of all the crime on the cloud across the globe, according to a new <a href=\"https:\/\/www.checkpoint.com\/ThreatPortal\/livemap.html\">report<\/a> from security firm Checkpoint.<\/p>\n<p>The company\u2019s ThreatCloud report looked at statistics drawn from intelligence feeding in from Check Point\u2019s global presence in October 2015. It identified more than 1,500 different malware families globally active in that month alone. The ThreatCloud World Cyber Threat Map uses software agents and monitors to tracks how and where cyberattacks are taking place worldwide in real time.<\/p>\n<p>Three malware families, the Conflickers, Salitys and Cutwails, accounted for 40% of all recorded attacks. The report also uncovered a new trend for criminals to try to assume control of networks by focusing on remote control of infected PCs. Increasingly, these are used to launch distributed denial of service (DDoS) and spamming campaigns against service providers.<\/p>\n<p>Attacks on individuals also rose sharply, though these tended to be concentrated around malware families that are involved in ransomware scams. Identity theft and the stealing of users\u2019 information \u00a0also rose sharply. The use of kits, such as the Neutrino ransomware exploit kit Fareit malware, which steals user information from web browsers and emails, increased dramatically. In one month this criminal modus operandum rose from being the 93rd most used scam to the 10th most common form of malware seen in October.<\/p>\n<p>International organisations, such as cloud service operators, are most likely to be targeted by Conficker which accounted for 20% of all attacks globally. The UK experienced a lower number of attacks than many countries European nations and was ranked 110th most vulnerable region out of 133 target countries globally. By comparison Germany ranked 93rd, Switzerland 89th, Spain 57<sup>th<\/sup> and France 54<sup>th<\/sup>. Italy is home to Europe\u2019s most endangered cloud, being the 40<sup>th<\/sup> most likely country to house a victim of an attack.<\/p>\n<p>It\u2019s easy for hackers to make small changes to malware code to enable it to bypass conventional cloud defences, according to Checkpoint\u2019s UK regional director Simon Moor. \u201cCompanies should consider deploying advanced technologies,\u201d said Moor.<\/p>\n<p>The ThreatCloud database holds over 250 million addresses analysed for bot discovery, over 11 million malware signatures and over 5.5 million infected websites.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Three families of malware account for 40% of all the crime on the cloud across the globe, according to a new report from security firm Checkpoint.<\/p>\n","protected":false},"author":105,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3721,1317,1976,3722],"tags":[118],"class_list":["post-18932","post","type-post","status-publish","format-standard","hentry","category-conficker","category-malware","category-news-analysis","category-threatcloud","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/18932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=18932"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/18932\/revisions"}],"predecessor-version":[{"id":18933,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/18932\/revisions\/18933"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=18932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=18932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=18932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}